Cross channel correlations in tetrode recordings: implications for spike-sorting.

Size: px
Start display at page:

Download "Cross channel correlations in tetrode recordings: implications for spike-sorting."

Transcription

1 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 1 of 8 Cross channel correlations in tetrode recordings: implications for spike-sorting. Sergei P. Rebrik 1,*, Brian D. Wright 1,2, Alfred A. Emondi 1,4,5, and Kenneth D. Miller 1,2,3 1 Keck Center for Integrative Neuroscience and Department of Physiology, 2 Sloan Center for Theoretical Neurobiology, 3 Department of Otolaryngology, University of California at San Francisco, CA Institute for Sensory Research,L.C. Smith College of Engineering and Computer Science, Syracuse University,Syracuse, NY 5 Air Force Research Laboratory/IFGC, 525 Brooks Rd.,Rome, NY rebrik@phy.ucsf.edu, bdwright@phy.ucsf.edu, emondi@phy.ucsf.edu, ken@phy.ucsf.edu, *Corresponding author. Abstract We are exploring new methods of spike detection to improve spike-sorting in tetrode recordings. Based on our observation that the four channels of the tetrode carry highly correlated signals, we propose the use of a hyperellipsoidal thresholding surface in the 4-dimensional space of the signal values to detect spikes. This surface is determined by the cross-channel covariance matrix and provides a better approximation of the equiprobable surface of the noise amplitude distribution compared to the traditionally used hypercubical thresholding surface. This spike detection procedure greatly improves

2 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 2 of 8 the separation of signal clusters from the noise cluster around the origin. We have extended these approaches to automatic spike-sorting in both amplitude and full waveform spaces. Keywords: Tetrode; Spike-sorting; Multi-electrode recordings 1. Introduction Tetrodes allow recording from many nearby cells simultaneously and thus reveal short-range interactions of neurons. Though sorting of spikes in tetrode recordings is generally more reliable than that of traditional single-electrode recordings [1], the problem of assigning spikes to different neurons remains complicated and challenging. Typically, processing of neuronal recordings consists of two major stages: 1) detection of spikes and 2) spike-sorting. Much effort has been put into the problem of spike-sorting, while the first step has received less attention. Nevertheless, this step is very important for adequate assessment of cell interactions [2]: e.g., loss of a noticeable fraction of spikes from one neuron can lead to errors in calculating its degree of synchrony or reliability of synaptic connections with other neurons. 2. Spike detection problem A standard spike detection procedure compares the signal value (or a function thereof) with a preset threshold. When the threshold is crossed, a spike is detected. The threshold value is usually based on the estimate of the signal variance. The number of detected spikes grows rapidly as the threshold is lowered. If we assume a spherical Gaussian distribution of the amplitudes of spikes, a change in the threshold value from 4σ to 2σ (where σ is the standard deviation of the Gaussian distribution) will result in a 33-fold increase in the number of detected spikes. In practice, the change is not that dramatic (5 times and more). This increase in the spike number is due to the increase in

3 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 3 of 8 the number of low-amplitude spikes. Not all of these low-amplitude events can be clustered, since some of them are just noise outliers detected as spikes. Setting the threshold too high leads to missed spikes, while setting it too low leads to detection of many small-amplitude spikes that cannot be classified. So an optimal setting of the threshold is one that allows detection of all clusterable (useful) spikes while keeping the number of non-clusterable (garbage) spikes minimal. Different detection procedures can be compared by the ratio of useful spikes to the total number of spikes measured at the optimal (for the given procedure and the dataset) threshold setting. 3. Optimization of spike detection, and cross-channel correlations in tetrode recordings Our observations [2] show that noise in tetrode recordings in the cat visual cortex and in the LGN is highly correlated across channels (typical cross-channel correlation coefficient lies in the range of ). The observed cross-channel correlation is due to the common signal detected by all 4 electrodes within the tetrode. There are several possible origins of this common source: a) cross-electrode stray capacitances, b) variations in the potential of the reference ("ground") electrode, and c) truly biological noise coming from spiking activity of distant neurons. If the possibility (a) were realized, the tetrode would be incapable of producing any "stereo effect", i.e. registering spikes from the same neuron with significant difference in amplitudes across channels. Direct measurements in saline solution show that the capacitances of the electrode tips to the solution are several times bigger than the cross-electrode capacitances, ruling out origin (a). To test how much noise comes from the reference electrode, we measured crosschannel covariances of two tetrodes separated by a distance of a few millimeters. Crosschannel correlation coefficients within the same tetrode appeared to be relatively high:

4 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 4 of (as expected), while the coefficients of correlation across channels of different tetrodes were significantly smaller: In the case (b) (the "floating ground" problem) one would expect the correlation to be the same both within the individual tetrodes and across the tetrodes. Thus we are left with the case (c) - a biological origin of the common source, presumably due to activity of the surrounding neuronal population. Traditionally, thresholding is performed on each channel independently: if the threshold is crossed on at least one channel, a spike is detected. This algorithm corresponds to a hypercubical (box-shaped) thresholding surface that does not fit the spike amplitude distribution. The threshold crossing criterion is given by the expression: Any V i > f RMS, where V i is the voltage at the channel i, RMS is the estimate of the signal variance, and f is an arbitrarily chosen threshold factor. Due to the cross-channel correlation, the distribution of amplitudes of noise events detected as spikes (noise cluster) is elongated along the diagonal of the 4- dimensional hypercube formed by the four axes (after normalizing signals on all channels to have common range). Since the goal of the detection procedure is to exclude noise events while preserving "useful" spikes, it is natural to use a thresholding surface that fits the shape of the noise cluster. To build a hyperellipsoidal thresholding surface for this case, we first estimate the cross-channel covariance matrix, C, from random chunks of the data. For any given time the channel voltages can be represented as a 4-vector, V, and the threshold crossing criterion is given by the expression: V T C -1 V > f 2, where f is an arbitrarily chosen threshold factor. Note that different channel sensitivity is accounted for in the inverse of the covariance matrix.

5 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 5 of 8 4. Results To compare the two detection procedures outlined above we used the following method. We first marked and clustered spikes at a low value of the threshold, thus obtaining the number of all possibly clusterable spikes, N c0. Then we repeated the same procedure for several gradually increasing values of the threshold factor. For each threshold value we measured the number of clusterable spikes, N c, the number of spikes missing from the clusterable population, N m N c0 - N c, and the total number of detected spikes, N t. The results of the comparison are shown in Fig. 1a. An ideal detection procedure should have the percentage of clusterable spikes, p c N c / N t = 1, and the percentage of missing clusterable spikes p m N m / N t = 0. In a real spike detector these values depend on the threshold factor f. For very low values of f both p c 0 and p m 0, meaning that while no spikes are missing, most of the detected spikes are just noise events. With increasing f, both p c and p m start to grow, and a procedure that allows a bigger gap between p c and p m has better performance. It is clear from the graph that the hyperellipsoidal thresholding surface outperforms the hypercubical one. This becomes more obvious when the values of p c and p m are plotted as a function of the total number of detected spikes (Fig. 1b): for any given number of detected spikes, the hyperellipsoidal thresholding surface gives a bigger value of p c and smaller value of p m. For example, to avoid missing more than 5% of the clusterable spikes, one must analyze % more spikes in the hypercubical case. 5. Benefits for automatic clustering This method of thresholding using the shape of the noise surface is also of practical importance in automatic methods for spike-sorting. There are several problems in automatic spike-sorting that relate to thresholding methods. First, in the space of the

6 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 6 of 8 four spike amplitudes, clusters that invade the threshold boundary will be clipped, making inference of clusters difficult and less robust. Second, in the traditional thresholding method, when one lowers the threshold low enough to avoid significant clipping, one quickly becomes overwhelmed by the sheer number of spikes. Handling this amount of data is computationally infeasible and/or inefficient and the large number of garbage events can "break some clustering algorithms. Finally, an important issue in automatic methods is how to deal with outliers and noise events. One usually introduces "garbage clusters to deal with this. In the case of hyperellipsoidal thresholding, the garbage cluster for low amplitude noise is well determined by the cross-channel covariance matrix. Based on our previous discussion, the hyperellipsoidal thresholding method clearly helps alleviate all of these problems. We have implemented several automatic clustering methods, using our proposed thresholding technique. These include a mixture of Gaussians model to infer both the covariance structure of the clusters and the most probable number of cells in the recording, the latter determined using BIC as a complexity penalty (see e.g. [3]). We have also used this thresholding technique in the full 4-channel spike waveform space with an automatic clustering procedure using mixtures of probabilistic principal component analyzers [4-5]. We found marked differences in these automatic methods when coupled with the different thresholding techniques. Dramatic differences were seen in the proportion of spikes associated with a particular cluster and in the structure of the probability models describing clusters that were clipped by thresholding. These differences can potentially be important in, e.g., spike correlation analyses. 6. Conclusions Tetrode channels are highly correlated by neurobiological sources. We have proposed a new spike-detection procedure that fits the empirical noise distribution in the

7 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 7 of 8 4-dimensional space. Using this approach allows a significant decrease in the number of noise events that are inevitably detected along with actual spikes. Because of their better properties in characterizing the noise distribution and reducing the amount of cluster clipping, our new thresholding method also leads to improved performance in automatic clustering. Acknowledgements Work supported by grant R01-NS33787 from the NINDS (KM), by the Searles Scholars Program (KM), by a grant from the Alfred P. Sloan Foundation (KM) and by the AFRL (AE). References [1] C. Gray, P. Maldonado, M. Wilson and B. McNaughton, Tetrodes markedly improve the reliability and yield of multiple single-unit isolation from multi-unit recordings in cat striate cortex, J. Neur. Meth., 63(1-2) (1995) [2] S. Rebrik, S. Tzonev and K.D. Miller, Analysis of Tetrode Recordings in Cat Visual System, in Proceedings of CNS97 (Computation and Neural Systems Meeting, Big Sky Montana, July 1997), J.M Bower, ed. (Plenum Press, 1998). [3] B.D. Ripley, Pattern recognition and neural networks (Cambridge University Press, Cambridge, 1996). [4] S. Roweis, EM Algorithms for PCA and SPCA, in Advances in Neural Information Processing Systems, v.10, p.626, [5] M.E. Tipping and C.M. Bishop, Mixtures of Probabilistic Principal Component Analyzers, Aston University Neural Computing Research Group Technical Report NCRG/97/003, June 1997.

8 Rebrik, Wright, & Miller. Cross channel correlations in tetrode recordings. Page 8 of 8 (a) P e rc e n t T h re s h o ld F a c to r (b) P e rc e n t N u m b e r o f s p ik e s x Rebrik, Wright, Emondi, & Miller. Cross channel correlations in the tetrode recording. Fig. 1 of 1. Figure 1: Comparison of thresholding methods using percentages of clusterable and missing spikes when: a) the threshold factor is varied and b) the total number of spikes detected is varied. The open circles represent the percentage of clusterable events while the triangles represent the percentage of missing spikes as described in the text. The solid lines give results for the traditional hypercubical threshold, while the dashed lines are for the hyperellipsoidal case.

Principal components analysis

Principal components analysis CS229 Lecture notes Andrew Ng Part XI Principal components analysis In our discussion of factor analysis, we gave a way to model data x R n as approximately lying in some k-dimension subspace, where k

More information

Least Squares Estimation

Least Squares Estimation Least Squares Estimation SARA A VAN DE GEER Volume 2, pp 1041 1045 in Encyclopedia of Statistics in Behavioral Science ISBN-13: 978-0-470-86080-9 ISBN-10: 0-470-86080-4 Editors Brian S Everitt & David

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

Chapter 1. Spike Sorting. 1.1 Introduction

Chapter 1. Spike Sorting. 1.1 Introduction Chapter 1 Spike Sorting 1.1 Introduction The point process component of an extracellular recording results from the spiking activity of neurons in a background of physical and biological noise (Section

More information

Second Quarterly Progress Report NO1-DC-6-2111 The Neurophysiological Effects of Simulated Auditory Prosthesis Stimulation

Second Quarterly Progress Report NO1-DC-6-2111 The Neurophysiological Effects of Simulated Auditory Prosthesis Stimulation Second Quarterly Progress Report NO1-DC-6-2111 The Neurophysiological Effects of Simulated Auditory Prosthesis Stimulation J.T. Rubinstein, A.J. Matsuoka, P.J. Abbas, and C.A. Miller Department of Otolaryngology

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

Analysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j

Analysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j Analysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j What is Kiva? An organization that allows people to lend small amounts of money via the Internet

More information

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not. Statistical Learning: Chapter 4 Classification 4.1 Introduction Supervised learning with a categorical (Qualitative) response Notation: - Feature vector X, - qualitative response Y, taking values in C

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

PLASTIC REGION BOLT TIGHTENING CONTROLLED BY ACOUSTIC EMISSION MONITORING

PLASTIC REGION BOLT TIGHTENING CONTROLLED BY ACOUSTIC EMISSION MONITORING PLASTIC REGION BOLT TIGHTENING CONTROLLED BY ACOUSTIC EMISSION MONITORING TADASHI ONISHI, YOSHIHIRO MIZUTANI and MASAMI MAYUZUMI 2-12-1-I1-70, O-okayama, Meguro, Tokyo 152-8552, Japan. Abstract Troubles

More information

Using kernel methods to visualise crime data

Using kernel methods to visualise crime data Submission for the 2013 IAOS Prize for Young Statisticians Using kernel methods to visualise crime data Dr. Kieran Martin and Dr. Martin Ralphs kieran.martin@ons.gov.uk martin.ralphs@ons.gov.uk Office

More information

How To Solve The Cluster Algorithm

How To Solve The Cluster Algorithm Cluster Algorithms Adriano Cruz adriano@nce.ufrj.br 28 de outubro de 2013 Adriano Cruz adriano@nce.ufrj.br () Cluster Algorithms 28 de outubro de 2013 1 / 80 Summary 1 K-Means Adriano Cruz adriano@nce.ufrj.br

More information

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus Please do not remove this manual from from the lab. It is available at www.cm.ph.bham.ac.uk/y2lab Optics Introduction Optical fibres are widely used for transmitting data at high speeds. In this experiment,

More information

Self Organizing Maps: Fundamentals

Self Organizing Maps: Fundamentals Self Organizing Maps: Fundamentals Introduction to Neural Networks : Lecture 16 John A. Bullinaria, 2004 1. What is a Self Organizing Map? 2. Topographic Maps 3. Setting up a Self Organizing Map 4. Kohonen

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

Predicting Flight Delays

Predicting Flight Delays Predicting Flight Delays Dieterich Lawson jdlawson@stanford.edu William Castillo will.castillo@stanford.edu Introduction Every year approximately 20% of airline flights are delayed or cancelled, costing

More information

6.2.8 Neural networks for data mining

6.2.8 Neural networks for data mining 6.2.8 Neural networks for data mining Walter Kosters 1 In many application areas neural networks are known to be valuable tools. This also holds for data mining. In this chapter we discuss the use of neural

More information

Part 2: Analysis of Relationship Between Two Variables

Part 2: Analysis of Relationship Between Two Variables Part 2: Analysis of Relationship Between Two Variables Linear Regression Linear correlation Significance Tests Multiple regression Linear Regression Y = a X + b Dependent Variable Independent Variable

More information

CROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES

CROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES Proceedings of the 2 nd Workshop of the EARSeL SIG on Land Use and Land Cover CROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES Sebastian Mader

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

Clarify Some Issues on the Sparse Bayesian Learning for Sparse Signal Recovery

Clarify Some Issues on the Sparse Bayesian Learning for Sparse Signal Recovery Clarify Some Issues on the Sparse Bayesian Learning for Sparse Signal Recovery Zhilin Zhang and Bhaskar D. Rao Technical Report University of California at San Diego September, Abstract Sparse Bayesian

More information

Canny Edge Detection

Canny Edge Detection Canny Edge Detection 09gr820 March 23, 2009 1 Introduction The purpose of edge detection in general is to significantly reduce the amount of data in an image, while preserving the structural properties

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Lecture 9: Introduction to Pattern Analysis

Lecture 9: Introduction to Pattern Analysis Lecture 9: Introduction to Pattern Analysis g Features, patterns and classifiers g Components of a PR system g An example g Probability definitions g Bayes Theorem g Gaussian densities Features, patterns

More information

Introduction to the Monte Carlo method

Introduction to the Monte Carlo method Some history Simple applications Radiation transport modelling Flux and Dose calculations Variance reduction Easy Monte Carlo Pioneers of the Monte Carlo Simulation Method: Stanisław Ulam (1909 1984) Stanislaw

More information

Simple Linear Regression Inference

Simple Linear Regression Inference Simple Linear Regression Inference 1 Inference requirements The Normality assumption of the stochastic term e is needed for inference even if it is not a OLS requirement. Therefore we have: Interpretation

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

Data Preparation and Statistical Displays

Data Preparation and Statistical Displays Reservoir Modeling with GSLIB Data Preparation and Statistical Displays Data Cleaning / Quality Control Statistics as Parameters for Random Function Models Univariate Statistics Histograms and Probability

More information

ELECTRON SPIN RESONANCE Last Revised: July 2007

ELECTRON SPIN RESONANCE Last Revised: July 2007 QUESTION TO BE INVESTIGATED ELECTRON SPIN RESONANCE Last Revised: July 2007 How can we measure the Landé g factor for the free electron in DPPH as predicted by quantum mechanics? INTRODUCTION Electron

More information

Functional Data Analysis of MALDI TOF Protein Spectra

Functional Data Analysis of MALDI TOF Protein Spectra Functional Data Analysis of MALDI TOF Protein Spectra Dean Billheimer dean.billheimer@vanderbilt.edu. Department of Biostatistics Vanderbilt University Vanderbilt Ingram Cancer Center FDA for MALDI TOF

More information

How To Cluster

How To Cluster Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main

More information

Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012

Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012 Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization GENOME 560, Spring 2012 Data are interesting because they help us understand the world Genomics: Massive Amounts

More information

These help quantify the quality of a design from different perspectives: Cost Functionality Robustness Performance Energy consumption

These help quantify the quality of a design from different perspectives: Cost Functionality Robustness Performance Energy consumption Basic Properties of a Digital Design These help quantify the quality of a design from different perspectives: Cost Functionality Robustness Performance Energy consumption Which of these criteria is important

More information

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information

More information

Joint models for classification and comparison of mortality in different countries.

Joint models for classification and comparison of mortality in different countries. Joint models for classification and comparison of mortality in different countries. Viani D. Biatat 1 and Iain D. Currie 1 1 Department of Actuarial Mathematics and Statistics, and the Maxwell Institute

More information

Performance Metrics for Graph Mining Tasks

Performance Metrics for Graph Mining Tasks Performance Metrics for Graph Mining Tasks 1 Outline Introduction to Performance Metrics Supervised Learning Performance Metrics Unsupervised Learning Performance Metrics Optimizing Metrics Statistical

More information

Advanced Ensemble Strategies for Polynomial Models

Advanced Ensemble Strategies for Polynomial Models Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer

More information

Factor Analysis. Chapter 420. Introduction

Factor Analysis. Chapter 420. Introduction Chapter 420 Introduction (FA) is an exploratory technique applied to a set of observed variables that seeks to find underlying factors (subsets of variables) from which the observed variables were generated.

More information

GRADES 7, 8, AND 9 BIG IDEAS

GRADES 7, 8, AND 9 BIG IDEAS Table 1: Strand A: BIG IDEAS: MATH: NUMBER Introduce perfect squares, square roots, and all applications Introduce rational numbers (positive and negative) Introduce the meaning of negative exponents for

More information

1 Example of Time Series Analysis by SSA 1

1 Example of Time Series Analysis by SSA 1 1 Example of Time Series Analysis by SSA 1 Let us illustrate the 'Caterpillar'-SSA technique [1] by the example of time series analysis. Consider the time series FORT (monthly volumes of fortied wine sales

More information

CLUSTER ANALYSIS FOR SEGMENTATION

CLUSTER ANALYSIS FOR SEGMENTATION CLUSTER ANALYSIS FOR SEGMENTATION Introduction We all understand that consumers are not all alike. This provides a challenge for the development and marketing of profitable products and services. Not every

More information

CALCULATIONS & STATISTICS

CALCULATIONS & STATISTICS CALCULATIONS & STATISTICS CALCULATION OF SCORES Conversion of 1-5 scale to 0-100 scores When you look at your report, you will notice that the scores are reported on a 0-100 scale, even though respondents

More information

The Correlation Coefficient

The Correlation Coefficient The Correlation Coefficient Lelys Bravo de Guenni April 22nd, 2015 Outline The Correlation coefficient Positive Correlation Negative Correlation Properties of the Correlation Coefficient Non-linear association

More information

Visualization by Linear Projections as Information Retrieval

Visualization by Linear Projections as Information Retrieval Visualization by Linear Projections as Information Retrieval Jaakko Peltonen Helsinki University of Technology, Department of Information and Computer Science, P. O. Box 5400, FI-0015 TKK, Finland jaakko.peltonen@tkk.fi

More information

ZETA POTENTIAL ANALYSIS OF NANOPARTICLES

ZETA POTENTIAL ANALYSIS OF NANOPARTICLES ZETA POTENTIAL ANALYSIS OF NANOPARTICLES SEPTEMBER 2012, V 1.1 4878 RONSON CT STE K SAN DIEGO, CA 92111 858-565 - 4227 NANOCOMPOSIX.COM Note to the Reader: We at nanocomposix have published this document

More information

Structural Health Monitoring Tools (SHMTools)

Structural Health Monitoring Tools (SHMTools) Structural Health Monitoring Tools (SHMTools) Getting Started LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014 Contents

More information

Cluster Analysis: Advanced Concepts

Cluster Analysis: Advanced Concepts Cluster Analysis: Advanced Concepts and dalgorithms Dr. Hui Xiong Rutgers University Introduction to Data Mining 08/06/2006 1 Introduction to Data Mining 08/06/2006 1 Outline Prototype-based Fuzzy c-means

More information

Descriptive statistics Statistical inference statistical inference, statistical induction and inferential statistics

Descriptive statistics Statistical inference statistical inference, statistical induction and inferential statistics Descriptive statistics is the discipline of quantitatively describing the main features of a collection of data. Descriptive statistics are distinguished from inferential statistics (or inductive statistics),

More information

NEW METHODS OF DATING IN ARCHAEOLOGY

NEW METHODS OF DATING IN ARCHAEOLOGY GEOCHRONOMETRIA Vol. 23, pp 39-43, 2004 Journal on Methods and Applications of Absolute Chronology NEW METHODS OF DATING IN ARCHAEOLOGY VALENTIN DERGACHEV and SERGEY VASILIEV Ioffe Physico-Technical Institute,

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

AN EXPERT SYSTEM TO ANALYZE HOMOGENEITY IN FUEL ELEMENT PLATES FOR RESEARCH REACTORS

AN EXPERT SYSTEM TO ANALYZE HOMOGENEITY IN FUEL ELEMENT PLATES FOR RESEARCH REACTORS AN EXPERT SYSTEM TO ANALYZE HOMOGENEITY IN FUEL ELEMENT PLATES FOR RESEARCH REACTORS Cativa Tolosa, S. and Marajofsky, A. Comisión Nacional de Energía Atómica Abstract In the manufacturing control of Fuel

More information

Operation Count; Numerical Linear Algebra

Operation Count; Numerical Linear Algebra 10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Models of Cortical Maps II

Models of Cortical Maps II CN510: Principles and Methods of Cognitive and Neural Modeling Models of Cortical Maps II Lecture 19 Instructor: Anatoli Gorchetchnikov dy dt The Network of Grossberg (1976) Ay B y f (

More information

Structural Analysis of Network Traffic Flows Eric Kolaczyk

Structural Analysis of Network Traffic Flows Eric Kolaczyk Structural Analysis of Network Traffic Flows Eric Kolaczyk Anukool Lakhina, Dina Papagiannaki, Mark Crovella, Christophe Diot, and Nina Taft Traditional Network Traffic Analysis Focus on Short stationary

More information

Machine Learning and Pattern Recognition Logistic Regression

Machine Learning and Pattern Recognition Logistic Regression Machine Learning and Pattern Recognition Logistic Regression Course Lecturer:Amos J Storkey Institute for Adaptive and Neural Computation School of Informatics University of Edinburgh Crichton Street,

More information

Novelty Detection in image recognition using IRF Neural Networks properties

Novelty Detection in image recognition using IRF Neural Networks properties Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,

More information

SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS. J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID

SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS. J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID Renewable Energy Laboratory Department of Mechanical and Industrial Engineering University of

More information

Alignment and Preprocessing for Data Analysis

Alignment and Preprocessing for Data Analysis Alignment and Preprocessing for Data Analysis Preprocessing tools for chromatography Basics of alignment GC FID (D) data and issues PCA F Ratios GC MS (D) data and issues PCA F Ratios PARAFAC Piecewise

More information

Uses of Derivative Spectroscopy

Uses of Derivative Spectroscopy Uses of Derivative Spectroscopy Application Note UV-Visible Spectroscopy Anthony J. Owen Derivative spectroscopy uses first or higher derivatives of absorbance with respect to wavelength for qualitative

More information

A successful market segmentation initiative answers the following critical business questions: * How can we a. Customer Status.

A successful market segmentation initiative answers the following critical business questions: * How can we a. Customer Status. MARKET SEGMENTATION The simplest and most effective way to operate an organization is to deliver one product or service that meets the needs of one type of customer. However, to the delight of many organizations

More information

Measurement with Ratios

Measurement with Ratios Grade 6 Mathematics, Quarter 2, Unit 2.1 Measurement with Ratios Overview Number of instructional days: 15 (1 day = 45 minutes) Content to be learned Use ratio reasoning to solve real-world and mathematical

More information

MUSICAL INSTRUMENT FAMILY CLASSIFICATION

MUSICAL INSTRUMENT FAMILY CLASSIFICATION MUSICAL INSTRUMENT FAMILY CLASSIFICATION Ricardo A. Garcia Media Lab, Massachusetts Institute of Technology 0 Ames Street Room E5-40, Cambridge, MA 039 USA PH: 67-53-0 FAX: 67-58-664 e-mail: rago @ media.

More information

New Work Item for ISO 3534-5 Predictive Analytics (Initial Notes and Thoughts) Introduction

New Work Item for ISO 3534-5 Predictive Analytics (Initial Notes and Thoughts) Introduction Introduction New Work Item for ISO 3534-5 Predictive Analytics (Initial Notes and Thoughts) Predictive analytics encompasses the body of statistical knowledge supporting the analysis of massive data sets.

More information

Support Vector Machine (SVM)

Support Vector Machine (SVM) Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin

More information

Chapter ML:XI (continued)

Chapter ML:XI (continued) Chapter ML:XI (continued) XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained

More information

Signpost the Future: Simultaneous Robust and Design Optimization of a Knee Bolster

Signpost the Future: Simultaneous Robust and Design Optimization of a Knee Bolster Signpost the Future: Simultaneous Robust and Design Optimization of a Knee Bolster Tayeb Zeguer Jaguar Land Rover W/1/012, Engineering Centre, Abbey Road, Coventry, Warwickshire, CV3 4LF tzeguer@jaguar.com

More information

Epipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R.

Epipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R. Epipolar Geometry We consider two perspective images of a scene as taken from a stereo pair of cameras (or equivalently, assume the scene is rigid and imaged with a single camera from two different locations).

More information

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step

More information

Forecasting the U.S. Stock Market via Levenberg-Marquardt and Haken Artificial Neural Networks Using ICA&PCA Pre-Processing Techniques

Forecasting the U.S. Stock Market via Levenberg-Marquardt and Haken Artificial Neural Networks Using ICA&PCA Pre-Processing Techniques Forecasting the U.S. Stock Market via Levenberg-Marquardt and Haken Artificial Neural Networks Using ICA&PCA Pre-Processing Techniques Golovachev Sergey National Research University, Higher School of Economics,

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

POLYNOMIAL AND MULTIPLE REGRESSION. Polynomial regression used to fit nonlinear (e.g. curvilinear) data into a least squares linear regression model.

POLYNOMIAL AND MULTIPLE REGRESSION. Polynomial regression used to fit nonlinear (e.g. curvilinear) data into a least squares linear regression model. Polynomial Regression POLYNOMIAL AND MULTIPLE REGRESSION Polynomial regression used to fit nonlinear (e.g. curvilinear) data into a least squares linear regression model. It is a form of linear regression

More information

T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577

T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577 T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier Santosh Tirunagari : 245577 January 20, 2011 Abstract This term project gives a solution how to classify an email as spam or

More information

is refractory for some period of time following its occurval, of the intensity of the stimuli at a given interrence

is refractory for some period of time following its occurval, of the intensity of the stimuli at a given interrence J.Comp. Physiological Psychology 1973, Vol. 83, No. 3, 492-498 Refractory Period and Habituation of Acoustic Startle Response in Rats Charles J. Wilson and Philip M. Groves Department of Psychology, University

More information

Body Area Network Security: Robust Secret Sharing

Body Area Network Security: Robust Secret Sharing Body Area Network Security: Robust Secret Sharing Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang University of Illinois Body Area Network Background Body area network (BAN) consists

More information

Bi 360: Midterm Review

Bi 360: Midterm Review Bi 360: Midterm Review Basic Neurobiology 1) Many axons are surrounded by a fatty insulating sheath called myelin, which is interrupted at regular intervals at the Nodes of Ranvier, where the action potential

More information

Common Core Unit Summary Grades 6 to 8

Common Core Unit Summary Grades 6 to 8 Common Core Unit Summary Grades 6 to 8 Grade 8: Unit 1: Congruence and Similarity- 8G1-8G5 rotations reflections and translations,( RRT=congruence) understand congruence of 2 d figures after RRT Dilations

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

B E F O R E V E N T U R I N G I N T O T H E S U B J E C T O F S A M P L E D E P T H A N D C H R O N O L -

B E F O R E V E N T U R I N G I N T O T H E S U B J E C T O F S A M P L E D E P T H A N D C H R O N O L - B E F O R E V E N T U R I N G I N T O T H E S U B J E C T O F S A M P L E D E P T H A N D C H R O N O L - O G Y Q U A L I T Y, W E S TAT E F R O M T H E B E G I N N I N G M O R E I S A L W AY S B E T-

More information

Location matters. 3 techniques to incorporate geo-spatial effects in one's predictive model

Location matters. 3 techniques to incorporate geo-spatial effects in one's predictive model Location matters. 3 techniques to incorporate geo-spatial effects in one's predictive model Xavier Conort xavier.conort@gear-analytics.com Motivation Location matters! Observed value at one location is

More information

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta].

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta]. 1.3 Neural Networks 19 Neural Networks are large structured systems of equations. These systems have many degrees of freedom and are able to adapt to the task they are supposed to do [Gupta]. Two very

More information

Classification Problems

Classification Problems Classification Read Chapter 4 in the text by Bishop, except omit Sections 4.1.6, 4.1.7, 4.2.4, 4.3.3, 4.3.5, 4.3.6, 4.4, and 4.5. Also, review sections 1.5.1, 1.5.2, 1.5.3, and 1.5.4. Classification Problems

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.cs.toronto.edu/~rsalakhu/ Lecture 6 Three Approaches to Classification Construct

More information

Biological Neurons and Neural Networks, Artificial Neurons

Biological Neurons and Neural Networks, Artificial Neurons Biological Neurons and Neural Networks, Artificial Neurons Neural Computation : Lecture 2 John A. Bullinaria, 2015 1. Organization of the Nervous System and Brain 2. Brains versus Computers: Some Numbers

More information

Support Vector Machines with Clustering for Training with Very Large Datasets

Support Vector Machines with Clustering for Training with Very Large Datasets Support Vector Machines with Clustering for Training with Very Large Datasets Theodoros Evgeniou Technology Management INSEAD Bd de Constance, Fontainebleau 77300, France theodoros.evgeniou@insead.fr Massimiliano

More information

Multivariate Analysis of Ecological Data

Multivariate Analysis of Ecological Data Multivariate Analysis of Ecological Data MICHAEL GREENACRE Professor of Statistics at the Pompeu Fabra University in Barcelona, Spain RAUL PRIMICERIO Associate Professor of Ecology, Evolutionary Biology

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

99.37, 99.38, 99.38, 99.39, 99.39, 99.39, 99.39, 99.40, 99.41, 99.42 cm

99.37, 99.38, 99.38, 99.39, 99.39, 99.39, 99.39, 99.40, 99.41, 99.42 cm Error Analysis and the Gaussian Distribution In experimental science theory lives or dies based on the results of experimental evidence and thus the analysis of this evidence is a critical part of the

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승 Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승 How much energy do we need for brain functions? Information processing: Trade-off between energy consumption and wiring cost Trade-off between energy consumption

More information

Robust Outlier Detection Technique in Data Mining: A Univariate Approach

Robust Outlier Detection Technique in Data Mining: A Univariate Approach Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,

More information

Review Jeopardy. Blue vs. Orange. Review Jeopardy

Review Jeopardy. Blue vs. Orange. Review Jeopardy Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?

More information

Exploratory data analysis (Chapter 2) Fall 2011

Exploratory data analysis (Chapter 2) Fall 2011 Exploratory data analysis (Chapter 2) Fall 2011 Data Examples Example 1: Survey Data 1 Data collected from a Stat 371 class in Fall 2005 2 They answered questions about their: gender, major, year in school,

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Selected Topics in Electrical Engineering: Flow Cytometry Data Analysis

Selected Topics in Electrical Engineering: Flow Cytometry Data Analysis Selected Topics in Electrical Engineering: Flow Cytometry Data Analysis Bilge Karaçalı, PhD Department of Electrical and Electronics Engineering Izmir Institute of Technology Outline Compensation and gating

More information

Tutorial on Exploratory Data Analysis

Tutorial on Exploratory Data Analysis Tutorial on Exploratory Data Analysis Julie Josse, François Husson, Sébastien Lê julie.josse at agrocampus-ouest.fr francois.husson at agrocampus-ouest.fr Applied Mathematics Department, Agrocampus Ouest

More information

Exploratory data analysis for microarray data

Exploratory data analysis for microarray data Eploratory data analysis for microarray data Anja von Heydebreck Ma Planck Institute for Molecular Genetics, Dept. Computational Molecular Biology, Berlin, Germany heydebre@molgen.mpg.de Visualization

More information

PASSENGER/PEDESTRIAN ANALYSIS BY NEUROMORPHIC VISUAL INFORMATION PROCESSING

PASSENGER/PEDESTRIAN ANALYSIS BY NEUROMORPHIC VISUAL INFORMATION PROCESSING PASSENGER/PEDESTRIAN ANALYSIS BY NEUROMORPHIC VISUAL INFORMATION PROCESSING Woo Joon Han Il Song Han Korea Advanced Science and Technology Republic of Korea Paper Number 13-0407 ABSTRACT The physiological

More information

Building 1D reference velocity model of the Irpinia region (Southern Apennines): microearthquakes locations and focal mechanism

Building 1D reference velocity model of the Irpinia region (Southern Apennines): microearthquakes locations and focal mechanism Building 1D reference velocity model of the Irpinia region (Southern Apennines): microearthquakes locations and focal mechanism Tutor Prof. Raffaella De Matteis PhD student Emanuela Matrullo Geophisics

More information

Understanding the Impact of Weights Constraints in Portfolio Theory

Understanding the Impact of Weights Constraints in Portfolio Theory Understanding the Impact of Weights Constraints in Portfolio Theory Thierry Roncalli Research & Development Lyxor Asset Management, Paris thierry.roncalli@lyxor.com January 2010 Abstract In this article,

More information