IN a biometric identification system, it is often the case that

Size: px
Start display at page:

Download "IN a biometric identification system, it is often the case that"

Transcription

1 220 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 The Biometric Menagerie Neil Yager and Ted Dunstone, Member, IEEE Abstract It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user s genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed. Index Terms Biometrics, performance evaluation, authentication, identification, recognition, fingerprint, face, speech, iris, keystroke dynamics. Ç 1 INTRODUCTION IN a biometric identification system, it is often the case that users do not perform consistently well in terms of false match rates (FMR) and false nonmatch rates (FNMR). Where this occurs, researchers and system integrators are interested in identifying the groups of users who are performing poorly as they may be causing a disproportionate number of verification errors. An analysis of these people and their common properties can expose fundamental weaknesses in a biometric system, and by targeting these weaknesses one may be able to develop more robust biometric systems [1]. Several problem user groups have been characterized and are familiar to biometric researchers and practitioners. These groups have been given animals names that analogously reflect their behavior. The concept of the biometric menagerie was formalized by Doddington et al. [2], and its original members are as follows:. Sheep: Sheep make up the majority of the population of a biometric system. On average, they tend to match well against themselves and poorly against others.. Goats: Goats are subjects who are difficult to match. They are characterized by consistently low match scores against themselves and may be involved in false rejects.. Lambs: Lambs are vulnerable to impersonation. When being matched against, they result in relatively high match scores, leading to potential false accepts.. Wolves: Wolves are exceptionally successful at impersonation and prey upon lambs. When matched against enrolled users, they receive relatively high. The authors are with Biometix Pty Ltd, Suite 145, National Innovation Centre, Australian Technology Park, Eveleigh, NSW 1430, Australia. {neil, ted}@biometix.com. Manuscript received 4 Dec. 2007; revised 7 July 2008; accepted 13 Nov. 2008; published online 3 Dec Recommended for acceptance by P.J. Phillips. For information on obtaining reprints of this article, please send to: tpami@computer.org, and reference IEEECS Log Number TPAMI Digital Object Identifier no /TPAMI match scores. In some systems, wolves may cause a disproportionate number of the system s false accepts. For any biometric system, the distribution of match scores will naturally vary across a range of results, and it is expected that there will be some genuine matches with low scores and some impostor matches with high scores. However, a few isolated incidences of failed verifications does not warrant labeling a user a goat, lamb, or wolf. Of interest to biometric system designers are users who consistently receive poor scores, outside of what would be expected from random variation. In other words, the score distributions for these problem user groups (goats, lambs, and wolves) are fundamentally different from the distributions of the general population (sheep). Doddington et al. use a variety of tests to demonstrate that the animals defined above exist to a statistically significant degree in their biometric system [2]. The study by Doddington et al. was conducted on speaker verification data. However, the same concepts are applicable to all areas of biometric identification. Several subsequent studies have discovered the existence of the animals in other biometrics. Wayman [3] demonstrates the presence of lambs and wolves in a fingerprint-based data set with a high degree of certainty. Wittman et al. [4] examine face recognition, and find evidence for the existence of goats, wolves, and lambs in their data. Quantitative methods for dealing with the existence of user variation is an active area of research. There are three primary user-specific schemes under investigation [5]: userspecific thresholds, which assign a different decision threshold to each user or template [6]; score normalization, which transforms the score distributions for each user or template to a standard form [7], [8]; and user-specific fusion, that takes into account the score distribution for each user or template when combining scores obtained from different base systems [5], [9]. The papers listed above have established the existence of goats, lambs, and wolves in several specific biometric applications, and presented methods for dealing with their /10/$26.00 ß 2010 IEEE Published by the IEEE Computer Society

2 YAGER AND DUNSTONE: THE BIOMETRIC MENAGERIE 221 existence. A natural question regards the relationship between these user groups. For example, if a user is known to be a lamb, does that make him or her more likely to be a goat? Doddington et al. [2] report a positive correlation between lambs and wolves in their study. This relationship is not surprising as it reflects a symmetry of the matching algorithm. Wittman et al. [4] demonstrate a relationship between goats and wolves. A recent study by Yager and Dunstone [10] has noted that the traditional biometric animals are based on only genuine match scores (low for goats) or impostor match scores (high for lambs and wolves). A new class of animals can be defined in terms of a relationship between genuine and impostor scores. The animals are called worms, chameleons, phantoms, and doves, and have combinations of low/high and genuine/impostor match scores. Formal definitions for the new animals are established in this study, as well as a test for their existence. An extensive investigation across a broad range of biometric modalities is conducted, and examples of systems containing the new animals are presented. The implication and interpretation of the existence of the animals is discussed, laying the foundations for a new user and group-centric approach to the evaluation of biometric systems. The remainder of the paper is organized as follows: In Section 2, a precise definition of each member of the biometric menagerie is presented. This is followed by experiments in Section 3 with the aim of hunting for the proposed user types in real biometric data. Section 4 contains case studies from fingerprint verification, face recognition, and iris recognition that investigate the causes of the user groups. Finally, the paper concludes with a summary of findings, and potential directions for future research in Section 5. 2 THE BIOMETRIC MENAGERIE This section contains definitions for each denizen of the biometric menagerie. The notation that will be used for the remainder of the paper is established in Section 2.1. Section 2.2 contains a discussion on various ways one might characterize a user s performance within a biometric system. Goats, lambs, and wolves are formally defined in Section 2.3, as well as the statistical tests for their existence. The new additions to the menagerie are presented in Section Notation Consider a user population P and a set of match scores S. For each pair of users j; k 2P there is a set Sðj; kþ S containing the verification results obtained by matching one of j s samples against an enrollment template belonging to k. User k s genuine scores are represented by the set G k ¼ Sðk; kþ, and k s impostor scores are the set I k ¼ Sðj; kþ[sðk; jþ for all j 6¼ k. A probability density function f S ðjj; kþ is the distribution of match scores obtained by matching samples from j against templates from k. A zoo plot is a diagram that displays each user s performance in relation to the whole population. 2.2 User Performance Statistics In order to proceed, it is necessary to define a statistic that quantifies a user s performance within a biometric system. Each user k should be assigned two values: one indicating how well they match against themselves (g k ) and one indicating how well they match against others (i k ). In general, any well-defined measure of performance may be used; the choice will depend on the type of biometric system under evaluation and the goal of the analysis. A few possibilities follow:. Error counts: Users can be assigned a statistic based on their actual number of verification errors within a system. Their genuine performance is based on a tabulation of their false rejects, and their impostor score is based on their number false accepts. There are two disadvantages of this approach. First, the result is dependent on a specific match score threshold. Second, for systems with very high accuracy rates it is likely that a majority of users are not involved in any match errors. When no errors occur, this approach has no ability to distinguish between the performance of individual users.. Ranks: For identification systems, the most relevant performance measure is how often a user is returned among the top N ranked results.. Maximum and minimum scores: Wittman et al. [4] base a user statistic for identification systems on maximum and minimum match scores. For example, the wolf score is obtained by selecting the top impostor match score for each of a user s probes. Their wolf statistic is the average of these top probe impostor scores. The main disadvantage of this approach is that it is strongly influenced by outlier scores.. Mean scores: If we consider a user s genuine and impostor scores to be real-valued random variables, the distributions can be characterized by the expected value, which is the central moment or mean of the distributions: g k ¼ G k and i k ¼ I k.ifa user is receiving a lot of low genuine match scores, G k will be relatively low, indicating that the user is more likely to have trouble with the biometric system. Conversely, a lot of high impostor scores will lead to a relatively high I k. The advantages of this measure are that it is intuitive, robust to outliers, and places minimal restrictions on the system error rates and structure of the match score data. The primary disadvantage of this approach is that there is not necessarily a direct relationship between a user s mean score values and their participation in system errors. This is a link that must be established experimentally in order to justify the use of central tendencies (see Section 3.2). 2.3 Goats, Lambs, and Wolves Goats Intuitively, goats are users who are difficult to match, and are characterized by having low genuine match scores. For a goat, their genuine match score distribution is significantly different (lower) from those of the general population. Goats, like the other animals, do not necessarily represent a distinct, mutually exclusive subgroup of users [2], [3]. In fact, it is possible that they do not even exist in a particular system. The concept of goats is better thought of

3 222 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 as a continuum, with users showing a varying degree of goat-like behavior Lambs and Wolves Lambs, on average, tend to produce high match scores when being matched against by another user. Similarly, wolves receive high scores when matching against others. For both of these user groups, the match score distributions are significantly different (higher) than those of the general population. The definitions of lambs and wolves are symmetric. For lambs, the person of interest is being matched against (i.e., is enrolled in the system, or belongs to the gallery). For wolves, the person of interest is being matched against others (i.e., is being authenticated, or is a probe). For most of our test sets there is no difference between the way verification data and enrollment data are gathered, and the tests are comprised of cross-matches of all available data. Therefore, the two lambs and wolves are equivalent and will be treated as such. However, for most real-world applications, there is a significant difference between the samples for verification and enrollment are collected, so it is appropriate to maintain the distinction between lambs and wolves. As with goats, there are not necessarily distinct lamb and wolf populations. Rather, users will display varying degrees of lamb-like and wolfish behavior Existence Test The definitions presented above do not label particular users as belonging to an animal group. The definitions, in essence, simply state that match score distributions are user dependent. Once this fact is established, it follows that some users are performing better than others. In this way, the presence of the animals is established without explicitly labeling users. Hypothesis testing is used to demonstrate user dependent match score distributions. In Doddington et al. [2], the null hypothesis is formulated as follows: Tthe density function f S ðjk; kþ does not depend on k. In other words, there are no significant differences between the distributions for individual users. The authors show that the null hypothesis was rejected at the 0.01 significance level using both the F-Test (analysis of variance) and the Kruskal- Wallis test. In general, the F-Test is not an appropriate method of hypothesis testing for biometric data due to its implicit assumption of normality. A cursory visual examination of the score distributions for the data sets presented in Section 3.1 suggests that few of the distributions even approximate normality. Therefore, nonparametric approaches should be used where possible. One-way analysis of variance (ANOVA) is a method for testing for differences between independent distributions. Like the F-Test, ANOVA has an implicit assumption of normality. The Kruskal-Wallis test is similar to ANOVA except that scores are replaced by ranks [11], thereby relaxing the assumption of normality. Therefore, the Kruskal-Wallis test is the method employed for this study. However, one limitation of the Kruskal-Wallis test is that it requires at least five random samples from each distribution. The existence test for lambs and wolves is the same as for goats, except that impostor score distributions are used in place of genuine score distributions. The null hypothesis is that f S ðjj; kþ does not depend on j or k. Once again, the Kruskal-Wallis method is used to test the null hypothesis. If the null hypothesis is rejected at the 0.05 significance level, the animal groups are said to exist. 2.4 Worms, Chameleons, Phantoms, and Doves Goats, lambs, and wolves were defined in terms of a user s genuine or impostor match scores. The new animals differ in that they are defined in terms of a relationship between genuine and impostor match scores. Unlike goats, lambs, and wolves, the specific users who belong to the new animals groups will be identified. The existence test is based on whether or not there are more or less members of an animal group than expected. Let G be the set of average genuine performance measures for all users: G¼f[ k2p g k g. Rank all users k 2P by increasing genuine performance statistic values g k. Let G H Pbe the users whose corresponding scores are among the top 25 percent of G. In other words, G H is the 25 percent of users with the highest genuine statistics. Let G L P be the 25 percent of users with the lowest genuine statistics. Similarly, let I¼f[ k2p i k g, and I H Pbe the 25 percent of users with the highest impostor statistics, and I L Pbe the 25 percent of users with the lowest impostor statistics Chameleons Intuitively, chameleons always appear similar to others, receiving high match scores for all verifications. Chameleons are users in the set G H \I H. Chameleons rarely cause false rejects, but are likely to cause false accepts. An example of a user who may be a chameleon is someone who has very generic features that are weighted heavily by the matching algorithm. In this case, he or she would receive both high genuine and impostor match scores. The term chameleon has been proposed by Bolle et al. [12]; however, their definition differs from the one presented. In their case, users are chameleons when match scores are symmetric, causing lambs to be wolves and vice versa. The key distinction is that the proposed definition takes both genuine match scores and impostor scores into account Phantoms Phantoms belong to the set G L \I L. Phantoms lead to low match scores regardless of who they are being matched against; themselves or others Doves Doves are the best possible users in biometric systems. They are defined by the set G H \I L. They are pure and recognizable, matching well against themselves and poorly against others Worms Worms are the worst conceivable users of a biometric system, and belong to the set G L \I H. If present, worms are the cause of a disproportionate number of a system s errors.

4 YAGER AND DUNSTONE: THE BIOMETRIC MENAGERIE Existence Test Each user group is defined in terms of a relationship between genuine and impostor match scores. For example, chameleons are users who tend to have high genuine match scores and high impostor match scores. Since the definitions are based on ranks and quartiles, the expected number of animals for each user type is p jpj, where p ¼ð1=4Þ 2.In other words, each user group should contain approximately 1=16th of the total user population. This is under the assumption that membership in G H or G L and I H or I L are independent. However, if there is a relationship between genuine and impostor performance, this need not be the case. A chameleon population will be indicated by an unusually large number of members of the combined set of high genuine and high impostor performances (i.e., jg H \I H j1=16 jpj). The null hypothesis is that a user s genuine and impostor performance statistics are independent, and therefore there are approximately 1=16th of the population belonging to each user type. Assume that we are interested in the set of chameleons C (the analysis is the same for all user types). Let c be the number of chameleons, c ¼jCj. The null hypothesis states that the probability of a particular person being a chameleon is p ¼ 1=16. Since each user is independent, this is a binomial experiment with n ¼jPjtrials. The hypothesis is two sided and nondirectional. Assume that the number of observed chameleons is greater than the expected number. In order to test the null hypothesis, we calculate the probability of there being c chameleons. This probability can be calculated using the binomial distribution: fðc; n; pþ ¼ Xn n p i ð1 pþ n i : ð1þ i i¼c For large values of n, the binomial distribution can be approximated using a normal distribution with the expected value np and variance npð1 pþ. Assume our desired confidence level is. The null hypothesis is rejected if fðc; n; pþ <. For our experiments ¼ 0:05. Since the test is two tailed, a symmetric argument applies if the observed number of chameleons is less than the expected number. This allows for two possibilities: The null hypothesis will be rejected if there is a significantly low or significantly high number of chameleons. In other words, we can test for a significant absence or presence of the user groups. This method of hypothesis testing is nonparametric and has low computational overhead. Fig. 1 contains the zoo plot, which illustrates where all of the animals reside and their relation to each other. Note the relationship between the new animals and the original animals. The existence of the original animals is not assumed, but when they do exist there is some overlap between the groups. For example, worms are both goats and lambs/wolves. 3 EXPERIMENTS There is no a priori reason to assume a relationship between a user s genuine and impostor performance. If a user matches well against himself or herself, this does not necessary imply any information about how well they will match against Fig. 1. The relationship between genuine and impostor performance and the biometric menagerie. others. Therefore, a series of tests are necessary in order to investigate if any of the proposed animals exist in real biometric data. Experiments will be performed on a variety of data sets, as outlined in Section 3.1. An investigation into the use of mean scores as user performance measures is conducted in Section 3.2. The existence results for the animals are presented in Section 3.3. All experiments are conducted using P erformix, a tool for the statistical analysis and management of biometric data [13]. 3.1 Experimental Data Tests are conducted on a variety of modalities, match algorithms, and data sets. A summary of the data sets is contained in Table 1. Fingerprints. Data are reported for two fingerprint matching algorithms: Fingerprint - Alg I and Fingerprint - Alg II. The matching algorithms differ only in the features used to calculate the match score. The fingerprint registration is performed using a two-stage optimization algorithm [14]. The first algorithm uses minutiae features to calculate the similarity score, and the second uses the nonminutiae features (ridge frequency, orientation, and curvature). The data set is DB1 from the FVC2002 fingerprint verification competition [15]. Iris. The iris data has been obtained from the UK National Physical Laboratory. The specific details of the iris matching algorithm and data set are not included for confidentiality reasons. 2D Face and speech. The match scores for the 2D Face and Speech experiments are from the publicly available XM2VTS multimodal fusion benchmark database, Protocol LP1 1 [16]. The database contains results for a variety of different biometric algorithms for both face and speech samples. The data are partitioned into sets for training and testing score fusion models. Since the current study does not involve a training phase, the experiments are based on all available information (i.e., the scores from the training and evaluation 1. Scores can be downloaded from fusion.

5 224 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 TABLE 1 Summary of Properties of the Experimental Data Sets Population specifies the number of people with both genuine and impostor match scores, and Genuine Matches and Impostor Matches specifies the number (or number range) of matches for each person. sets are concatenated). This database contains the results for five face matching algorithms and three speech matching algorithms. Members of the biometric menagerie were found in the two face sets (DCTs,GMM) and (DCTb,GMM), which correspond to 2D Face - Alg I and 2D Face - Alg II, respectively. Speech corresponds to the (SSC,GMM) algorithm (the other two speech sets did not contain any members of the biometric menagerie). 3D Faces. The 3D face recognition experiment uses Face Recognition Grand Challenge (FRGC) 2.0 face image data corpus [17]. The matching algorithm uses a two-way decomposition to break incoming faces into a number of smaller regions in both space and frequency. Each of these regions is then classified using a specialized classifier and the output of these classifiers is combined using weighted score fusion [18]. Keystroke. Keystroke dynamics uses patterns of a person s typing style as the basis for the biometric [19]. There were two different algorithms tested. The first algorithm, Keystroke - Alg I, is based on the comparison of absolute timings between keystroke pairs. For example, the average time between an a and n keystroke for user A is compared to the same measurement for user B. The overall match score is based on a comparison of all available keystroke pairs. On the other hand, Keystroke - Alg II is based on relative timings between keystroke pairs. For example, user A may consistently type the pair an faster than the pair nd. The relative timings are compared between users A and B to get an overall match score. The data set used to test Keystroke - Alg I and Keystroke - Alg II contained only three samples for each member of the population. Consequently, there are only three genuine match scores available for each person. In order to apply the Kruskal-Wallis test, there must be at least five samples for each distribution. Therefore, this data set could not be tested for goats. Synthetic. A baseline experiment was conducted using synthetic data. The parameters of the system were chosen to be consistent with plausible parameters for a real biometric system. The population is of 300 imaginary people with identical score distributions. For each person, a random number of genuine matches and a random number of impostor matches were generated. The genuine matches were randomly drawn from a beta distribution with parameters ¼ 5 and ¼ 1, and the impostor matches were drawn from a beta distribution with parameters ¼ 2 and ¼ 7. The important properties of the synthetic data are:. The number of matches for each person varies. This was designed to ensure that the existence tests are not sensitive to varying numbers of matches per person.. The score distributions are not normal. The existence tests should not be sensitive to nonnormality.. The user scores are all drawn from the same underlying distributions. Therefore, there should not be any goat, lambs, or wolves in the data.. The genuine and impostor match scores are independent, so there should not be a significant presence or absence of worms, doves, chameleons, or phantoms. 3.2 Correlation between Mean User Scores and System Errors An experiment was conducted to investigate the relationship between a user s mean genuine and impostor scores, and their contribution to system errors. This relationship does not necessarily exist. For example, in a system where errors are caused predominantly by outlier matches, a user s mean genuine and impostor match scores would not be a good indicator of their likelihood for false accepts or rejects. For each of the data sets (see Section 3.1), a global match threshold was set to the equal error rate (EER) threshold of the system. For each user, the number of genuine matches below this threshold (false rejects) and the number of impostor matches above the threshold (false accepts) was tabulated. Furthermore, for each user, the mean genuine and impostor match scores were computed. The Pearson product-moment correlation coefficient was calculated to determine the strength of the linear relationship between the mean genuine score and false rejects, as well as between the mean impostor score and false accepts. The results can be found in Table 2. As can be seen, in all cases, there is a negative correlation between mean genuine scores and false reject counts, and a positive correlation between mean impostor scores and the number of false accepts. This result is moderate to strong for all data sets and algorithms, except

6 YAGER AND DUNSTONE: THE BIOMETRIC MENAGERIE 225 TABLE 2 Correlation between Mean User Scores and Verification Errors For each system, a global threshold is used (determined by the system EER), and user false accepts and false rejects are tabulated. These error counts are compared to the user s mean genuine and impostor match scores. All results are statistically significant at the level. Fig. 2. The zoo plots for all data sets. Each point represents a user, and the position reflects their average score when matching against themself (x-axis) and others (y-axis). (a) Fingerprint - Alg I. (b) Fingerprint - Alg II. (c) 2D Face - Alg I. (d) 2D Face - Alg II. (e) Speech. (f) Iris. (g) Keystroke - Alg I. (h) Keystroke - Alg II. (i) 3D Face. (j) Synthetic. for 2D Face - Alg II where the correlation is rather weak. The conclusion is that, in general, a user s average genuine and impostor match scores are a good indication of their likelihood of being involved in system errors. This justifies the use of central tendencies as a metric for average performance, which will be used as the performance statistics for the tests in the next section. However, it should be kept in mind that other performance measures can be substituted where appropriate. 3.3 Analysis of Animal Existence The zoo plots for each experiment are contained in Fig. 2. Table 3 summarizes the experimental results, and the corresponding probability values can be found in Table 4. The following are the main conclusions that can be drawn: Goats, Lambs, and Wolves Are Everywhere Every system tested, except the synthetic data, has a population of goats, lambs, and wolves. Recall the definition of these animals: The match score distributions are not independent of the user being matched. Therefore, based on these results, it appears to be a widespread, general property of biometric systems that users have their own match score distributions The New Additions to the Biometric Menagerie Exist It is apparent from the results in Table 3 that the new animals may exist in, or be conspicuously absent from, real biometric data. An example of a system containing, or not containing,

7 226 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 TABLE 3 The Biometric Menagerie for the Test Sets For goat, lambs, and wolves, a check mark indicates that the null hypothesis was rejected, and a cross indicates that it was not. For the other animals, a check mark indicates a significant presence, and a cross indicates a significant absence, of the animal. These results are representative of the specific algorithms and data sets tested and should not be extrapolated to other biometric systems of the same modality. every animal type has been found. The interpretation of this is as follows: In some systems, a user s probability of being falsely rejected is not independent of their probability of being falsely accepted. As far as the authors are aware, this is a result that has never been explicitly stated or demonstrated in the biometrics literature The Reasons the Animals Exist Depend on a Variety of Factors The existence of the animals may have some relationship to system accuracy. The two top performing systems (Fingerprint - Alg I and 3D Face) are also systems that do not have (or lack) any animal populations. Therefore, the presence of animals may be an indication of algorithmic weaknesses (more will be said on this in Sections 4 and 5). However, this is not necessarily the case since the synthetic data set can be constructed to have an arbitrarily low or high error rate, and will never contain any animals. Therefore, factors other than system accuracy must be involved. The presence of animals varies widely between the systems. Consider the results for the two keystroke recognition algorithms, which are applied to the same user population. Chameleons and phantoms are present in Keystroke - Alg I, but not in Keystroke - Alg II. Therefore, a chameleon in one system is not necessarily a chameleon in another (see the fingerprint case study). Consequently, a person cannot be labeled an animal independent of a specific algorithm and set of templates. In general, a person s success within a system is due to a combination of factors. In particular, it is impacted by the matching algorithm being used, and its interaction with a user s physical and behavioral characteristics, which may lead to poor quality templates. Furthermore, data quality is heavily influenced by the sensing hardware in use and the environmental conditions at the time of capture People are Rarely Inherently Hard to Match There is a degree of pessimism in the biometric community about people who are unsuitable for biometric identification. On one hand, there will always be some people who are unable to use a biometric system due to missing or damaged body parts. However, evidence is mounting that there are few people who are destined to have difficulty with biometric authentication due to an inherent unmatchability. The TABLE 4 Probability Values for the Existence (or Absence) of the Animals An empty field indicates a probability value > 0:05, so the null hypothesis was accepted.

8 YAGER AND DUNSTONE: THE BIOMETRIC MENAGERIE 227 previous conclusion supports this idea as it emphasizes the role of the overall system in the existence of problem user groups. Two recent studies support this claim. It is often claimed that 2 percent of the population have fingerprints that are unsuitable for fingerprint recognition. However, an investigation by Hicklin et al. [20] of a largescale fingerprint matching system (US-VISIT) has shown that this estimate is grossly overstated. The authors conclude that there are very few, if any, users who are intrinsically hard to match (goats and phantoms). Data quality and collection issues are the dominating factors. The conductors of recent iris recognition algorithm evaluation have come to a similar conclusion. IRIS06 evaluated three commercial iris recognition products in an effort to evaluate the state of the art of the field [21]. The researchers found examples of wolf-like behavior, but only for specific images of a person. The authors conclude that Doddington s Zoo phenomenon may be image specific as opposed to individual specific. Once again, this points to enrollment quality issues, rather than inherent properties of an individual. This is an encouraging result for the biometric research community as there does not seem to be an unsurpassable obstacle of people who are inherently difficult to recognize. When errors are common for a particular individual, they can usually be addressed using improved enrollment/capture processes and robust matching algorithms. This is illustrated with the use of several specific examples in the next section. 4 CASE STUDIES IN FINGERPRINTS, IRIS, AND FACE RECOGNITION The previous section presented results that show the presence and absence of the new members of the biometric menagerie in real biometric data sets. However, the actual user groups present vary from experiment to experiment. Results from the iris, face, and fingerprint experiments are examined. The case studies demonstrate the types of inferences that can be drawn using a biometric menagerie-based analysis. 4.1 Iris Recognition The zoo plot (using average user match scores) for the iris recognition system can be found in Fig. 3. In this case, there is a very noticeable absence of worms and doves, with only 3 or 4 of the total population or 208 people falling in these regions. The plot illustrates a fairly strong positive correlation between the average genuine and average impostor match scores. The result of this is a significant phantom population in the lower left corner. Further analysis shows that many of the phantoms are actually people who were wearing glasses when they enrolled in the system. Wearing glasses would increase the difficulty of the feature extraction task, leading to unreliable biometric templates that receive low match scores in many transactions. In this case, the underlying cause for the phantom population is behavioral, and the problem can be addressed through a system policy that requires people to remove their glasses during enrollment. 4.2 Face Recognition In the test of a face recognition system (the details are not included for confidentially reasons), the was a strong ethnic Fig. 3. The plot of average user genuine and impostor match scores for the iris data set. The regions corresponding to worms (W), chameleons (C), phantoms (P), and doves (D) are labeled accordingly. division within the target population. The recognition performance for one of the groups was considerably worse than the main demographic, leading to strong chameleon and phantom populations. The likely cause of this behavior was that the algorithm had been tuned too heavily toward the main population demographic. This illustrates the importance of keeping target population demographics in mind when tuning recognition algorithms. 4.3 Fingerprint Recognition The zoo plots for the Fingerprint - Alg I and Fingerprint - Alg II algorithms can be found in Figs. 4a and 4b. Neither algorithm contained, in a statistically significant sense, any of the new members of the biometric menagerie. However, the results are still interesting. User A has been circled in both zoo plots and has strong phantom properties for both algorithms. An example enrollment image (from FVC2002 DB1 [15]) for this person can be found in Fig. 4c. In this case, the enrollment quality of the finger is very good. There is no noticeable noise or dirt, and the ridges are clearly defined. However, compared to other fingerprints in this data set, the ridge frequency is unusually low. This low ridge frequency leads to many spurious ridges during Gabor filtering (a common preprocessing step for fingerprint images [22]). Consequently, the minutiae data for this fingerprint is unreliable. The result of this is a low match score when matched against itself and others. This is a clear example of the types of situations that can lead to phantom-like behavior. In this case, it is a weakness of the feature extraction algorithm, and the fingerprint itself is not inherently hard to match. The problem can be addressed by improved filtering techniques. User B has a high average genuine match score for both algorithms tested. An examination of the user s images reveals that all enrollments for this finger have large capture areas, clearly defined ridge structures, and consistent regions of capture. These properties make this individual easy to authenticate for both algorithms. The impostor results for this person are different between the algorithms. For the minutiae-based algorithm, the average

9 228 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 Fig. 4. The score plots for the fingerprint matching algorithms. Both algorithms are tested on the same data set, but use different fingerprint features to calculate the match scores. The positions of two users are marked in the plots (a) and (b), and sample images (from FVC2002 DB1 [15]) are presented. (a) The zoo plot for Fingerprint - Alg I. (b) The zoo plot for Fingerprint - Alg II. (c) An enrollment sample for A. (d) An enrollment sample for B. impostor scores are low, making this user a dove. The reasons for the low impostor scores are the same as the reasons for the high genuine scores, namely, high-quality enrollments and large surface areas make it difficult for other fingers to obtain high match scores with matched against B. On the other hand, B has relatively high impostor match scores for the nonminutiae algorithm. The reason for this is that the nonminutiae algorithm is based heavily on overall ridge patterns. This fingerprint is a right loop, which is a common ridge pattern for fingerprints [22], leading to many high match scores when matched against many other fingers. Once again, this is an illustration of how a menagerie-based analysis can help expose algorithmic weaknesses and lead to the development of improved matching techniques. 5 CONCLUSIONS AND FUTURE WORK 5.1 Conclusions The following main conclusions have been drawn from this study:. Goats, lambs, and wolves are very common in biometric systems. This is due to the fact that users tend to have individual genuine and impostor match score distributions. An important consequence of this is that some users will perform better than others within a system.. Four new additions to the biometric menagerie have been identified: worms, doves, chameleons, and phantoms. These animals are defined in terms of a relationship between genuine and impostor match scores, and have been demonstrated to exist in, or be significantly absent from, a wide variety of real biometric data.. The reasons that a particular animal group exist are complex and varied. They depend on a number of factors, including enrollment procedures, feature extraction and matching algorithms, data quality, and intrinsic properties of the user population.. The notion that there are people who are inherently unsuitable for biometric identification has been exaggerated. Matching errors are more likely due to enrollment issues and algorithmic weaknesses than inherent properties of the people involved. This should be viewed as a positive result by those involved in biometric research.

10 YAGER AND DUNSTONE: THE BIOMETRIC MENAGERIE 229 The presence or absence of the new animals reflects properties of the matching system, user population, or an interaction between the two. This suggests a new method for investigating and evaluating biometric systems. By comparing and contrasting the properties of the various animal groups, algorithmic strengths and weaknesses emerge, as illustrated in the case studies of Section 4. Traditional methods of evaluation focus on collective error statistics such as EERs and ROC curves. These statistics are useful for evaluating systems as a whole, but ignore problems associated with individuals and subgroups of the population. The biometric menagerie is a formal approach to user-centric analysis. 5.2 Future Work There are several directions where this work can be extended. First of all, further testing may reveal general patterns that are not apparent from the tests conducted so far. For example, it may turn out that certain animals are more common in some biometric modalities than others. Another avenue for research would be to compare the results from two or more different algorithms on the same data set. In the case that populations are consistent between the algorithms, it would indicate substantial similarities between the algorithms. This could lead to a stronger definition of the animals based on membership in a group for several different algorithms. On the other hand, if the animals populations are largely different, this would indicate independence between the algorithms. Algorithms with a high degree of independence are strong candidates for multimodal combination. It has been demonstrated that intraindividual correlation should be considered when computing confidence intervals for false accept or false reject rates at a given operating threshold [23]. The present research has demonstrated a potential correlation between genuine and impostor match scores, which have traditionally been treated as independent. This may have implications for computing confidence intervals for performance measures that involve both false accept and false reject rates (such as ROC and DET curves). It has been suggested that true animal-like behavior is more likely for biometrics that have a significant behavioral component. For example, consider a covert surveillance system that uses face recognition to identify people on a watch list. People who walk quickly with their head down will likely be phantoms, while people who walk slowly with their head held high are good candidates for doves. It seems likely that behavioral factors will play a significant role in many biometric systems. Validating and quantifying this role, and its contribution to system error rates, requires further investigation. The traditional animals of the biometric menagerie have been used as a motivation for setting user-specific match thresholds [7]. The new animals proposed in this study give further insight into individual user performance, and may directly lead to more sophisticated schemes for setting userspecific thresholds or score normalization techniques. ACKNOWLEDGMENTS First, the authors would like to thank Jim Wayman for providing the initial inspiration for this paper by posing the simple, but insightful, question Are lambs goats? Second, Aidan Roy of the Institute for Quantum Information Science at the University of Calgary has provided valuable insight into formulating the existence test for the new animals. Finally, numerous people have generously agreed to share data or provide feedback for this study: Jamie Cook of the Queensland University of Technology, Tony Mansfield and Alex Bazin of the National Physical Laboratory, and Ross Summerfield of Centrelink. REFERENCES [1] T. Dunstone and N. Yager, Biometric System and Data Analysis: Design, Evaluation, and Data Mining. Springer, [2] G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation, Proc. Int l Conf. Spoken Language Processing, [3] J.L. Wayman, Multi-Finger Penetration Rate and ROC Variability for Automatic Fingerprint Identification Systems, technical report, Nat l Biometric Test Center, [4] M. Wittman, P. Davis, and P. Flynn, Empirical Studies of the Existence of the Biometric Menagerie in the FRGC 2.0 Color Image Corpus, Proc. Computer Vision and Pattern Recognition Workshop, [5] N. Poh and J. Kittler, Incorporating Model-Specific Score Distribution in Speaker Verification Systems, IEEE Trans. Audio, Speech, and Language Processing, vol. 16, no. 3, pp , Mar [6] K. Chen, Towards Better Making a Decision in Speaker Verification, Pattern Recognition, vol. 36, no. 2, pp , [7] N. Poh, A. Ross, and S. Bengio, Revisiting Doddington s Zoo: Employing User-Dependent Performance Criterion for Multibiometric Fusion, Proc. Multimodal User Authentication Workshop, [8] D. Ramos-Castro, J. Fierrez-Aguilar, J. Gonzalez-Rodriguez, and J. Ortega-Garcia, Speaker Verification Using Speaker- and Test- Dependent Fast Score Normalization, Pattern Recognition Letters, vol. 28, no. 1, pp , [9] R. Snelick, U. Uludag, A. Mink, M. Indovina, and A. Jain, Large Scale Evaluation of Multimodal Biometric Authentication Using State-of-the-Art Systems, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27, no. 3, pp , Mar [10] N. Yager and T. Dunstone, Worms, Chameleons, Phantoms and Doves: New Additions to the Biometric Menagerie, Proc. AutoID, [11] W. Daniel, Applied Nonparametric Statistics. Wadsworth Publishing Company, [12] R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior, Guide to Biometrics. Springer-Verlag, [13] Performix Biometric Research and Analysis Software, www. biometix.com/performix.htm, [14] N. Yager and A. Amin, Fingerprint Verification Using Two Stage Optimization, Pattern Recognition Letters, vol. 27, pp , [15] D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, and A.K. Jain, FVC2002: Second Fingerprint Verification Competition, Proc. Int l Conf. Pattern Recognition, vol. 3, pp , [16] N. Poh and S. Bengio, Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentications, Pattern Recognition, vol. 39, no. 2, pp , [17] P.J. Phillips, P.J. Flynn, T. Scruggs, K.W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, Overview of the Face Recognition Grand Challenge, Proc. IEEE Conf. Computer Vision and Pattern Recognition, [18] J. Cook, V. Chandran, and C. Fookes, 3D Face Recognition Using Log-Gabor Templates, Proc. British Machine Vision Conf., [19] D. Gunetti and C. Picardi, Keystroke Analysis of Free Text, ACM Trans. Information and System Security, vol. 8, no. 3, pp , [20] A. Hicklin, C. Watson, and B. Ulery, The Myth of Goats: How Many People Have Fingerprints That Are Hard to Match? Technical Report NIST IR 7271, Nat l Inst. of Standards and Technology, 2005.

11 230 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 [21] Authi-Corp, IRIS06 Draft Final Report, authenti-corp.com/iris06/report/, [22] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer, [23] T.J. Atkinson and M.E. Schuckers, Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification Devices, Proc. Biometric Authentication: European Conf. Computer Vision Int l Workshop, Neil Yager received the PhD degree from the University of New South Wales in 2007 in automated fingerprint recognition. His PhD thesis was awarded the 2007 Malcolm Chaikin Prize for Research Excellence in Engineering. Following his studies, he became employed as the principal research scientist at Biometix, working on the development, implementation, and analysis of biometric authentication systems. He has authored a dozen papers on biometrics and has cowritten a book on biometric data analysis with Ted Dunstone, which was published in December Ted Dunstone received the PhD degree from Wollongong University, Australia, in He is currently the managing director of a biometric data analysis company, Biometix. His research interests include misclassification analysis, biometrics system performance, vulnerability detection, and machine learning. He was awarded the 2005 NSW State Pearcey Award for innovative and pioneering achievement and contribution to research and development within the IT&T industry. He is the founder of the Australasian Biometrics Institute and a member of the IEEE. He is also coauthor of a book with Neil Yager on biometric data analysis, which was published in December For more information on this or any other computing topic, please visit our Digital Library at

12 This article was featured in For access to more content from the IEEE Computer Society, see computingnow.computer.org. Top articles, podcasts, and more. computingnow.computer.org

STA 225: Introductory Statistics (CT)

STA 225: Introductory Statistics (CT) Marshall University College of Science Mathematics Department STA 225: Introductory Statistics (CT) Course catalog description A critical thinking course in applied statistical reasoning covering basic

More information

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification Tomi Kinnunen and Ismo Kärkkäinen University of Joensuu, Department of Computer Science, P.O. Box 111, 80101 JOENSUU,

More information

Probability and Statistics Curriculum Pacing Guide

Probability and Statistics Curriculum Pacing Guide Unit 1 Terms PS.SPMJ.3 PS.SPMJ.5 Plan and conduct a survey to answer a statistical question. Recognize how the plan addresses sampling technique, randomization, measurement of experimental error and methods

More information

Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques

Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques Lorene Allano 1*1, Andrew C. Morris 2, Harin Sellahewa 3, Sonia Garcia-Salicetti 1, Jacques Koreman 2, Sabah Jassim

More information

A Case Study: News Classification Based on Term Frequency

A Case Study: News Classification Based on Term Frequency A Case Study: News Classification Based on Term Frequency Petr Kroha Faculty of Computer Science University of Technology 09107 Chemnitz Germany kroha@informatik.tu-chemnitz.de Ricardo Baeza-Yates Center

More information

The Good Judgment Project: A large scale test of different methods of combining expert predictions

The Good Judgment Project: A large scale test of different methods of combining expert predictions The Good Judgment Project: A large scale test of different methods of combining expert predictions Lyle Ungar, Barb Mellors, Jon Baron, Phil Tetlock, Jaime Ramos, Sam Swift The University of Pennsylvania

More information

University of Groningen. Systemen, planning, netwerken Bosman, Aart

University of Groningen. Systemen, planning, netwerken Bosman, Aart University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document

More information

Rule Learning With Negation: Issues Regarding Effectiveness

Rule Learning With Negation: Issues Regarding Effectiveness Rule Learning With Negation: Issues Regarding Effectiveness S. Chua, F. Coenen, G. Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX Liverpool, United

More information

Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method

Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method Sanket S. Kalamkar and Adrish Banerjee Department of Electrical Engineering

More information

Probability estimates in a scenario tree

Probability estimates in a scenario tree 101 Chapter 11 Probability estimates in a scenario tree An expert is a person who has made all the mistakes that can be made in a very narrow field. Niels Bohr (1885 1962) Scenario trees require many numbers.

More information

CS Machine Learning

CS Machine Learning CS 478 - Machine Learning Projects Data Representation Basic testing and evaluation schemes CS 478 Data and Testing 1 Programming Issues l Program in any platform you want l Realize that you will be doing

More information

Word Segmentation of Off-line Handwritten Documents

Word Segmentation of Off-line Handwritten Documents Word Segmentation of Off-line Handwritten Documents Chen Huang and Sargur N. Srihari {chuang5, srihari}@cedar.buffalo.edu Center of Excellence for Document Analysis and Recognition (CEDAR), Department

More information

Python Machine Learning

Python Machine Learning Python Machine Learning Unlock deeper insights into machine learning with this vital guide to cuttingedge predictive analytics Sebastian Raschka [ PUBLISHING 1 open source I community experience distilled

More information

MGT/MGP/MGB 261: Investment Analysis

MGT/MGP/MGB 261: Investment Analysis UNIVERSITY OF CALIFORNIA, DAVIS GRADUATE SCHOOL OF MANAGEMENT SYLLABUS for Fall 2014 MGT/MGP/MGB 261: Investment Analysis Daytime MBA: Tu 12:00p.m. - 3:00 p.m. Location: 1302 Gallagher (CRN: 51489) Sacramento

More information

have to be modeled) or isolated words. Output of the system is a grapheme-tophoneme conversion system which takes as its input the spelling of words,

have to be modeled) or isolated words. Output of the system is a grapheme-tophoneme conversion system which takes as its input the spelling of words, A Language-Independent, Data-Oriented Architecture for Grapheme-to-Phoneme Conversion Walter Daelemans and Antal van den Bosch Proceedings ESCA-IEEE speech synthesis conference, New York, September 1994

More information

Why Did My Detector Do That?!

Why Did My Detector Do That?! Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates Kevin Killourhy and Roy Maxion Dependable Systems Laboratory Computer Science Department Carnegie Mellon University 5000 Forbes Ave,

More information

Algebra 1, Quarter 3, Unit 3.1. Line of Best Fit. Overview

Algebra 1, Quarter 3, Unit 3.1. Line of Best Fit. Overview Algebra 1, Quarter 3, Unit 3.1 Line of Best Fit Overview Number of instructional days 6 (1 day assessment) (1 day = 45 minutes) Content to be learned Analyze scatter plots and construct the line of best

More information

Reducing Features to Improve Bug Prediction

Reducing Features to Improve Bug Prediction Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science

More information

On the Combined Behavior of Autonomous Resource Management Agents

On the Combined Behavior of Autonomous Resource Management Agents On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science

More information

On-Line Data Analytics

On-Line Data Analytics International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob

More information

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System QuickStroke: An Incremental On-line Chinese Handwriting Recognition System Nada P. Matić John C. Platt Λ Tony Wang y Synaptics, Inc. 2381 Bering Drive San Jose, CA 95131, USA Abstract This paper presents

More information

School Size and the Quality of Teaching and Learning

School Size and the Quality of Teaching and Learning School Size and the Quality of Teaching and Learning An Analysis of Relationships between School Size and Assessments of Factors Related to the Quality of Teaching and Learning in Primary Schools Undertaken

More information

Evidence for Reliability, Validity and Learning Effectiveness

Evidence for Reliability, Validity and Learning Effectiveness PEARSON EDUCATION Evidence for Reliability, Validity and Learning Effectiveness Introduction Pearson Knowledge Technologies has conducted a large number and wide variety of reliability and validity studies

More information

*Net Perceptions, Inc West 78th Street Suite 300 Minneapolis, MN

*Net Perceptions, Inc West 78th Street Suite 300 Minneapolis, MN From: AAAI Technical Report WS-98-08. Compilation copyright 1998, AAAI (www.aaai.org). All rights reserved. Recommender Systems: A GroupLens Perspective Joseph A. Konstan *t, John Riedl *t, AI Borchers,

More information

Rote rehearsal and spacing effects in the free recall of pure and mixed lists. By: Peter P.J.L. Verkoeijen and Peter F. Delaney

Rote rehearsal and spacing effects in the free recall of pure and mixed lists. By: Peter P.J.L. Verkoeijen and Peter F. Delaney Rote rehearsal and spacing effects in the free recall of pure and mixed lists By: Peter P.J.L. Verkoeijen and Peter F. Delaney Verkoeijen, P. P. J. L, & Delaney, P. F. (2008). Rote rehearsal and spacing

More information

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should

More information

Learning From the Past with Experiment Databases

Learning From the Past with Experiment Databases Learning From the Past with Experiment Databases Joaquin Vanschoren 1, Bernhard Pfahringer 2, and Geoff Holmes 2 1 Computer Science Dept., K.U.Leuven, Leuven, Belgium 2 Computer Science Dept., University

More information

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Dave Donnellan, School of Computer Applications Dublin City University Dublin 9 Ireland daviddonnellan@eircom.net Claus Pahl

More information

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Dave Donnellan, School of Computer Applications Dublin City University Dublin 9 Ireland daviddonnellan@eircom.net Claus Pahl

More information

12- A whirlwind tour of statistics

12- A whirlwind tour of statistics CyLab HT 05-436 / 05-836 / 08-534 / 08-734 / 19-534 / 19-734 Usable Privacy and Security TP :// C DU February 22, 2016 y & Secu rivac rity P le ratory bo La Lujo Bauer, Nicolas Christin, and Abby Marsh

More information

Using dialogue context to improve parsing performance in dialogue systems

Using dialogue context to improve parsing performance in dialogue systems Using dialogue context to improve parsing performance in dialogue systems Ivan Meza-Ruiz and Oliver Lemon School of Informatics, Edinburgh University 2 Buccleuch Place, Edinburgh I.V.Meza-Ruiz@sms.ed.ac.uk,

More information

A Case-Based Approach To Imitation Learning in Robotic Agents

A Case-Based Approach To Imitation Learning in Robotic Agents A Case-Based Approach To Imitation Learning in Robotic Agents Tesca Fitzgerald, Ashok Goel School of Interactive Computing Georgia Institute of Technology, Atlanta, GA 30332, USA {tesca.fitzgerald,goel}@cc.gatech.edu

More information

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Stephan Gouws and GJ van Rooyen MIH Medialab, Stellenbosch University SOUTH AFRICA {stephan,gvrooyen}@ml.sun.ac.za

More information

WHEN THERE IS A mismatch between the acoustic

WHEN THERE IS A mismatch between the acoustic 808 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 14, NO. 3, MAY 2006 Optimization of Temporal Filters for Constructing Robust Features in Speech Recognition Jeih-Weih Hung, Member,

More information

Edexcel GCSE. Statistics 1389 Paper 1H. June Mark Scheme. Statistics Edexcel GCSE

Edexcel GCSE. Statistics 1389 Paper 1H. June Mark Scheme. Statistics Edexcel GCSE Edexcel GCSE Statistics 1389 Paper 1H June 2007 Mark Scheme Edexcel GCSE Statistics 1389 NOTES ON MARKING PRINCIPLES 1 Types of mark M marks: method marks A marks: accuracy marks B marks: unconditional

More information

Learning Methods in Multilingual Speech Recognition

Learning Methods in Multilingual Speech Recognition Learning Methods in Multilingual Speech Recognition Hui Lin Department of Electrical Engineering University of Washington Seattle, WA 98125 linhui@u.washington.edu Li Deng, Jasha Droppo, Dong Yu, and Alex

More information

Rule Learning with Negation: Issues Regarding Effectiveness

Rule Learning with Negation: Issues Regarding Effectiveness Rule Learning with Negation: Issues Regarding Effectiveness Stephanie Chua, Frans Coenen, and Grant Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX

More information

Speech Recognition at ICSI: Broadcast News and beyond

Speech Recognition at ICSI: Broadcast News and beyond Speech Recognition at ICSI: Broadcast News and beyond Dan Ellis International Computer Science Institute, Berkeley CA Outline 1 2 3 The DARPA Broadcast News task Aspects of ICSI

More information

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS Václav Kocian, Eva Volná, Michal Janošek, Martin Kotyrba University of Ostrava Department of Informatics and Computers Dvořákova 7,

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean

More information

Speech Emotion Recognition Using Support Vector Machine

Speech Emotion Recognition Using Support Vector Machine Speech Emotion Recognition Using Support Vector Machine Yixiong Pan, Peipei Shen and Liping Shen Department of Computer Technology Shanghai JiaoTong University, Shanghai, China panyixiong@sjtu.edu.cn,

More information

Research Update. Educational Migration and Non-return in Northern Ireland May 2008

Research Update. Educational Migration and Non-return in Northern Ireland May 2008 Research Update Educational Migration and Non-return in Northern Ireland May 2008 The Equality Commission for Northern Ireland (hereafter the Commission ) in 2007 contracted the Employment Research Institute

More information

ISFA2008U_120 A SCHEDULING REINFORCEMENT LEARNING ALGORITHM

ISFA2008U_120 A SCHEDULING REINFORCEMENT LEARNING ALGORITHM Proceedings of 28 ISFA 28 International Symposium on Flexible Automation Atlanta, GA, USA June 23-26, 28 ISFA28U_12 A SCHEDULING REINFORCEMENT LEARNING ALGORITHM Amit Gil, Helman Stern, Yael Edan, and

More information

A Note on Structuring Employability Skills for Accounting Students

A Note on Structuring Employability Skills for Accounting Students A Note on Structuring Employability Skills for Accounting Students Jon Warwick and Anna Howard School of Business, London South Bank University Correspondence Address Jon Warwick, School of Business, London

More information

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland

More information

Quantitative analysis with statistics (and ponies) (Some slides, pony-based examples from Blase Ur)

Quantitative analysis with statistics (and ponies) (Some slides, pony-based examples from Blase Ur) Quantitative analysis with statistics (and ponies) (Some slides, pony-based examples from Blase Ur) 1 Interviews, diary studies Start stats Thursday: Ethics/IRB Tuesday: More stats New homework is available

More information

Lecture 1: Machine Learning Basics

Lecture 1: Machine Learning Basics 1/69 Lecture 1: Machine Learning Basics Ali Harakeh University of Waterloo WAVE Lab ali.harakeh@uwaterloo.ca May 1, 2017 2/69 Overview 1 Learning Algorithms 2 Capacity, Overfitting, and Underfitting 3

More information

AGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016

AGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016 AGENDA Advanced Learning Theories Alejandra J. Magana, Ph.D. admagana@purdue.edu Introduction to Learning Theories Role of Learning Theories and Frameworks Learning Design Research Design Dual Coding Theory

More information

Evolutive Neural Net Fuzzy Filtering: Basic Description

Evolutive Neural Net Fuzzy Filtering: Basic Description Journal of Intelligent Learning Systems and Applications, 2010, 2: 12-18 doi:10.4236/jilsa.2010.21002 Published Online February 2010 (http://www.scirp.org/journal/jilsa) Evolutive Neural Net Fuzzy Filtering:

More information

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT PRACTICAL APPLICATIONS OF RANDOM SAMPLING IN ediscovery By Matthew Verga, J.D. INTRODUCTION Anyone who spends ample time working

More information

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering Document number: 2013/0006139 Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering Program Learning Outcomes Threshold Learning Outcomes for Engineering

More information

A Comparison of Standard and Interval Association Rules

A Comparison of Standard and Interval Association Rules A Comparison of Standard and Association Rules Choh Man Teng cmteng@ai.uwf.edu Institute for Human and Machine Cognition University of West Florida 4 South Alcaniz Street, Pensacola FL 325, USA Abstract

More information

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ; EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10 Instructor: Kang G. Shin, 4605 CSE, 763-0391; kgshin@umich.edu Number of credit hours: 4 Class meeting time and room: Regular classes: MW 10:30am noon

More information

A. What is research? B. Types of research

A. What is research? B. Types of research A. What is research? Research = the process of finding solutions to a problem after a thorough study and analysis (Sekaran, 2006). Research = systematic inquiry that provides information to guide decision

More information

Detecting English-French Cognates Using Orthographic Edit Distance

Detecting English-French Cognates Using Orthographic Edit Distance Detecting English-French Cognates Using Orthographic Edit Distance Qiongkai Xu 1,2, Albert Chen 1, Chang i 1 1 The Australian National University, College of Engineering and Computer Science 2 National

More information

B. How to write a research paper

B. How to write a research paper From: Nikolaus Correll. "Introduction to Autonomous Robots", ISBN 1493773070, CC-ND 3.0 B. How to write a research paper The final deliverable of a robotics class often is a write-up on a research project,

More information

A Reinforcement Learning Variant for Control Scheduling

A Reinforcement Learning Variant for Control Scheduling A Reinforcement Learning Variant for Control Scheduling Aloke Guha Honeywell Sensor and System Development Center 3660 Technology Drive Minneapolis MN 55417 Abstract We present an algorithm based on reinforcement

More information

Introduction to Questionnaire Design

Introduction to Questionnaire Design Introduction to Questionnaire Design Why this seminar is necessary! Bad questions are everywhere! Don t let them happen to you! Fall 2012 Seminar Series University of Illinois www.srl.uic.edu The first

More information

Learning Methods for Fuzzy Systems

Learning Methods for Fuzzy Systems Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8

More information

Investment in e- journals, use and research outcomes

Investment in e- journals, use and research outcomes Investment in e- journals, use and research outcomes David Nicholas CIBER Research Limited, UK Ian Rowlands University of Leicester, UK Library Return on Investment seminar Universite de Lyon, 20-21 February

More information

Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks

Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks Devendra Singh Chaplot, Eunhee Rhim, and Jihie Kim Samsung Electronics Co., Ltd. Seoul, South Korea {dev.chaplot,eunhee.rhim,jihie.kim}@samsung.com

More information

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling Notebook for PAN at CLEF 2013 Andrés Alfonso Caurcel Díaz 1 and José María Gómez Hidalgo 2 1 Universidad

More information

A cognitive perspective on pair programming

A cognitive perspective on pair programming Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 A cognitive perspective on pair programming Radhika

More information

Early Warning System Implementation Guide

Early Warning System Implementation Guide Linking Research and Resources for Better High Schools betterhighschools.org September 2010 Early Warning System Implementation Guide For use with the National High School Center s Early Warning System

More information

NCEO Technical Report 27

NCEO Technical Report 27 Home About Publications Special Topics Presentations State Policies Accommodations Bibliography Teleconferences Tools Related Sites Interpreting Trends in the Performance of Special Education Students

More information

SETTING STANDARDS FOR CRITERION- REFERENCED MEASUREMENT

SETTING STANDARDS FOR CRITERION- REFERENCED MEASUREMENT SETTING STANDARDS FOR CRITERION- REFERENCED MEASUREMENT By: Dr. MAHMOUD M. GHANDOUR QATAR UNIVERSITY Improving human resources is the responsibility of the educational system in many societies. The outputs

More information

THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS

THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS ELIZABETH ANNE SOMERS Spring 2011 A thesis submitted in partial

More information

Circuit Simulators: A Revolutionary E-Learning Platform

Circuit Simulators: A Revolutionary E-Learning Platform Circuit Simulators: A Revolutionary E-Learning Platform Mahi Itagi Padre Conceicao College of Engineering, Verna, Goa, India. itagimahi@gmail.com Akhil Deshpande Gogte Institute of Technology, Udyambag,

More information

PREDISPOSING FACTORS TOWARDS EXAMINATION MALPRACTICE AMONG STUDENTS IN LAGOS UNIVERSITIES: IMPLICATIONS FOR COUNSELLING

PREDISPOSING FACTORS TOWARDS EXAMINATION MALPRACTICE AMONG STUDENTS IN LAGOS UNIVERSITIES: IMPLICATIONS FOR COUNSELLING PREDISPOSING FACTORS TOWARDS EXAMINATION MALPRACTICE AMONG STUDENTS IN LAGOS UNIVERSITIES: IMPLICATIONS FOR COUNSELLING BADEJO, A. O. PhD Department of Educational Foundations and Counselling Psychology,

More information

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Email Marilyn A. Walker Jeanne C. Fromer Shrikanth Narayanan walker@research.att.com jeannie@ai.mit.edu shri@research.att.com

More information

Software Maintenance

Software Maintenance 1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories

More information

BENCHMARK TREND COMPARISON REPORT:

BENCHMARK TREND COMPARISON REPORT: National Survey of Student Engagement (NSSE) BENCHMARK TREND COMPARISON REPORT: CARNEGIE PEER INSTITUTIONS, 2003-2011 PREPARED BY: ANGEL A. SANCHEZ, DIRECTOR KELLI PAYNE, ADMINISTRATIVE ANALYST/ SPECIALIST

More information

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC On Human Computer Interaction, HCI Dr. Saif al Zahir Electrical and Computer Engineering Department UBC Human Computer Interaction HCI HCI is the study of people, computer technology, and the ways these

More information

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Todd Holloway Two Lecture Series for B551 November 20 & 27, 2007 Indiana University Outline Introduction Bias and

More information

Instructor: Mario D. Garrett, Ph.D. Phone: Office: Hepner Hall (HH) 100

Instructor: Mario D. Garrett, Ph.D.   Phone: Office: Hepner Hall (HH) 100 San Diego State University School of Social Work 610 COMPUTER APPLICATIONS FOR SOCIAL WORK PRACTICE Statistical Package for the Social Sciences Office: Hepner Hall (HH) 100 Instructor: Mario D. Garrett,

More information

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

OCR for Arabic using SIFT Descriptors With Online Failure Prediction OCR for Arabic using SIFT Descriptors With Online Failure Prediction Andrey Stolyarenko, Nachum Dershowitz The Blavatnik School of Computer Science Tel Aviv University Tel Aviv, Israel Email: stloyare@tau.ac.il,

More information

TU-E2090 Research Assignment in Operations Management and Services

TU-E2090 Research Assignment in Operations Management and Services Aalto University School of Science Operations and Service Management TU-E2090 Research Assignment in Operations Management and Services Version 2016-08-29 COURSE INSTRUCTOR: OFFICE HOURS: CONTACT: Saara

More information

An Empirical Analysis of the Effects of Mexican American Studies Participation on Student Achievement within Tucson Unified School District

An Empirical Analysis of the Effects of Mexican American Studies Participation on Student Achievement within Tucson Unified School District An Empirical Analysis of the Effects of Mexican American Studies Participation on Student Achievement within Tucson Unified School District Report Submitted June 20, 2012, to Willis D. Hawley, Ph.D., Special

More information

Reinforcement Learning by Comparing Immediate Reward

Reinforcement Learning by Comparing Immediate Reward Reinforcement Learning by Comparing Immediate Reward Punit Pandey DeepshikhaPandey Dr. Shishir Kumar Abstract This paper introduces an approach to Reinforcement Learning Algorithm by comparing their immediate

More information

Summary results (year 1-3)

Summary results (year 1-3) Summary results (year 1-3) Evaluation and accountability are key issues in ensuring quality provision for all (Eurydice, 2004). In Europe, the dominant arrangement for educational accountability is school

More information

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge Innov High Educ (2009) 34:93 103 DOI 10.1007/s10755-009-9095-2 Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge Phyllis Blumberg Published online: 3 February

More information

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1 Notes on The Sciences of the Artificial Adapted from a shorter document written for course 17-652 (Deciding What to Design) 1 Ali Almossawi December 29, 2005 1 Introduction The Sciences of the Artificial

More information

CSC200: Lecture 4. Allan Borodin

CSC200: Lecture 4. Allan Borodin CSC200: Lecture 4 Allan Borodin 1 / 22 Announcements My apologies for the tutorial room mixup on Wednesday. The room SS 1088 is only reserved for Fridays and I forgot that. My office hours: Tuesdays 2-4

More information

SINGLE DOCUMENT AUTOMATIC TEXT SUMMARIZATION USING TERM FREQUENCY-INVERSE DOCUMENT FREQUENCY (TF-IDF)

SINGLE DOCUMENT AUTOMATIC TEXT SUMMARIZATION USING TERM FREQUENCY-INVERSE DOCUMENT FREQUENCY (TF-IDF) SINGLE DOCUMENT AUTOMATIC TEXT SUMMARIZATION USING TERM FREQUENCY-INVERSE DOCUMENT FREQUENCY (TF-IDF) Hans Christian 1 ; Mikhael Pramodana Agus 2 ; Derwin Suhartono 3 1,2,3 Computer Science Department,

More information

Evaluating Interactive Visualization of Multidimensional Data Projection with Feature Transformation

Evaluating Interactive Visualization of Multidimensional Data Projection with Feature Transformation Multimodal Technologies and Interaction Article Evaluating Interactive Visualization of Multidimensional Data Projection with Feature Transformation Kai Xu 1, *,, Leishi Zhang 1,, Daniel Pérez 2,, Phong

More information

Developing Students Research Proposal Design through Group Investigation Method

Developing Students Research Proposal Design through Group Investigation Method IOSR Journal of Research & Method in Education (IOSR-JRME) e-issn: 2320 7388,p-ISSN: 2320 737X Volume 7, Issue 1 Ver. III (Jan. - Feb. 2017), PP 37-43 www.iosrjournals.org Developing Students Research

More information

PROFESSIONAL TREATMENT OF TEACHERS AND STUDENT ACADEMIC ACHIEVEMENT. James B. Chapman. Dissertation submitted to the Faculty of the Virginia

PROFESSIONAL TREATMENT OF TEACHERS AND STUDENT ACADEMIC ACHIEVEMENT. James B. Chapman. Dissertation submitted to the Faculty of the Virginia PROFESSIONAL TREATMENT OF TEACHERS AND STUDENT ACADEMIC ACHIEVEMENT by James B. Chapman Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment

More information

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming Data Mining VI 205 Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming C. Romero, S. Ventura, C. Hervás & P. González Universidad de Córdoba, Campus Universitario de

More information

A student diagnosing and evaluation system for laboratory-based academic exercises

A student diagnosing and evaluation system for laboratory-based academic exercises A student diagnosing and evaluation system for laboratory-based academic exercises Maria Samarakou, Emmanouil Fylladitakis and Pantelis Prentakis Technological Educational Institute (T.E.I.) of Athens

More information

Probabilistic Latent Semantic Analysis

Probabilistic Latent Semantic Analysis Probabilistic Latent Semantic Analysis Thomas Hofmann Presentation by Ioannis Pavlopoulos & Andreas Damianou for the course of Data Mining & Exploration 1 Outline Latent Semantic Analysis o Need o Overview

More information

A Study of Metacognitive Awareness of Non-English Majors in L2 Listening

A Study of Metacognitive Awareness of Non-English Majors in L2 Listening ISSN 1798-4769 Journal of Language Teaching and Research, Vol. 4, No. 3, pp. 504-510, May 2013 Manufactured in Finland. doi:10.4304/jltr.4.3.504-510 A Study of Metacognitive Awareness of Non-English Majors

More information

Phonetic- and Speaker-Discriminant Features for Speaker Recognition. Research Project

Phonetic- and Speaker-Discriminant Features for Speaker Recognition. Research Project Phonetic- and Speaker-Discriminant Features for Speaker Recognition by Lara Stoll Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California

More information

MYCIN. The MYCIN Task

MYCIN. The MYCIN Task MYCIN Developed at Stanford University in 1972 Regarded as the first true expert system Assists physicians in the treatment of blood infections Many revisions and extensions over the years The MYCIN Task

More information

THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY

THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY William Barnett, University of Louisiana Monroe, barnett@ulm.edu Adrien Presley, Truman State University, apresley@truman.edu ABSTRACT

More information

Full text of O L O W Science As Inquiry conference. Science as Inquiry

Full text of O L O W Science As Inquiry conference. Science as Inquiry Page 1 of 5 Full text of O L O W Science As Inquiry conference Reception Meeting Room Resources Oceanside Unifying Concepts and Processes Science As Inquiry Physical Science Life Science Earth & Space

More information

Intra-talker Variation: Audience Design Factors Affecting Lexical Selections

Intra-talker Variation: Audience Design Factors Affecting Lexical Selections Tyler Perrachione LING 451-0 Proseminar in Sound Structure Prof. A. Bradlow 17 March 2006 Intra-talker Variation: Audience Design Factors Affecting Lexical Selections Abstract Although the acoustic and

More information

Ryerson University Sociology SOC 483: Advanced Research and Statistics

Ryerson University Sociology SOC 483: Advanced Research and Statistics Ryerson University Sociology SOC 483: Advanced Research and Statistics Prerequisites: SOC 481 Instructor: Paul S. Moore E-mail: psmoore@ryerson.ca Office: Sociology Department Jorgenson JOR 306 Phone:

More information

University of Waterloo School of Accountancy. AFM 102: Introductory Management Accounting. Fall Term 2004: Section 4

University of Waterloo School of Accountancy. AFM 102: Introductory Management Accounting. Fall Term 2004: Section 4 University of Waterloo School of Accountancy AFM 102: Introductory Management Accounting Fall Term 2004: Section 4 Instructor: Alan Webb Office: HH 289A / BFG 2120 B (after October 1) Phone: 888-4567 ext.

More information

Tun your everyday simulation activity into research

Tun your everyday simulation activity into research Tun your everyday simulation activity into research Chaoyan Dong, PhD, Sengkang Health, SingHealth Md Khairulamin Sungkai, UBD Pre-conference workshop presented at the inaugual conference Pan Asia Simulation

More information