CHAPTER 1: INTRODUCTION

Similar documents
CSL465/603 - Machine Learning

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE

Lecture 1: Machine Learning Basics

Laboratorio di Intelligenza Artificiale e Robotica

Laboratorio di Intelligenza Artificiale e Robotica

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

Python Machine Learning

Axiom 2013 Team Description Paper

Rule Learning With Negation: Issues Regarding Effectiveness

Welcome to. ECML/PKDD 2004 Community meeting

Computerized Adaptive Psychological Testing A Personalisation Perspective

Human Emotion Recognition From Speech

Knowledge based expert systems D H A N A N J A Y K A L B A N D E

ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF

Rule Learning with Negation: Issues Regarding Effectiveness

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

Word Segmentation of Off-line Handwritten Documents

Reinforcement Learning by Comparing Immediate Reward

Lecture 1: Basic Concepts of Machine Learning

ISFA2008U_120 A SCHEDULING REINFORCEMENT LEARNING ALGORITHM

A Comparison of Standard and Interval Association Rules

Mining Association Rules in Student s Assessment Data

Artificial Neural Networks written examination

TD(λ) and Q-Learning Based Ludo Players

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA

Australian Journal of Basic and Applied Sciences

Softprop: Softmax Neural Network Backpropagation Learning

Top US Tech Talent for the Top China Tech Company

Lecture 10: Reinforcement Learning

Learning Methods for Fuzzy Systems

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

Reducing Features to Improve Bug Prediction

Impact of Cluster Validity Measures on Performance of Hybrid Models Based on K-means and Decision Trees

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification

A student diagnosing and evaluation system for laboratory-based academic exercises

Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics

Evolutive Neural Net Fuzzy Filtering: Basic Description

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Twitter Sentiment Classification on Sanders Data using Hybrid Approach

CS Machine Learning

Multisensor Data Fusion: From Algorithms And Architectural Design To Applications (Devices, Circuits, And Systems)

Generative models and adversarial training

Master s Programme in Computer, Communication and Information Sciences, Study guide , ELEC Majors

(Sub)Gradient Descent

Applications of data mining algorithms to analysis of medical data

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS ONLINE CERTIFICATE/DIPLOMA IN R/502/5326 LEVEL 2 UNIT 11

A Neural Network GUI Tested on Text-To-Phoneme Mapping

Probabilistic Latent Semantic Analysis

Handling Concept Drifts Using Dynamic Selection of Classifiers

Consultation skills teaching in primary care TEACHING CONSULTING SKILLS * * * * INTRODUCTION

Lecture 6: Applications

Firms and Markets Saturdays Summer I 2014

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

A Reinforcement Learning Variant for Control Scheduling

Business Analytics and Information Tech COURSE NUMBER: 33:136:494 COURSE TITLE: Data Mining and Business Intelligence

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

Semi-Supervised Face Detection

An investigation of imitation learning algorithms for structured prediction

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS

Deep search. Enhancing a search bar using machine learning. Ilgün Ilgün & Cedric Reichenbach

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

Exploration. CS : Deep Reinforcement Learning Sergey Levine

Assignment 1: Predicting Amazon Review Ratings

Learning Human Utility from Video Demonstrations for Deductive Planning in Robotics

Time series prediction

Iterative Cross-Training: An Algorithm for Learning from Unlabeled Web Pages

AUTOMATED FABRIC DEFECT INSPECTION: A SURVEY OF CLASSIFIERS

Geospatial Visual Analytics Tutorial. Gennady Andrienko & Natalia Andrienko

Semi-supervised methods of text processing, and an application to medical concept extraction. Yacine Jernite Text-as-Data series September 17.

arxiv: v1 [cs.lg] 15 Jun 2015

The Good Judgment Project: A large scale test of different methods of combining expert predictions

A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation

Speech Emotion Recognition Using Support Vector Machine

Courses in English. Application Development Technology. Artificial Intelligence. 2017/18 Spring Semester. Database access

Soft Computing based Learning for Cognitive Radio

AC : DESIGNING AN UNDERGRADUATE ROBOTICS ENGINEERING CURRICULUM: UNIFIED ROBOTICS I AND II

LEGO MINDSTORMS Education EV3 Coding Activities

Matching Similarity for Keyword-Based Clustering

Discriminative Learning of Beam-Search Heuristics for Planning

Knowledge-Based - Systems

Georgetown University at TREC 2017 Dynamic Domain Track

Learning From the Past with Experiment Databases

CLASSIFICATION OF TEXT DOCUMENTS USING INTEGER REPRESENTATION AND REGRESSION: AN INTEGRATED APPROACH

Causal Link Semantics for Narrative Planning Using Numeric Fluents

Intelligent Agents. Chapter 2. Chapter 2 1

TABLE OF CONTENTS TABLE OF CONTENTS COVER PAGE HALAMAN PENGESAHAN PERNYATAAN NASKAH SOAL TUGAS AKHIR ACKNOWLEDGEMENT FOREWORD

TUESDAYS/THURSDAYS, NOV. 11, 2014-FEB. 12, 2015 x COURSE NUMBER 6520 (1)

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models

AQUA: An Ontology-Driven Question Answering System

FF+FPG: Guiding a Policy-Gradient Planner

Analysis of Hybrid Soft and Hard Computing Techniques for Forex Monitoring Systems

Shockwheat. Statistics 1, Activity 1

Speeding Up Reinforcement Learning with Behavior Transfer

A Comparison of DHMM and DTW for Isolated Digits Recognition System of Arabic Language

Transcription:

CHAPTER 1: INTRODUCTION

Big Data 3 Widespread use of personal computers and wireless communication leads to big data We are both producers and consumers of data Data is not random, it has structure, e.g., customer behavior We need big theory to extract that structure from data for (a) Understanding the process (b) Making predictions for the future

Why Learn? 4 Machine learning is programming computers to optimize a performance criterion using example data or past experience. There is no need to learn to calculate payroll Learning is used when: Human expertise does not exist (navigating on Mars), Humans are unable to explain their expertise (speech recognition) Solution changes in time (routing on a computer network) Solution needs to be adapted to particular cases (user biometrics)

5 What We Talk About When We Talk About Learning Learning general models from a data of particular examples Data is cheap and abundant (data warehouses, data marts); knowledge is expensive and scarce. Example in retail: Customer transactions to consumer behavior: People who bought Blink also bought Outliers (www.amazon.com) Build a model that is a good and useful approximation to the data.

Data Mining 6 Retail: Market basket analysis, Customer relationship management (CRM) Finance: Credit scoring, fraud detection Manufacturing: Control, robotics, troubleshooting Medicine: Medical diagnosis Telecommunications: Spam filters, intrusion detection Bioinformatics: Motifs, alignment Web mining: Search engines...

What is Machine Learning? 7 Optimize a performance criterion using example data or past experience. Role of Statistics: Inference from a sample Role of Computer science: Efficient algorithms to Solve the optimization problem Representing and evaluating the model for inference

Applications 8 Association Supervised Learning Classification Regression Unsupervised Learning Reinforcement Learning

Learning Associations 9 Basket analysis: P (Y X ) probability that somebody who buys X also buys Y where X and Y are products/services. Example: P ( chips beer ) = 0.7

Classification 10 Example: Credit scoring Differentiating between low-risk and high-risk customers from their income and savings Discriminant: IF income > θ 1 AND savings > θ 2 THEN low-risk ELSE high-risk

Classification: Applications 11 Aka Pattern recognition Face recognition: Pose, lighting, occlusion (glasses, beard), make-up, hair style Character recognition: Different handwriting styles. Speech recognition: Temporal dependency. Medical diagnosis: From symptoms to illnesses Biometrics: Recognition/authentication using physical and/or behavioral characteristics: Face, iris, signature, etc Outlier/novelty detection:

Face Recognition 12 Training examples of a person Test images ORL dataset, AT&T Laboratories, Cambridge UK

Regression Example: Price of a used car x : car attributes y : price y = g (x q ) g ( ) model, q parameters y = wx+w 0 13

Regression Applications 14 Navigating a car: Angle of the steering Kinematics of a robot arm (x,y) α 1 = g 1 (x,y) α 2 = g 2 (x,y) α 2 α 1 Response surface design

Supervised Learning: Uses 15 Prediction of future cases: Use the rule to predict the output for future inputs Knowledge extraction: The rule is easy to understand Compression: The rule is simpler than the data it explains Outlier detection: Exceptions that are not covered by the rule, e.g., fraud

Unsupervised Learning 16 Learning what normally happens No output Clustering: Grouping similar instances Example applications Customer segmentation in CRM Image compression: Color quantization Bioinformatics: Learning motifs

Reinforcement Learning 17 Learning a policy: A sequence of outputs No supervised output but delayed reward Credit assignment problem Game playing Robot in a maze Multiple agents, partial observability,...

Resources: Datasets 18 UCI Repository: http://www.ics.uci.edu/~mlearn/mlrepository.html Statlib: http://lib.stat.cmu.edu/

Resources: Journals 19 Journal of Machine Learning Research www.jmlr.org Machine Learning Neural Computation Neural Networks IEEE Trans on Neural Networks and Learning Systems IEEE Trans on Pattern Analysis and Machine Intelligence Journals on Statistics/Data Mining/Signal Processing/Natural Language Processing/Bioinformatics/...

Resources: Conferences 20 International Conference on Machine Learning (ICML) European Conference on Machine Learning (ECML) Neural Information Processing Systems (NIPS) Uncertainty in Artificial Intelligence (UAI) Computational Learning Theory (COLT) International Conference on Artificial Neural Networks (ICANN) International Conference on AI & Statistics (AISTATS) International Conference on Pattern Recognition (ICPR)...