SlideShare a Scribd company logo
1 of 24
Download to read offline
Course Calendar
Class DATE Contents
1 Sep. 26 Course information & Course overview
2 Oct. 4 Bayes Estimation
3 〃 11 Classical Bayes Estimation - Kalman Filter -
4 〃 18 Simulation-based Bayesian Methods
5 〃 25 Modern Bayesian Estimation :Particle Filter
6 Nov. 1 HMM(Hidden Markov Model)
Nov. 8 No Class
7 〃 15 Bayesian Decision
8 〃 29 Non parametric Approaches
9 Dec. 6 PCA(Principal Component Analysis)
10 〃 13 ICA(Independent Component Analysis)
11 〃 20 Applications of PCA and ICA
12 〃 27 Clustering, k-means et al.
13 Jan. 17 Other Topics 1 Kernel machine.
14 〃 22(Tue) Other Topics 2
Lecture Plan
Bayes Decision
1. Introduction
1.1 Pattern Recognition-
1.2 An Example Classification/Decision Theory
2. Bayes Decision Theory
2.1 Decision using Posterior Probability
2.2 Decision by Minimizing Risk
3. Discriminate Function
4. Gaussian Case
1. Introduction
3
1.1 Pattern Recognition
The second part of this course is concerned about Pattern Recognition.
Pattern recognitions (Machine Learning) want to give very high skills
for sensing and taking actions as humans do according to what they
observe.
Definitions of Pattern Recognition appeared in books
“The assignment of a physical object or event to one of several pre-
specified categories”
by Duda et al.[1]
“The science that concerns the description or classification
(recognition) of measurements”
by Schalkoff (Wiley Online Library)
Fish-Sorting Process
Sea bass 鱸
Salmon 鮭
R.O. Duda, P.E. Hart, and D. G. Stork,
“Pattern Classification”, John Wiley & Sons, 2nd edition, 2004
 
 
1
2
.
:
:feature vector in 2-d feature space
:
: action
"Correct dicision " should be an appropriate function of data
eg
x lightness
x width
x


 
  
 
x
x
x
1.2 An Example (Duda, Hart, & Stork 2004)
5
Automatic Fish-Sorting Process
action 1
belt conveyer
action 2
Typical pattern Recognition issues:
■ Classification ■ Regression
■ Clustering ■ Dimension Reduction
(Visualization)
Pattern Recognition System
data
Measurement
Preprocessing
Dimension
Reduction
Feature
Selection
Recognition
Classification
Model
change
Evaluation
analysis
results
PCA (ICA)
Clustering Cross-
ValidationPDF estimation
PDF: Probability Density Function
7
Classification/ Decision Theory
Suppose we observe fish image data x, then we want to classify it to
“sea bass” or “salmon” based on the joint probability distributions
The classification problem is to answer “How do we make the best
decision?”
   p ," sea bass" , p ," salmon"x x
x1
x2
Decision
Boundary
Classification:
Assign input vector to
one of two classes
R2
R1
Framework: - Two Category case (fish sorting example) -
■ State of nature (Class) ω (discrete random variable)
■ Prior Probability
■ Class-conditioned Probability (Likelihood)
Measurement x : brightness of fish (scalar continuous variable)
Class-conditional probability density function for each class:
1
2
: sea bass
: salmon
 
 


2. Bayes’ Decision Theory
   
   
1 2
1 2
,
where 1
P P
P P
 
  
   
   
1 1
2 2
PDF for given that the state of nature is
PDF for given that the state of nature is
p x x
p x x
 
 


9
Fig. 1 Class-conditioned probabilities
10
2.1 Decision Using Posterior Probability
■ Posterior Probabilities
■ Decision Rule (1) Minimizing error probability
■ Decision Rule (2) Likelihood ratio
   
 
   
 
the probability of being given that has been measuredDefine
Bayes rule derives
j
j j
j
xjP x
p x P
P x
p x
 
 



   
   
1 21
2 1 2
if >
if <
P x P x
P x P x
 
  
Decide
 
 
 
 
11 1
2 22
if
p x P
Pp x
 
 


Decide
independent of
observation x
(1)
(2)
(3)
11
Fig. 2 Decision
(a) Posterior Probabilities
(b) Likelihood ratio
12
Probability of Error
■ Error probability for a measurement x by decision
■ Average probability of error
   
 
        
               2 1 2 2 1 1
1 2 1 2
if we decide ( )2 1 1
if we decide ( )1 2 2
:
P x P x P x P P x P
P x x R
P x x R
P error xEx
p x dx p x dx dx dx
P error x p x dx
P error x
P error
     
 
 
 


 


     
R R R R
(4)
(5)
Fig. 3 P(error)
13
2.2 Decision by Minimizing Risk
■ Alternate Bayes Decision based on risk which defines “how much
costly each action is ?”
Suppose we observe x then take action according to make a decision
(ωi) if the true state of nature is ωj , we introduce the loss function
■ Example of loss function
From a medical image we want to classify (determine) whether it
contains cancer tissues or not.
 i j  
i
1 2
1 2
cancer, normal,
cancer, normal
 
 
 
 
cancer normal
cancer 0 1
normal 100 0
 i j  
1
2
1 2
(6)
Loss Function
Expected Loss
■ Conditional risk is the expected loss if we take action for a
measurement x.
■Action: = Deciding (i=12)
■Loss:
■Conditional Risks:
■The Overall Risk:
        
2
1
:i i j i j j
j
R x Ex P x       

  
i
i i
 :ij i j   
     
     
1 11 1 12 2
2 21 1 22 2
R x P x P x
R x P x P x
    
    
 
 
    
*
minimization
(minmum value R : Bayes Risk )
R R x x p x dx 
(7)
(8)
(9)
(10)
15
Minimum Risk Decision Rule (1)
   
   
1 21
2 1 2
if <
if >
R x R x
R x R x
 
  
Decide
   
       
1 2
21 11 1 12 22 2
Here , <
>
R x R x
P x P x
 
       
Minimum Risk Decision Rule (2)
 
 
 
 
 
 
1
1 12 22 2
21 11 12
2
if
Otherwise decide
threshold
P x P
PP x

   
  




Decide
(11)
(12)
(13)
16
Fig. 4 Likelihood ratio
17
Minimum error probability decision
=Minimizing the risk with zero-one loss function
Zero-One Loss Function:
 
 
 
 
1 2
12
Likekihood ratio decision rule (13) becomes
minimum error decision
P x P
PP x
 




Zero-One Loss Function:
 
0 if 0 1
,
1 if 1 0
i j ij
i j
i j
   
  
       
(14)
(15)
General Framework:
■ Finite set of states of nature (c Classes) :
■ Actions :
■ Loss:
■ Measurement:
 1 2, , c  
Generalization
: d-dimensional vector (feature vector)x
 1 2, , a  
     : 1,..., 1,...,ij i j i a j c     
19
3. Discriminant Function
19
Classifiers represented by discriminant functions : gi(x) i=1,…c
max gi(x)
g1(x) g2(x) gc(x)
x2
…
 where arg max
i
j
j
i g

 x
   Classifier minimizing the conditional risk: =i ig x R x
       
     
Minimizing error probability: =
Alternate function: =ln ln
i i i i
i i i
g x P x p x P
g x p x P
  
 


xdx1 …input
discriminant
fnctions
Classifier
Network structure
action
2020
■ Single discriminant function:
Two-category case
 
 
   
1
2
1 2
if 0
if 0
gives the decision boundary
g x
g x
g x g x





Decide
4.Gaussian Case:
   
     
     1
Multivariate Gaussian: ,
=ln ln
1 1
ln2 ln ln
2 2 2
i i i
i i i
T
i i i i i
p
g x p x P
d
x x P

 
 


      
x  
   
(17 )
(18)
(16)     1 2=g x g x g x
21
       
 
1
1 1 1
1 1
= ln2 ln ln
2 2 2
1 1 1
ln ln
2 2 2
T
i i i i i i
T T T
i i i i i i i i
d
g x x x P
x x x P
 


  
     
     
   
      
  0= T
i i i ig x x  T
x W x
 1
0
1 1
ln ln
2 2
T
i i i i i iP 
      
Case (i=1,2)
Boundary is given by a linear line
i   1 2General Case
Boundary is quadratic curves
 
decision
boundary
decision
boundary
(19)
(20)
1 11
where ,
2
i i i i i 
  W   
22
References:
1) R.O. Duda, P.E. Hart, and D. G. Stork, “Pattern Classification”,
John Wiley & Sons, 2nd edition, 2004
2) C. M. Bishop, “Pattern Recognition and Machine Learning”,
Springer, 2006
3) E. Alpaydin, Introduction to Machine Learning, MIT Press, 2009
4) A. Huvarinen et. al., ”Independent Component Analysis”
Wiley-Interscience 2001
Another action : Rejection
No classification for lower degree of conviction case
What next ?
In the discussions so far all of the relevant probabilities are known,
but this assumption will not be assured.
Fukunaga’s definition of Pattern Recognition:
“A problem of estimating density functions in a high–dimensional
space and dividing the space into the regions of categories or
classes”
23
 
 
   
 
 
     
1
/2 1/2
1
1 1 1
, exp
22
is d-dimensional random vector
:
: :
: Determinant of
T
d
T
d
x x
x x x
E x
Cov x E x x
  


 
 
      
 

   
  
Appendix:
Multivariable Gaussian Density Distribution
2012 mdsp pr07 bayes decision

More Related Content

What's hot

Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and ComplexityRajandeep Gill
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and boundAbhishek Singh
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplicationKumar
 
asymptotic notations i
asymptotic notations iasymptotic notations i
asymptotic notations iAli mahmood
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptshanthishyam
 
Probabilistic Models of Time Series and Sequences
Probabilistic Models of Time Series and SequencesProbabilistic Models of Time Series and Sequences
Probabilistic Models of Time Series and SequencesZitao Liu
 
Regular expressions-Theory of computation
Regular expressions-Theory of computationRegular expressions-Theory of computation
Regular expressions-Theory of computationBipul Roy Bpl
 
Context Free Grammar
Context Free GrammarContext Free Grammar
Context Free GrammarAkhil Kaushik
 
What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...
What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...
What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...Simplilearn
 
2-Approximation Vertex Cover
2-Approximation Vertex Cover2-Approximation Vertex Cover
2-Approximation Vertex CoverKowshik Roy
 

What's hot (20)

Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and Complexity
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and bound
 
8 queen problem
8 queen problem8 queen problem
8 queen problem
 
Greedy algorithms
Greedy algorithmsGreedy algorithms
Greedy algorithms
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplication
 
Daa unit 4
Daa unit 4Daa unit 4
Daa unit 4
 
asymptotic notations i
asymptotic notations iasymptotic notations i
asymptotic notations i
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.ppt
 
Probabilistic Models of Time Series and Sequences
Probabilistic Models of Time Series and SequencesProbabilistic Models of Time Series and Sequences
Probabilistic Models of Time Series and Sequences
 
Regular expressions-Theory of computation
Regular expressions-Theory of computationRegular expressions-Theory of computation
Regular expressions-Theory of computation
 
Parsing LL(1), SLR, LR(1)
Parsing LL(1), SLR, LR(1)Parsing LL(1), SLR, LR(1)
Parsing LL(1), SLR, LR(1)
 
greedy algorithm Fractional Knapsack
greedy algorithmFractional Knapsack greedy algorithmFractional Knapsack
greedy algorithm Fractional Knapsack
 
Approximation Algorithms
Approximation AlgorithmsApproximation Algorithms
Approximation Algorithms
 
Context Free Grammar
Context Free GrammarContext Free Grammar
Context Free Grammar
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...
What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...
What Is Dynamic Programming? | Dynamic Programming Explained | Programming Fo...
 
2-Approximation Vertex Cover
2-Approximation Vertex Cover2-Approximation Vertex Cover
2-Approximation Vertex Cover
 
Lexical analysis - Compiler Design
Lexical analysis - Compiler DesignLexical analysis - Compiler Design
Lexical analysis - Compiler Design
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 

Similar to 2012 mdsp pr07 bayes decision

2012 mdsp pr02 1004
2012 mdsp pr02 10042012 mdsp pr02 1004
2012 mdsp pr02 1004nozomuhamada
 
Bayseian decision theory
Bayseian decision theoryBayseian decision theory
Bayseian decision theorysia16
 
Normal density and discreminant analysis
Normal density and discreminant analysisNormal density and discreminant analysis
Normal density and discreminant analysisVARUN KUMAR
 
Introduction
IntroductionIntroduction
Introductionbutest
 
Estimation and Prediction of Complex Systems: Progress in Weather and Climate
Estimation and Prediction of Complex Systems: Progress in Weather and ClimateEstimation and Prediction of Complex Systems: Progress in Weather and Climate
Estimation and Prediction of Complex Systems: Progress in Weather and Climatemodons
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function홍배 김
 
2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approachnozomuhamada
 
Bayesian decesion theory
Bayesian decesion theoryBayesian decesion theory
Bayesian decesion theoryVARUN KUMAR
 
Probability and Statistics Cookbook
Probability and Statistics CookbookProbability and Statistics Cookbook
Probability and Statistics CookbookChairat Nuchnuanrat
 
Introduction to conventional machine learning techniques
Introduction to conventional machine learning techniquesIntroduction to conventional machine learning techniques
Introduction to conventional machine learning techniquesXavier Rafael Palou
 
MLHEP 2015: Introductory Lecture #1
MLHEP 2015: Introductory Lecture #1MLHEP 2015: Introductory Lecture #1
MLHEP 2015: Introductory Lecture #1arogozhnikov
 
MLHEP 2015: Introductory Lecture #4
MLHEP 2015: Introductory Lecture #4MLHEP 2015: Introductory Lecture #4
MLHEP 2015: Introductory Lecture #4arogozhnikov
 
2012 mdsp pr05 particle filter
2012 mdsp pr05 particle filter2012 mdsp pr05 particle filter
2012 mdsp pr05 particle filternozomuhamada
 

Similar to 2012 mdsp pr07 bayes decision (20)

Bayes ML.ppt
Bayes ML.pptBayes ML.ppt
Bayes ML.ppt
 
2012 mdsp pr02 1004
2012 mdsp pr02 10042012 mdsp pr02 1004
2012 mdsp pr02 1004
 
CSC446: Pattern Recognition (LN4)
CSC446: Pattern Recognition (LN4)CSC446: Pattern Recognition (LN4)
CSC446: Pattern Recognition (LN4)
 
Bayseian decision theory
Bayseian decision theoryBayseian decision theory
Bayseian decision theory
 
Normal density and discreminant analysis
Normal density and discreminant analysisNormal density and discreminant analysis
Normal density and discreminant analysis
 
A basic introduction to learning
A basic introduction to learningA basic introduction to learning
A basic introduction to learning
 
Introduction
IntroductionIntroduction
Introduction
 
Estimation and Prediction of Complex Systems: Progress in Weather and Climate
Estimation and Prediction of Complex Systems: Progress in Weather and ClimateEstimation and Prediction of Complex Systems: Progress in Weather and Climate
Estimation and Prediction of Complex Systems: Progress in Weather and Climate
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function
 
ML unit-1.pptx
ML unit-1.pptxML unit-1.pptx
ML unit-1.pptx
 
2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Bayesian decesion theory
Bayesian decesion theoryBayesian decesion theory
Bayesian decesion theory
 
CSC446: Pattern Recognition (LN5)
CSC446: Pattern Recognition (LN5)CSC446: Pattern Recognition (LN5)
CSC446: Pattern Recognition (LN5)
 
Probability and Statistics Cookbook
Probability and Statistics CookbookProbability and Statistics Cookbook
Probability and Statistics Cookbook
 
Introduction to conventional machine learning techniques
Introduction to conventional machine learning techniquesIntroduction to conventional machine learning techniques
Introduction to conventional machine learning techniques
 
MLHEP 2015: Introductory Lecture #1
MLHEP 2015: Introductory Lecture #1MLHEP 2015: Introductory Lecture #1
MLHEP 2015: Introductory Lecture #1
 
Cookbook en
Cookbook enCookbook en
Cookbook en
 
MLHEP 2015: Introductory Lecture #4
MLHEP 2015: Introductory Lecture #4MLHEP 2015: Introductory Lecture #4
MLHEP 2015: Introductory Lecture #4
 
2012 mdsp pr05 particle filter
2012 mdsp pr05 particle filter2012 mdsp pr05 particle filter
2012 mdsp pr05 particle filter
 

More from nozomuhamada

2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machinenozomuhamada
 
2012 mdsp pr12 k means mixture of gaussian
2012 mdsp pr12 k means mixture of gaussian2012 mdsp pr12 k means mixture of gaussian
2012 mdsp pr12 k means mixture of gaussiannozomuhamada
 
2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognitionnozomuhamada
 
2012 mdsp pr10 ica
2012 mdsp pr10 ica2012 mdsp pr10 ica
2012 mdsp pr10 icanozomuhamada
 
2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda2012 mdsp pr09 pca lda
2012 mdsp pr09 pca ldanozomuhamada
 
2012 mdsp pr06  hmm
2012 mdsp pr06  hmm2012 mdsp pr06  hmm
2012 mdsp pr06  hmmnozomuhamada
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlonozomuhamada
 
2012 mdsp pr03 kalman filter
2012 mdsp pr03 kalman filter2012 mdsp pr03 kalman filter
2012 mdsp pr03 kalman filternozomuhamada
 
2012 mdsp pr01 introduction 0921
2012 mdsp pr01 introduction 09212012 mdsp pr01 introduction 0921
2012 mdsp pr01 introduction 0921nozomuhamada
 
招待講演(鶴岡)
招待講演(鶴岡)招待講演(鶴岡)
招待講演(鶴岡)nozomuhamada
 

More from nozomuhamada (12)

2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine
 
2012 mdsp pr12 k means mixture of gaussian
2012 mdsp pr12 k means mixture of gaussian2012 mdsp pr12 k means mixture of gaussian
2012 mdsp pr12 k means mixture of gaussian
 
2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition
 
2012 mdsp pr10 ica
2012 mdsp pr10 ica2012 mdsp pr10 ica
2012 mdsp pr10 ica
 
2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda
 
2012 mdsp pr06  hmm
2012 mdsp pr06  hmm2012 mdsp pr06  hmm
2012 mdsp pr06  hmm
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
 
2012 mdsp pr03 kalman filter
2012 mdsp pr03 kalman filter2012 mdsp pr03 kalman filter
2012 mdsp pr03 kalman filter
 
2012 mdsp pr01 introduction 0921
2012 mdsp pr01 introduction 09212012 mdsp pr01 introduction 0921
2012 mdsp pr01 introduction 0921
 
Ieice中国地区
Ieice中国地区Ieice中国地区
Ieice中国地区
 
招待講演(鶴岡)
招待講演(鶴岡)招待講演(鶴岡)
招待講演(鶴岡)
 
最終講義
最終講義最終講義
最終講義
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

2012 mdsp pr07 bayes decision

  • 1. Course Calendar Class DATE Contents 1 Sep. 26 Course information & Course overview 2 Oct. 4 Bayes Estimation 3 〃 11 Classical Bayes Estimation - Kalman Filter - 4 〃 18 Simulation-based Bayesian Methods 5 〃 25 Modern Bayesian Estimation :Particle Filter 6 Nov. 1 HMM(Hidden Markov Model) Nov. 8 No Class 7 〃 15 Bayesian Decision 8 〃 29 Non parametric Approaches 9 Dec. 6 PCA(Principal Component Analysis) 10 〃 13 ICA(Independent Component Analysis) 11 〃 20 Applications of PCA and ICA 12 〃 27 Clustering, k-means et al. 13 Jan. 17 Other Topics 1 Kernel machine. 14 〃 22(Tue) Other Topics 2
  • 2. Lecture Plan Bayes Decision 1. Introduction 1.1 Pattern Recognition- 1.2 An Example Classification/Decision Theory 2. Bayes Decision Theory 2.1 Decision using Posterior Probability 2.2 Decision by Minimizing Risk 3. Discriminate Function 4. Gaussian Case
  • 3. 1. Introduction 3 1.1 Pattern Recognition The second part of this course is concerned about Pattern Recognition. Pattern recognitions (Machine Learning) want to give very high skills for sensing and taking actions as humans do according to what they observe. Definitions of Pattern Recognition appeared in books “The assignment of a physical object or event to one of several pre- specified categories” by Duda et al.[1] “The science that concerns the description or classification (recognition) of measurements” by Schalkoff (Wiley Online Library)
  • 4. Fish-Sorting Process Sea bass 鱸 Salmon 鮭 R.O. Duda, P.E. Hart, and D. G. Stork, “Pattern Classification”, John Wiley & Sons, 2nd edition, 2004
  • 5.     1 2 . : :feature vector in 2-d feature space : : action "Correct dicision " should be an appropriate function of data eg x lightness x width x          x x x 1.2 An Example (Duda, Hart, & Stork 2004) 5 Automatic Fish-Sorting Process action 1 belt conveyer action 2
  • 6. Typical pattern Recognition issues: ■ Classification ■ Regression ■ Clustering ■ Dimension Reduction (Visualization) Pattern Recognition System data Measurement Preprocessing Dimension Reduction Feature Selection Recognition Classification Model change Evaluation analysis results PCA (ICA) Clustering Cross- ValidationPDF estimation PDF: Probability Density Function
  • 7. 7 Classification/ Decision Theory Suppose we observe fish image data x, then we want to classify it to “sea bass” or “salmon” based on the joint probability distributions The classification problem is to answer “How do we make the best decision?”    p ," sea bass" , p ," salmon"x x x1 x2 Decision Boundary Classification: Assign input vector to one of two classes R2 R1
  • 8. Framework: - Two Category case (fish sorting example) - ■ State of nature (Class) ω (discrete random variable) ■ Prior Probability ■ Class-conditioned Probability (Likelihood) Measurement x : brightness of fish (scalar continuous variable) Class-conditional probability density function for each class: 1 2 : sea bass : salmon       2. Bayes’ Decision Theory         1 2 1 2 , where 1 P P P P              1 1 2 2 PDF for given that the state of nature is PDF for given that the state of nature is p x x p x x      
  • 10. 10 2.1 Decision Using Posterior Probability ■ Posterior Probabilities ■ Decision Rule (1) Minimizing error probability ■ Decision Rule (2) Likelihood ratio             the probability of being given that has been measuredDefine Bayes rule derives j j j j xjP x p x P P x p x                1 21 2 1 2 if > if < P x P x P x P x      Decide         11 1 2 22 if p x P Pp x       Decide independent of observation x (1) (2) (3)
  • 11. 11 Fig. 2 Decision (a) Posterior Probabilities (b) Likelihood ratio
  • 12. 12 Probability of Error ■ Error probability for a measurement x by decision ■ Average probability of error                               2 1 2 2 1 1 1 2 1 2 if we decide ( )2 1 1 if we decide ( )1 2 2 : P x P x P x P P x P P x x R P x x R P error xEx p x dx p x dx dx dx P error x p x dx P error x P error                         R R R R (4) (5) Fig. 3 P(error)
  • 13. 13 2.2 Decision by Minimizing Risk ■ Alternate Bayes Decision based on risk which defines “how much costly each action is ?” Suppose we observe x then take action according to make a decision (ωi) if the true state of nature is ωj , we introduce the loss function ■ Example of loss function From a medical image we want to classify (determine) whether it contains cancer tissues or not.  i j   i 1 2 1 2 cancer, normal, cancer, normal         cancer normal cancer 0 1 normal 100 0  i j   1 2 1 2 (6) Loss Function
  • 14. Expected Loss ■ Conditional risk is the expected loss if we take action for a measurement x. ■Action: = Deciding (i=12) ■Loss: ■Conditional Risks: ■The Overall Risk:          2 1 :i i j i j j j R x Ex P x            i i i  :ij i j                1 11 1 12 2 2 21 1 22 2 R x P x P x R x P x P x                    * minimization (minmum value R : Bayes Risk ) R R x x p x dx  (7) (8) (9) (10)
  • 15. 15 Minimum Risk Decision Rule (1)         1 21 2 1 2 if < if > R x R x R x R x      Decide             1 2 21 11 1 12 22 2 Here , < > R x R x P x P x           Minimum Risk Decision Rule (2)             1 1 12 22 2 21 11 12 2 if Otherwise decide threshold P x P PP x             Decide (11) (12) (13)
  • 17. 17 Minimum error probability decision =Minimizing the risk with zero-one loss function Zero-One Loss Function:         1 2 12 Likekihood ratio decision rule (13) becomes minimum error decision P x P PP x       Zero-One Loss Function:   0 if 0 1 , 1 if 1 0 i j ij i j i j                (14) (15)
  • 18. General Framework: ■ Finite set of states of nature (c Classes) : ■ Actions : ■ Loss: ■ Measurement:  1 2, , c   Generalization : d-dimensional vector (feature vector)x  1 2, , a        : 1,..., 1,...,ij i j i a j c     
  • 19. 19 3. Discriminant Function 19 Classifiers represented by discriminant functions : gi(x) i=1,…c max gi(x) g1(x) g2(x) gc(x) x2 …  where arg max i j j i g   x    Classifier minimizing the conditional risk: =i ig x R x               Minimizing error probability: = Alternate function: =ln ln i i i i i i i g x P x p x P g x p x P        xdx1 …input discriminant fnctions Classifier Network structure action
  • 20. 2020 ■ Single discriminant function: Two-category case         1 2 1 2 if 0 if 0 gives the decision boundary g x g x g x g x      Decide 4.Gaussian Case:                1 Multivariate Gaussian: , =ln ln 1 1 ln2 ln ln 2 2 2 i i i i i i T i i i i i p g x p x P d x x P               x       (17 ) (18) (16)     1 2=g x g x g x
  • 21. 21           1 1 1 1 1 1 = ln2 ln ln 2 2 2 1 1 1 ln ln 2 2 2 T i i i i i i T T T i i i i i i i i d g x x x P x x x P                                 0= T i i i ig x x  T x W x  1 0 1 1 ln ln 2 2 T i i i i i iP         Case (i=1,2) Boundary is given by a linear line i   1 2General Case Boundary is quadratic curves   decision boundary decision boundary (19) (20) 1 11 where , 2 i i i i i    W   
  • 22. 22 References: 1) R.O. Duda, P.E. Hart, and D. G. Stork, “Pattern Classification”, John Wiley & Sons, 2nd edition, 2004 2) C. M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006 3) E. Alpaydin, Introduction to Machine Learning, MIT Press, 2009 4) A. Huvarinen et. al., ”Independent Component Analysis” Wiley-Interscience 2001 Another action : Rejection No classification for lower degree of conviction case What next ? In the discussions so far all of the relevant probabilities are known, but this assumption will not be assured. Fukunaga’s definition of Pattern Recognition: “A problem of estimating density functions in a high–dimensional space and dividing the space into the regions of categories or classes”
  • 23. 23                   1 /2 1/2 1 1 1 1 , exp 22 is d-dimensional random vector : : : : Determinant of T d T d x x x x x E x Cov x E x x                           Appendix: Multivariable Gaussian Density Distribution