This document proposes an enhanced accuracy metric called eTaPR for evaluating anomaly detection methods on time-series data. It addresses limitations of precision and recall for time-series by considering that anomalies and predictions are represented as ranges rather than single points. The key ideas are (1) scoring anomalies based on the portion detected, (2) scoring predictions based on the portion identifying anomalies correctly, and (3) only scoring matches between complete anomaly and prediction ranges. The proposed metrics are enhanced time-series recall (eTaR), precision (eTaP) and the harmonic mean F1 score.
Simple math for anomaly detection toufic boubez - metafor software - monito...tboubez
This is my presentation at Monitorama PDX in Portland on May 5, 2014
Simple math to get some signal out of your noisy sea of data
You’ve instrumented your system and application to the hilt. You can now “measure all the things”. Your team has set up thousands of metrics collecting millions of data points a day. Now what?
Most IT ops teams only keep an eye on a small fraction of the metrics they collect because analyzing this mountain of data and extracting signal from the noise is not easy. The choice of what analytic method to use ranges from simple statistical analysis to sophisticated machine learning techniques. And one algorithm doesn’t fit all data.
Progress in AI and its application to Asset Management.pptxDerryn Knife
A presentation providing a case for the applicability of recent developments in AI, applied in medicine, to asset management. The particular example discussed is the prediction of machine failure.
Tutorial for beginning graduate students. Basic exploration of multivariate experimental data can be done with freely downloadable software. We also discuss the use of Excel because it is commonly in use.
Simple math for anomaly detection toufic boubez - metafor software - monito...tboubez
This is my presentation at Monitorama PDX in Portland on May 5, 2014
Simple math to get some signal out of your noisy sea of data
You’ve instrumented your system and application to the hilt. You can now “measure all the things”. Your team has set up thousands of metrics collecting millions of data points a day. Now what?
Most IT ops teams only keep an eye on a small fraction of the metrics they collect because analyzing this mountain of data and extracting signal from the noise is not easy. The choice of what analytic method to use ranges from simple statistical analysis to sophisticated machine learning techniques. And one algorithm doesn’t fit all data.
Progress in AI and its application to Asset Management.pptxDerryn Knife
A presentation providing a case for the applicability of recent developments in AI, applied in medicine, to asset management. The particular example discussed is the prediction of machine failure.
Tutorial for beginning graduate students. Basic exploration of multivariate experimental data can be done with freely downloadable software. We also discuss the use of Excel because it is commonly in use.
ARIMA Model for analysis of time series data.pptREFOTDEBuea
Applying the classical linear regression approach to time series data seriously violates one of the key assumptions, known as uncorrelated error terms. Therefore, there is a need for appropriate statistical tools to model these types of data. ARIMA.
Talk of Ali Mousavi "Event-Modelling An Engineering Solution for Control and Analysis of Complex Systems" at 116th regular meeting of INCOSE Russian chapter, 14-Sep-2016
Bayesian Autoencoders for anomaly detection in industrial environmentsBang Xiang Yong
Seminar for Manufacturing Analytics Group on my PhD thesis : Bayesian autoencoders
Three main contributions are:
1. Probabilistic formulation of autoencoder focusing on likelihood and the need for bottleneck.
2. Uncertainty quantification for anomaly detection
3. Explainability for anomaly detection
Our GOAL
해외에는 이런 데이터 경쟁 플랫폼이 있습니다. 한국에는 없죠. 국내 공공기관 또는 개별 기업들이 스팟성으로 불투명한 대회를 벗어나 지속적으로 대회를 운영하는 플랫폼이 있으면 좋겠다고 생각했습니다. 우리는 지금 Fintech 기업들과 함께 금융 데이터와 상금을 제공하며, 데이터 과학자 와 데이터 엔지니어링을 포함하는 데이터 대회를 운영합니다.
There are these data competition platforms overseas, but in Korea, Domestic public organizations or individual companies are out of the opaque temporary contest I wanted to have a platform that consistently runs the competition. We now provide financial data and cash prizes with Fintech companies, we run the Data Competition included in Data Engineer and Data Scientists.
ARIMA Model for analysis of time series data.pptREFOTDEBuea
Applying the classical linear regression approach to time series data seriously violates one of the key assumptions, known as uncorrelated error terms. Therefore, there is a need for appropriate statistical tools to model these types of data. ARIMA.
Talk of Ali Mousavi "Event-Modelling An Engineering Solution for Control and Analysis of Complex Systems" at 116th regular meeting of INCOSE Russian chapter, 14-Sep-2016
Bayesian Autoencoders for anomaly detection in industrial environmentsBang Xiang Yong
Seminar for Manufacturing Analytics Group on my PhD thesis : Bayesian autoencoders
Three main contributions are:
1. Probabilistic formulation of autoencoder focusing on likelihood and the need for bottleneck.
2. Uncertainty quantification for anomaly detection
3. Explainability for anomaly detection
Our GOAL
해외에는 이런 데이터 경쟁 플랫폼이 있습니다. 한국에는 없죠. 국내 공공기관 또는 개별 기업들이 스팟성으로 불투명한 대회를 벗어나 지속적으로 대회를 운영하는 플랫폼이 있으면 좋겠다고 생각했습니다. 우리는 지금 Fintech 기업들과 함께 금융 데이터와 상금을 제공하며, 데이터 과학자 와 데이터 엔지니어링을 포함하는 데이터 대회를 운영합니다.
There are these data competition platforms overseas, but in Korea, Domestic public organizations or individual companies are out of the opaque temporary contest I wanted to have a platform that consistently runs the competition. We now provide financial data and cash prizes with Fintech companies, we run the Data Competition included in Data Engineer and Data Scientists.
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Sérgio Sacani
We characterize the earliest galaxy population in the JADES Origins Field (JOF), the deepest
imaging field observed with JWST. We make use of the ancillary Hubble optical images (5 filters
spanning 0.4−0.9µm) and novel JWST images with 14 filters spanning 0.8−5µm, including 7 mediumband filters, and reaching total exposure times of up to 46 hours per filter. We combine all our data
at > 2.3µm to construct an ultradeep image, reaching as deep as ≈ 31.4 AB mag in the stack and
30.3-31.0 AB mag (5σ, r = 0.1” circular aperture) in individual filters. We measure photometric
redshifts and use robust selection criteria to identify a sample of eight galaxy candidates at redshifts
z = 11.5 − 15. These objects show compact half-light radii of R1/2 ∼ 50 − 200pc, stellar masses of
M⋆ ∼ 107−108M⊙, and star-formation rates of SFR ∼ 0.1−1 M⊙ yr−1
. Our search finds no candidates
at 15 < z < 20, placing upper limits at these redshifts. We develop a forward modeling approach to
infer the properties of the evolving luminosity function without binning in redshift or luminosity that
marginalizes over the photometric redshift uncertainty of our candidate galaxies and incorporates the
impact of non-detections. We find a z = 12 luminosity function in good agreement with prior results,
and that the luminosity function normalization and UV luminosity density decline by a factor of ∼ 2.5
from z = 12 to z = 14. We discuss the possible implications of our results in the context of theoretical
models for evolution of the dark matter halo mass function.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
1. Enhanced TaPR (eTaPR)
Accuracy Metric for Anomaly Detection
on Time-Series Data
2021. 8. 12.
Won-Seok Hwang
hws23@nsr.re.kr
2. Accuracy Evaluation on Non Time-Series Data
• Evaluation setting
– Learning a detection method with training dataset
– Detecting “anomalies” from test dataset
• Many anomalies included in the test dataset
• Detection method generates “predictions” that point out the anomalies
• Accuracy of detection
– Portion of detected anomalies to the whole anomalies (i.e., recall)
– Portion of correct predictions to the whole predictions (i.e., precision)
2021-08-12 2
3. Necessity of Accuracy Metric for Time-Series Data
• For non time-series data (e.g., binary classification or information retrieval)
– An anomaly or a prediction is always evaluated as two cases only
• An anomaly can be (1) detected or (2) not
• A prediction can be (1) correct or (2) not
• For time-series data
– Only a part of an anomaly can be detected
– Only a part of a prediction can be correct
– Because an anomaly or a prediction is represented as a range in time-series data
2021-08-12 3
4. Characteristic of Anomaly in Time-Series Data
• Reason why an anomaly is a range in time-series data
– An anomalous event (e.g., an incident or a fraud) causes a series of values whose pattern are similar
– It is more reasonable to regard the above-mentioned series of values as a single anomaly
• Reason why a prediction is a range
– A human operator recognizes that a series of predictions as a single prediction that indicates a range
2021-08-12 4
Time
1 9 9 9 9 9 …
An intrusion event (anomaly)
2 1 2 1 2 1 2 1 2 1
An observed value at 𝑡1
Regarding the range (𝑡7 - 𝑡11) as an anomaly
𝑡1 𝑡7 𝑡11
5. Evaluation by Comparing Ranges (Idea 1)
• Case of detecting a part of an anomaly
– Evaluating how much each anomaly is likely to be detected (Idea 1)
• If a person understands more than a certain portion of an anomaly, s/he can find its whole range
– Because the operator tries to find an anomaly by analyzing a given prediction
– Anomalies 𝑎2 and 𝑎3 are likely to be detected in the below figure.
– Giving non-zero score to those anomalies whose more than a certain portion is detected
• Given parameter (𝜃𝑟) determines the above-mentioned portion
• As an operator understands more portion of an anomaly, s/he is more likely to detect its whole range
– 𝑎3 is detected more easily than 𝑎2
– Giving the anomaly a score proportional to its detected portion
2021-08-12 5
𝑎1 𝑎2 𝑎3
𝑝1 𝑝2 𝑝3
A prediction range
An anomaly range Time
Hard to be detect Likely to be detect More likely to be detect
6. Evaluation by Comparing Ranges (Idea 2)
• Case of a part of prediction is correct
– Evaluating how much each prediction is likely to be useful for the detection (Idea 2)
• A prediction that identifies more than a certain portion of anomalies is useful for a person
– A person would analyze the whole range of a prediction although its some part incorrectly identifies
normal range
– 𝑝2 and 𝑝3 is useful to detect anomalies in the below figure
– Giving non-zero scores to those predictions whose a certain portion correctly identifies anomalies
• Given parameter (𝜃𝑝) determines the above-mentioned portion
• As a prediction identifies more portion of an anomaly, the prediction is more useful for the detection
– 𝑝3 is more useful than 𝑝2
– Giving the prediction a score proportional to its portion identifying anomalies correctly
2021-08-12 6
𝑎1 𝑎2 𝑎3
𝑝1 𝑝2 𝑝3
A prediction range
Time
An anomaly range
Useless to detect Useful to detect More useful to be detect
7. Evaluation by Comparing Ranges (Idea 3)
• Evaluation on the detection failure case
– Only the detection success cases should get non-zero score
– Considering Ideas 1 and 2, the detection failure cases also get non-zero score
• A prediction is evaluated as being useful even though it identifies no anomaly (see 𝑝1 and 𝑎1)
• An anomaly is evaluated as being detected even though no prediction identifies it (see 𝑝2 and 𝑎2)
• Success of detection depends on both of predictions and anomalies (Idea 3)
– When anomalies and predictions are not range, this idea is of no use to consider
• If a prediction identifies an anomaly, of course, there is always one detected anomaly
2021-08-12 7
𝑎1 𝑎2
𝑝1 𝑝2
Time
𝑝1 detects no anomalies because it identifies too small portion
(not enough information) of 𝑎1 to understand 𝑎1.
𝑝1 seems to be useful when considering Idea 2 only
Most portion of 𝑝2 fails to identify any anomalies,
so it is very hard to detect 𝑎2 with 𝑝2.
𝑎2 seems to be detected when consider Idea 1 only
8. • A lengthy incorrect prediction penalizes more than a short incorrect one (Idea 4)
– A person has to spend time proportional to the prediction to check anomalies occurrence
• A lengthy incorrect prediction requires more personal effort
• On the other hand, we do not consider the length of anomalies
– For instance, a length of cyber attack is unrelated with its effect
2021-08-12 8
Evaluation by Comparing Ranges (Idea 4)
9. Proposed Accuracy Metric
• Enhanced Time-series aware Recall (eTaR)
– Average possibility that all anomalies in the test dataset are detected
– Based on Ideas 1 and 3
• Enhanced Time-series aware Precision (eTaP)
– Average usefulness of all prediction produced by a detection method
– Based on Ideas 2, 3, and 4
• eTaF1
– An harmonic average of eTaP and eTaR
– Your rank is determined by eTaF1!!!
2021-08-12 9
10. • To understand Ideas 1 and 2, see the paper bellows:
– W.-Hwang et al. “Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of
Detection Result and Addressing Ambiguous Labeling,” In Proc. of CIKM, pp. 2241-2244, 2019.
• eTaPR is an enhanced version by employing Ideas 3 and 4
2021-08-12 10
Reference
11. How to use
• Installation
– Command: python -m pip install eTaPR-[version]-py3-none-any.whl
• Execution
– TaPR_pkg.etapr.evaluate_haicon(anomalies: list, predictions: list) -> dict
• anomalies
– A list including 0 or 1
– 0 indicates normal while 1 does anomaly
• predictions
– A list including 0 or 1
– 0 indicates that your prediction is normal while 1 that your prediction is anomaly
• Returned dictionary including ‘tar’, ‘tap’, and ‘f1’
– e.g.:
result = TaPR_pkg.etapr.evaluate_haicon(anomalies_list, predictions_list)
result[‘tar’], result[‘tap’], result[‘f1’]
2021-08-12 11
12. • Precision and recall are the most well-known accuracy metrics
• They fail to evaluate the variety of detected anomalies
– Method 2 gets higher score than Method 1 even though it detects only 𝑎1
2021-08-12 12
Appendix: Why We Do Not Consider Precision and Recall
Method
Metric
Precision Recall
1 0.67 0.40
2 1.00 0.67