This document discusses using Gaussian process models for change point detection in atmospheric dispersion problems. It proposes using multiple kernels in a Gaussian process to model different regimes indicated by change points. A two-stage process is used to first estimate the change point (release time) and then estimate the source location. Simulation results show the approach outperforms existing techniques in estimating change points and source locations from concentration sensor measurements. The approach is applied to model real concentration data to estimate a CBRN release scenario.
Random Matrix Theory and Machine Learning - Part 1Fabian Pedregosa
ICML 2021 tutorial on random matrix theory and machine learning. Part 1 covers: 1. A brief history of Random Matrix Theory, 2. Classical Random Matrix Ensembles (basic building blocks)
New Mathematical Tools for the Financial SectorSSA KPI
AACIMP 2010 Summer School lecture by Gerhard Wilhelm Weber. "Applied Mathematics" stream. "Modern Operational Research and Its Mathematical Methods with a Focus on Financial Mathematics" course. Part 5.
More info at http://summerschool.ssa.org.ua
AACIMP 2010 Summer School lecture by Leonidas Sakalauskas. "Applied Mathematics" stream. "Stochastic Programming and Applications" course. Part 5.
More info at http://summerschool.ssa.org.ua
Random Matrix Theory and Machine Learning - Part 1Fabian Pedregosa
ICML 2021 tutorial on random matrix theory and machine learning. Part 1 covers: 1. A brief history of Random Matrix Theory, 2. Classical Random Matrix Ensembles (basic building blocks)
New Mathematical Tools for the Financial SectorSSA KPI
AACIMP 2010 Summer School lecture by Gerhard Wilhelm Weber. "Applied Mathematics" stream. "Modern Operational Research and Its Mathematical Methods with a Focus on Financial Mathematics" course. Part 5.
More info at http://summerschool.ssa.org.ua
AACIMP 2010 Summer School lecture by Leonidas Sakalauskas. "Applied Mathematics" stream. "Stochastic Programming and Applications" course. Part 5.
More info at http://summerschool.ssa.org.ua
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Beniamino Murgante
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov – National Centre for Geocomputation, National University of Ireland , Maynooth (Ireland)
Intelligent Analysis of Environmental Data (S4 ENVISA Workshop 2009)
"The Metropolis adjusted Langevin Algorithm
for log-concave probability measures in high
dimensions", talk by Andreas Elberle at the BigMC seminar, 9th June 2011, Paris
The standard Galerkin formulation of the acoustic wave propagation, governed by the Helmholtz partial differential equation (PDE), is indefinite for large wavenumbers. However, the Helmholtz PDE is in general not indefinite. The lack of coercivity (indefiniteness) is one of the major difficulties for approximation and simulation of heterogeneous media wave propagation models, including application to stochastic wave propagation Quasi Monte Carlo (QMC) analysis. We will present a new class of sign-definite continuous and discrete preconditioned FEM Helmholtz wave propagation models.
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Beniamino Murgante
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov – National Centre for Geocomputation, National University of Ireland , Maynooth (Ireland)
Intelligent Analysis of Environmental Data (S4 ENVISA Workshop 2009)
"The Metropolis adjusted Langevin Algorithm
for log-concave probability measures in high
dimensions", talk by Andreas Elberle at the BigMC seminar, 9th June 2011, Paris
The standard Galerkin formulation of the acoustic wave propagation, governed by the Helmholtz partial differential equation (PDE), is indefinite for large wavenumbers. However, the Helmholtz PDE is in general not indefinite. The lack of coercivity (indefiniteness) is one of the major difficulties for approximation and simulation of heterogeneous media wave propagation models, including application to stochastic wave propagation Quasi Monte Carlo (QMC) analysis. We will present a new class of sign-definite continuous and discrete preconditioned FEM Helmholtz wave propagation models.
1 factor vs.2 factor gaussian model for zero coupon bond pricing finalFinancial Algorithms
Financial Algorithms describes the comparison between and relevance of Gaussian one and two factor models in today's interest rate environments across US, European and Asian markets. Negative short rates seem to be the new norm of interest rate markets, especially in Euro-zone & somewhat in US , where poor demand and very low inflation dragging down interest rates in a negative zone. One and Two Factor Gaussian Models under Hull-White Setup can accommodate such scenarios and address the cases of curve steeping of longer end of the zero curve wherein short rates hover in negative zones.
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Social Network Analysis & an Introduction to ToolsPatti Anklam
This presentation was delivered as part of an intense knowledge management curriculum. It covers the basics of network analysis and then goes into the different types of tool that support analyzing networks.
This is the entrance exam paper for ISI MSQE Entrance Exam for the year 2010. Much more information on the ISI MSQE Entrance Exam and ISI MSQE Entrance preparation help available on http://crackdse.com
Cosmin Crucean: Perturbative QED on de Sitter Universe.SEENET-MTP
Lecture by dr Cosmin Crucean (Theoretical and Applied Physics, West University of Timisoara, Romania) on July 9, 2010 at the Faculty of Science and Mathematics, Nis, Serbia.
A crash coarse in stochastic Lyapunov theory for Markov processes (emphasis is on continuous time)
See also the survey for models in discrete time,
https://netfiles.uiuc.edu/meyn/www/spm_files/MarkovTutorial/MarkovTutorialUCSB2010.html
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
YSC 2013
1. Piecewise Gaussian Process Modelling for
Change-Point Detection
Application to Atmospheric Dispersion Problems
Adrien Ickowicz
CMIS
CSIRO
February 2013
2. Background
Scientic collaboration with the University College London, the
UNSW and Universite Lille 1.
Atmospheric specialists;
Informatics engineer;
Statisticians.
Input
Concentration value of CBRN material at sensors location;
Wind eld.
Output
Source location, time of release, strength for Fire-ghters;
Quarantine Map for Politicians and MoD.
3. Statistical Modelling
Observation modelling:
obs (i )
Yt j =
(i )
Dtj
i
(θ) + ζtj
Cθ (x , t )h(x , t |xi , tj )dxdt i
ζtj ∼ N (0, σ 2 )
Ω×T
where Cθ is the solution of the pde:
∂C
+u C − (K C) = Q (θ)
∂t
s.t. nC = 0 at ∂Ω
Parameter of interest: θ ∈ (Ω × T )
4. Existing Techniques
Source term estimation
The Optimization techniques.
Gradient-based methods
(Elbern et al [2000], Li and Niu [2005], Lushi and Stockie [2010])
Patern search methods
(Zheng et al [2008])
Genetic Algorithms
(Haupt [2005], Allen et al [2009])
The Bayesian techniques.
Forward modelling and MCMC
(Patwardhan and Small [1992])
Backward (Adjoint) modelling and MCMC
(Issartel et al [2002], Hourdin et al [2006], Yee [2010])
5. Contribution : Gaussian Process modelling
Overview
We consider several observations of a stochastic process in space
and time.
Idea: Bayesian non-parametric estimation.
Tool: Gaussian Process (Rasmussen [2006])
Joint distribution: y ∼ GP(m(x), κ(x, x ))
m ∈ L2 (Ω × T , R) is the prior mean function,
and κ ∈ L2 (Ω2 × T 2 , R) is the prior covariance function1
Posterior distribution: L y∗ |x∗ , x, y = N κ(x∗ , x)κ(x, x)−1 y,
κ(x∗ , x∗ ) − κ(x∗ , x)κ(x, x)−1 κ(x, x∗ )
1 the matrix K associated should be positive semidenite
6. Contribution : Gaussian Process modelling
On the Kernel Specication
A complex non parametric modelling needs to be very careful on kernel
shape and kernel hyper-parameters.
Basic Kernel: Isotropic, κ(x, x ) = α1 exp − 1
2α2
(x − x )2
Hyper-parameters: α1 , α2
3
3
3
2
2
2
1
1
1
0
0
0
−1
−1
−1
−2
−2
−2
Figure: Prediction of 3 Gaussian Process Models (and their according 0.95 CI) given 7
noisy observations. On the left, α2 = 0.1. In the middle, α2 = 2. On the right,
α2 = 1000.
7. Contribution : Gaussian Process modelling
Likelihood and Multiple Kernels
The hyper-parameters estimation is provided through the marginal
likelihood,
log p (y|x) = − 1 yT (K + σ 2 In )−1 y − 1 log |K + σ 2 In | − n log 2π
2 2 2
What if the best-tted kernel was,
κ(x, x ) = i
κi (x, x )1{x,x }∈
i
Figure: Synthetic two-phase signal.
8. Contribution : Gaussian Process modelling
Change-Point Estimation
A. Parametric Estimation
We assume that there exist βi such that,
(x , x ) ∈ Ωi ⇔ f (x , x , βi ) ≥ 0
and f is known. Then, θ = {(αi , βi )i }, and we have,
θ = argmax
ˆ log p (y|x)
θ
Limitations:
Knowledge of f
Dimension of the parameter space
Convexity of the marginal likelihood function
9. Contribution : Gaussian Process modelling
Change-Point Estimation
B. Adaptive Estimation (1)
Let XkNN ∩Br (i ) the sequence of observations associated with xi ,
XkNN ∩Br (i ) = xj |{xj ∈ Bir } ∩ {dji ≤ d(ik ) }
k is the number of neighbours to be considered,
r is the limiting radius.
Justication:
Avoid the lack of observations
Equivalent number of observations for each estimator
Avoid the hyper-parametrization of the likelihood
10. Contribution : Gaussian Process modelling
Change-Point Estimation
B. Adaptive Estimation (2)
Let xI = XkNN ∩Br (i ) and yI be the corresponding observations.
αi = argmax
ˆ log p (yI |xI )
α
Idea 1: Idea 2:
Cluster on αi
ˆ Build the Gram matrices Ki = κ(xI , αi )
ˆ
xi xi
Let Λxi = {λ1 . . . λn } be the eigenvalues of
but what if dim(ˆ i ) ≥ 2 ?
α Ki
Cluster on µi = max{Λxi }
11. Contribution : Gaussian Process modelling
Simulation Results
Figure: Gaussian Process prediction with 1 classical isotropic kernel (green), 2 isotropic kernels with eigenvalue-based
change point estimation (yellow), hyper-parameter-based change point estimation (purple) and parametric estimation (blue).
50 50
45 45
40 40
35 35
30 30
25 25
20 20
15 15
10 10
5 5
0 0
0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 20 25 30 35 40 45 50
Figure: Mean of the Gaussian Process for the two-dimensional scenario. On the left, the mean is calculated with only one
kernel. On the right, the mean is calculated with two kernels.
12. Contribution : Gaussian Process modelling
Simulation Results
10
Evolution of the Root MSE of the
Change-point Estimation when the
8
number of observations increase
RMSE
6
from 20 to 100, in the 1D case.
4
MMLE
2
JD
0
10 20 30 40 50
MEV
Ns
Methods:
2D 2D-donut 3D
Parametric JD 0.834 (0.0034) 0.763 (0.0015) 0.666 (0.0016)
-MMLE,
approach MEV 0.825 (0.0053) 0.817 (0.0021) 0.643 (0.0014)
-MEV, EigenValue MMLE 0.858 (0.0025) 0.806 (0.0008) 0.666 (0.0002)
approach
-JD, Est. approach Table: The number of obs. is equal to 10d , where d is the dimension of the problem. 1000
simulations are provided. The variance is specied under brackets.
13. Contribution : Gaussian Process modelling
Application to the Concentration Measurements
We may consider the concentration measurements as observations
of a stochastic process in space and time.
Idea: Apply the dened approach to estimate t0 .
Prior distribution: C ∼ GP(m, κ)
m ∈ L2 (Ω × T , R) is the prior mean function,
and κ ∈ L2 (Ω2 × T 2 , R) is the prior covariance function2
Posterior distribution: C|Y ,m=0 ∼ GP(κx ∗ x κ−1 Y , κx ∗ x ∗ − κx ∗ x κ−1 κxx ∗ )
xx xx
2 the matrix K associated should be positive semidenite
14. Contribution : Gaussian Process modelling
Kernel Specication
Isotropic Kernel Drif-dependant Kernel
x
˙ = u (x , t )
1 x−x 2 x (t 0 ) = x0
κiso x, x = exp −
α β2
sx0 ,t0 (t ) is the solution of this system.
where α and β are hyper-parameters.
1 ds (x, x )
κdyn x, x = exp −
σ(t , t ) 2σ(t , t )2
where we have:
ds (x, x ) = (x − sx ,t (t ))2 + (x − sx ,t (t ))2
σ(t , t ) = α × (|t0 − min(t , t )| + 1)β
Consider the inuence of the wind eld
Consider the time-decreasing correlation
Consider the evolution of the process
15. Contribution : Gaussian Process modelling
Two Stage estimation process: Instant of Release
The proposed kernel is then complex:
κf = κiso 1{t ,t t } + κdyn 1{t ,t ≥t }
The likelihood is not convex.
0 0
t0 has to be estimated separately.
Maximum Likelihood Estimation of
Hyperparameters
Method: Exhaustive research of t0 .
Calculation of the trace of the Gram
matrix.
ˆ tr = argmax tr (K (t ))
t0
t ∈T
16. Contribution : Gaussian Process modelling
Two Stage estimation process: Source location
Given the time of release, we can Estimation of the source location. Comparison between the
calculate the location estimation. estimators (5, 20 and 50 sensors). Target is x0 = 115, y0 = 10.
x0
ˆ y0
ˆ σ(x0 )
ˆ σ(y0 )
ˆ
x0
ˆ = argmax E[C|Y ,m=0 (x , tˆ )]
0 κiso 5 68.97 62.58 42.82 38.96
x ∈Ω
20 97.13 26.37 27.64 26.08
= argmax κx ∗ x κ−1 Y
˜ ˜ xx
50 104.47 21.60 28.94 19.47
x ∈Ω
κf 5 108.94 12.21 42.00 17.05
where κ = κ(., tˆ )
˜ 0 20 120.28 8.28 12.50 4.64
50 114.51 9.48 6.37 3.07
17. Contribution : Gaussian Process modelling
Zero-Inated Poisson and Dirichlet Process3
We can also consider the concentration as a count of particles.
Y ∼ ZIP (p , λ)
p ∼ DP (H , α) log λ ∼ GP (m, κ)
which then dene the mixture distribution,
−λxt
e k
Pr (Y = k |p , λ) = pxt 1{Y =0} + (1 − pxt ) λxt 1{Y =k }
k!
k
Major Issue: the tractability of the likelihood calculation relies on the distribution of
both p and λ.
3 Joint work with Dr. G .Peters and Dr. I. Nevat
18. Contribution : Bibliography
A. Ickowicz, F. Septier, P. Armand, Adaptive Algorithms for the
Estimation of Source Term in a Complex Atmospheric Release.
Submitted to Atmospheric Environment Journal
A. Ickowicz, F. Septier, P. Armand, Estimating a CBRN atmospheric
release in a complex environment using Gaussian Processes.
15th international conference on information fusion, Singapore, Singapore,
July 2012
F. Septier, A. Ickowicz, P. Armand, Methodes de Monte-Carlo adaptatives
pour la caractérisation de termes de sources.
Technical report, CEA, EOTP A-54300-05-07-AW-26, Mar. 2012
A. Ickowicz, F. Septier, P. Armand, Statistic Estimation for Particle
Clouds with Lagrangian Stochastic Algorithms.
Technical report, CEA, EOTP A-24300-01-01-AW-20, Nov. 2011