Real Time Traffic Monitoring With Bayesian Belief Networks
|
|
- Rolf Harvey
- 8 years ago
- Views:
Transcription
1 Real Time Traffic Monitoring With Bayesian Belief Networks Sicco Pier van Gosliga TNO Defence, Security and Safety, P.O.Box 96864, 2509 JG The Hague, The Netherlands , Paul van Koningsbruggen TNO Defence, Security and Safety P.O.Box 96864, 2509 JG The Hague, The Netherlands , Ronald van Katwijk TNO Environment and Geosciences P.O.Box 49, 2600 AA Delft, The Netherlands , ABSTRACT Modern traffic management systems are, we believe, best implemented as multi-agent systems. When multiple agents have to make decisions on shared knowledge, this knowledge incorporates the uncertainty of underlying information and sensor systems. One approach to deal with uncertainty is the use of probabilistic models called Belief Networks. However, calculating with these models is a NP-hard problem. In order to apply this technology we had to break down its complexity for our specific case. This paper discusses the design choices that we made to boost the performance of our Bayesian belief network and thereby enabling this technique for real-time traffic monitoring in multi-agent systems. INTRODUCTION Traffic management pursues an optimal use of the available infrastructure in terms of traffic flow, safety and quality of life along the road. Over the past decade the number of traffic management instruments has increased rapidly. Ramp metering controls the traffic and throughput at certain hot spots on the road. Variable message signs can instruct drivers to adapt their driving in order to increase safety or lower the level of emissions. The challenge is to select appropriate non-conflicting measures to optimise the quality of the traffic network. Before such decisions can be made, a sound picture of the current traffic situation must be established. Multiple data and information sources are available, but each of them can only partly observe the actual situation and inevitably suffer from some
2 level of inaccuracy. The overall picture inherits this uncertainty, but information systems rarely take this into account explicitly. We envision a hypothesis management system to fuse all sensor data. The method that is discussed in this paper will merge heterogeneous sensor data and other information sources and deal with its uncertainties in a consistent and sound manner. The merging of different types of observations gives the extra opportunity to determine the likelihood of unobserved events that could not have been detected by processing different types of sensors independently from each other. The overall picture that results from this enrichment process will therefore be more reliant and complete. Using this methodology, we want to build a traffic monitoring system to aid decision making for traffic management. The system will be used to recognize the current traffic situation at certain places along a traffic network. The proposed system will function as an intelligent mediator between the sensors and the decision making process. BELIEF NETWORKS The classical approach to reasoning is logical and deterministic. Computers excel in logical reasoning. Rule-based expert systems take this to full advantage. For this reason computer systems have been introduced to substitute and aid human reasoning for many applications. However, not all domains comply with static deterministic rules. Especially traffic networks are highly dynamic and compromise many noisy and partially observable events. Therefore, we need a technology for intelligent transportation systems that can deal with these factors adequately. Amongst systems that are specifically designed for dynamic and chaotic domains, Bayesian belief networks are gaining popularity as de facto standard for reasoning with uncertainty. t=0 (t=0) (t=0) probability (t=0) (t=0) probability good slow 10% good light traffic 50% good normal 90% good dense traffic 50% bad slow 80% bad light traffic 30% bad normal 20% bad dense traffic 70% () (t=0) () probability good light traffic light traffic 70% good dense traffic light traffic 30% bad light traffic light traffic 50% bad dense traffic light traffic 10% (t=0) () probability probability good good 80% good 95% good bad 20% bad 5% bad good 10% bad bad 90% Figure 1: An example of a belief network, on left the graph and on right the corresponding al probability tables.
3 Figure 2: The belief network structure maps onto the topology of the traffic network. Time is modelled by using time-slices. Belief networks are causal models that describe a domain of interest. It uses a visual approach in the form of a graph. In such a structure we can describe variables in our domain and the relations that exist between them. It is a powerful framework for automated reasoning that is capable of dealing with uncertainties in a consistent and mathematically sound manner. It uses the Bayesian view on probability, introduced by Thomas Bayes in the 18 th century [2], which describes the mathematical relation between the probability of an event given knowledge of previous experiences and current observations. There are many proper, but different, ways to design a causal structure for a domain. The topology of the graph should suit the application. In the case of a Traffic Management system, the timing as well as the location of events plays an important role for situational awareness. An elegant way to express these dimensions is the use of time-slices [7]. The graph is built in horizontal layers that consist of variables related to the same moment in time. The arcs visualize a cause and effect relationship between probability variables. For each node (i.e. a probability variable) a table describes how the dependencies with other nodes affect its state. These tables are called al probability tables (CPT) and contain our so-called prior knowledge. For the traffic network model shown in this paper traffic, traffic and
4 traffic at certain locations where chosen as probability variables. For example, in the traffic model the of vehicles at a certain spot influences traffic further down the route. The relations are expressed in degrees of belief. Figure 3: To test the applicability of our belief network we used the GeNIe modelling environment developed by the Decision Systems Laboratory of the University of Pittsburgh ( When Bayesian networks are applied, we face three technical difficulties: 1. The definition of prior knowledge requires the collection a considerable amount of hard-to-get prior knowledge from domain experts or other sources. 2. The algorithms for reasoning with Bayesian networks are computationally complex [1] and their performance is possibly inadequate for large-scale realtime systems in complex domains. 3. Bayesian reasoning is hard to use in a distributed system. The reasoning process does not solely rely on local knowledge. We will now discuss these issues and propose solutions to solve them. DEFINING PRIOR KNOWLEDGE Often, the process of engineering all the CPT's is a laborious and sometimes infeasible task. Each relation in a belief network should be defined. Doing this manually takes a considerable effort. The validation of this knowledge may become an impossible task. An alternative to manually defined prior knowledge is found in
5 automated learning of the al probability tables. All the probabilities within the CPT's can be learned or trained automatically by simulation and actual sensor data. Figure 4: The Paramics software package was used to learn the al probabilities tables of the belief network, based on simulation. In order to demonstrate this, a simulated traffic network was modelled with the traffic micro simulator Paramics, developed by Quadstone Limited. We ran a simulation for each of the traffic situations that we wanted the system to be able to recognize. The outcomes of these runs were translated to al probabilities by using frequency analysis. Simulation is an effective instrument for deriving CPT values for rare events that do not occur frequently. Domain experts may lack the experience to define accurate probabilities for such events. Real traffic data could also be used. When real traffic data is available, it could be used for on-line training to keep the system up to date with new trends. However, one should be cautious for incomplete and possibly faulty sensor information. These uncertainties should be reflected in the CPT s. On-line learning by using sensor data is an interesting option, when used to update the prior knowledge in the CPT in a balanced manner. REAL-TIME REASONING Reasoning in a belief network can be done in multiple ways. There are in general two approaches to calculating the likelihood of a hypothesis in a belief network. Approximate algorithms are used for estimates of the likelihood. It basically simulates the events in the belief network by repeatedly throwing virtual balls into the belief
6 network that are guided by the arcs. This method is computationally cheap, but is less suitable for determining the likelihood of rare events. Exact reasoning uses Bayes theorem to exactly calculate this likelihood. Calculating the exact likelihood of events is a mathematically complex problem, a so-called NP-hard class problem (e.g. like scheduling or the travellers agent problem). This may result in long computation times. The two main algorithms for exact reasoning are the junction tree method by Spiegelhalter [4] and the lambda-pi message passing method by Pearl [3]. Both algorithms are very efficient. Pearls algorithm is easy to apply in a distributed system, but it has difficulties with some specific types of large networks. Spiegelhalter algorithm can deal with all types of networks in a very efficient way, but is less flexible with respect to distributed systems. algorithm quality drawback Bayes ball very fast makes estimates and ignores unlikely events Pearl exact answers can t be used for large loopy networks Spiegelhalter exact answers is hard to use in distributed systems Table 1: A comparison of various methods to calculate belief networks. Although Bayesian systems are not commonly used for real-time systems, successful applications do exist. A popular application for Bayesian reasoning is the spam filter for as proposed by Heckerman and Horvitz [6]. This system uses a large belief network to calculate the probability of a new message being spam. It uses on-line a learning algorithm based on frequency analysis. Surprisingly, this application works in real time despite the large network that is used. It does not suffer from the NP-hard complexity of the underlying algorithm, because of the special structure of the network. It has a very flat topology that does not have any loops and each node has only one parent. The structure describes the causal dependencies accurately but in a heavily simplified form. Many causal relations that may exist are ignored for the sake of performance. The technique is therefore referred to as a Naive Bayesian Classifier. Nevertheless it is a very effective method and is known to work considerably better than alternative techniques based on (heuristic) rules. The success of this application inspired us to make some drastic design choices. Minimizing the size of CPT's All prior knowledge is used in the calculation, therefore the more knowledge is encoded in the CPT the more computation time is needed. Decreasing the size of CPT s can be done by minimizing the number of possible states for each probability variable. If all probability variables have only two states, then the size of the CPT for that variable will double for each extra al dependency (i.e. parent of a node). Therefore it is wise to limit the number of parents and only include the causal relations that really matter. The negative impact on the outcomes may be marginal, while the performance will significantly improve. By limiting the number of parents for each variable we have greatly reduced the size of the CPT's. Minimizing the presence of loops The structure has a great impact on the performance of reasoning algorithms. This is partly because the structure influences the size of the CPT's. Another important issue on the structure of belief networks is the presence of multiple paths between two nodes. When there are multiple paths of reasoning exist between a common cause and
7 a common goal, computation time grows exponentially to the number of paths. An effective way to improve the performance is to get rid of as many multiple paths as possible. This will result in a polytree: a belief network that does not have any loops. We removed all loops, while keeping the causal structure intact for the strongest relations (networks C and D in table 2). Minimizing the depth of the network Bayesian reasoning (independent of the used algorithm) works in two directions: diagnostic reasoning and causal reasoning. Evidence is an observed value for a variable. Diagnostic reasoning searches for causes that may explain the observation, where causal reasoning searches for effects of the observation. When diagnostic reasoning affects the likelihood of unobserved variables, it triggers causal reasoning from those variables. For this reason the location of evidence is of importance to the performance. By limiting the depth of network we reduced the number of possible causes for each variable. belief network A belief network C t=0 t=0 belief network B belief network D t=0 t=0 network complexity nodes length timelayers performance millisec. A ,23 B ,09 C < 0,01 D < 0,01 Table 2: A comparison of various ways to use belief networks.
8 DISTRIBUTED SYSTEMS Instead of sending raw sensor data to a central server, crucial information can already be extracted at the sensor level itself. This information can then be fused with other pieces of information in the network. To accomplish this, each sensor needs to be equipped with a processor and a data-communication facility. Given appropriate design, a sensor can be regarded as an intelligent agent. Hence, a group of sensor nodes can create a multi-agent system in which nodes share a task and cooperate using inter-sensor communication. The advantage of distributed networks is that better extraction of locally available information is obtained. This is because sharing the results of local computations concerning locally available sensor information often strongly reduces the need for further data interpretation. In a distributed system computations can be done parallel to up the calculation. For our research project we have used an implementation of the Spiegelhalters algorithm on a single computer. Because one single agent was used for Bayesian reasoning we did not benefit from parallel processing. Spiegelhalters algorithm is considered to be less suitable for distributed systems, especially when these systems are dynamic. However, by assigning pre-defined overlapping parts of the traffic network to agents, information can be locally processed independently from other parts or agents. When the network changes (e.g. by opening new road segments) one only has to update the agents assigned to that segment. For a standard method to distribute belief networks, using the junction tree method of Spiegelhalter, see [5]. CONCLUSION Belief networks are quickly becoming de facto standard for reasoning with uncertainty. Although various reasons make it difficult to use belief networks for decision aid for complex domains like traffic management, the difficulties that come with the method are solvable. The proposed solutions are simple and practical, but very effective: 1. simulation is used to define al probabilities 2. modest simplifications to the model can boost performance 3. predefined belief networks can be used in distributed systems The software that was developed during the research project shows that a real-time system for traffic monitoring is indeed feasible. Although it was feared that the design choices would have a negative impact on the quality of the system, this is not necessarily the case. Furthermore, by choosing belief networks we benefit from the growing number of tools, techniques and algorithms that are available for this methodology. FURTHER WORK Currently we are working on a pilot project to use this approach to detect traffic incidents in region of Delft in the Netherlands. This is a joint project of Netherlands Organization for Applied Scientific Research TNO, Delft University of Technology and the province South Holland. We are now in the process of testing the algorithm
9 on real sensor data and real incidents, of which we hope to publish the first results in a scientific paper on the next ITS congress in Our experience so far, based on simulated data, is satisfying. Therefore, we would like to take this opportunity to encourage others to consider the same approach for new intelligent transportation systems. REFERENCES [1] G. F. Cooper. Probabilistic inference using belief networks is NP-hard. Technical Report KSL-87-27, [2] Rev. Mr. Bayes, An Essay towards solving a Problem in the Doctrine of Chances. Philosophical Transactions of the Royal Society of London, 53 (1763), [3] J. H. Kim and J. Pearl. A computation model for causal and diagnostic reasoning in inference systems. Proceedings of the 8th International Joint Conference on AI, pages , [4] Lauritzen and Spiegelhalter. Local computations with probabilities on graphical structures and their applications to expert systems. Journal of the Royal Statistical Society (Series B), 50: , [5] Y. Xiang. Probabilistic Reasoning in Multi-agent Systems: A Graphical Models Approach. Cambridge University Press, [6] M. Sahami, S. Dumais, D. Heckerman, E. Horvitz. A Bayesian Approach to Filtering Junk . AAAI Workshop on Learning for Text Categorization, July 1998, Madison, Wisconsin. AAAI Technical Report WS [7] S. Russell, P. Norvig. Artificial Intelligence: A Modern Approach. chapter 15: Probabilistic Reasoning Over Time. Prentice Hall; 2nd edition, 2002
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
More informationCourse Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
More informationAgenda. Interface Agents. Interface Agents
Agenda Marcelo G. Armentano Problem Overview Interface Agents Probabilistic approach Monitoring user actions Model of the application Model of user intentions Example Summary ISISTAN Research Institute
More informationGeNIeRate: An Interactive Generator of Diagnostic Bayesian Network Models
GeNIeRate: An Interactive Generator of Diagnostic Bayesian Network Models Pieter C. Kraaijeveld Man Machine Interaction Group Delft University of Technology Mekelweg 4, 2628 CD Delft, the Netherlands p.c.kraaijeveld@ewi.tudelft.nl
More informationBayesian networks - Time-series models - Apache Spark & Scala
Bayesian networks - Time-series models - Apache Spark & Scala Dr John Sandiford, CTO Bayes Server Data Science London Meetup - November 2014 1 Contents Introduction Bayesian networks Latent variables Anomaly
More informationDecision Trees and Networks
Lecture 21: Uncertainty 6 Today s Lecture Victor R. Lesser CMPSCI 683 Fall 2010 Decision Trees and Networks Decision Trees A decision tree is an explicit representation of all the possible scenarios from
More informationIncorporating Evidence in Bayesian networks with the Select Operator
Incorporating Evidence in Bayesian networks with the Select Operator C.J. Butz and F. Fang Department of Computer Science, University of Regina Regina, Saskatchewan, Canada SAS 0A2 {butz, fang11fa}@cs.uregina.ca
More informationCSC384 Intro to Artificial Intelligence
CSC384 Intro to Artificial Intelligence What is Artificial Intelligence? What is Intelligence? Are these Intelligent? CSC384, University of Toronto 3 What is Intelligence? Webster says: The capacity to
More informationMalicious MPLS Policy Engine Reconnaissance
Malicious MPLS Policy Engine Reconnaissance A. Almutairi 1 and S. Wolthusen 1,2 1 Information Security Group Royal Holloway, University of London, UK and 2 Norwegian Information Security Laboratory Gjøvik
More informationMachine Learning for Naive Bayesian Spam Filter Tokenization
Machine Learning for Naive Bayesian Spam Filter Tokenization Michael Bevilacqua-Linn December 20, 2003 Abstract Background Traditional client level spam filters rely on rule based heuristics. While these
More informationMeasuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
More informationMONITORING AND DIAGNOSIS OF A MULTI-STAGE MANUFACTURING PROCESS USING BAYESIAN NETWORKS
MONITORING AND DIAGNOSIS OF A MULTI-STAGE MANUFACTURING PROCESS USING BAYESIAN NETWORKS Eric Wolbrecht Bruce D Ambrosio Bob Paasch Oregon State University, Corvallis, OR Doug Kirby Hewlett Packard, Corvallis,
More informationAbstract. Find out if your mortgage rate is too high, NOW. Free Search
Statistics and The War on Spam David Madigan Rutgers University Abstract Text categorization algorithms assign texts to predefined categories. The study of such algorithms has a rich history dating back
More informationCompression algorithm for Bayesian network modeling of binary systems
Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the
More informationProcess Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
More informationAn effective approach to preventing application fraud. Experian Fraud Analytics
An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing
More informationThe Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
More informationTHE DEVELOPMENT OF AN EXPERT CAR FAILURE DIAGNOSIS SYSTEM WITH BAYESIAN APPROACH
Journal of Computer Science 9 (10): 1383-1388, 2013 ISSN: 1549-3636 2013 doi:10.3844/jcssp.2013.1383.1388 Published Online 9 (10) 2013 (http://www.thescipub.com/jcs.toc) THE DEVELOPMENT OF AN EXPERT CAR
More informationChapter 28. Bayesian Networks
Chapter 28. Bayesian Networks The Quest for Artificial Intelligence, Nilsson, N. J., 2009. Lecture Notes on Artificial Intelligence, Spring 2012 Summarized by Kim, Byoung-Hee and Lim, Byoung-Kwon Biointelligence
More informationINFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS
INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS R. Sarala 1, M.Kayalvizhi 2, G.Zayaraz 3 1 Associate Professor, Computer Science and Engineering, Pondicherry Engineering
More informationWindows Server Performance Monitoring
Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly
More informationStudy Manual. Probabilistic Reasoning. Silja Renooij. August 2015
Study Manual Probabilistic Reasoning 2015 2016 Silja Renooij August 2015 General information This study manual was designed to help guide your self studies. As such, it does not include material that is
More informationA MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More informationImproving Knowledge-Based System Performance by Reordering Rule Sequences
Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050
More informationDETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS
Hacettepe Journal of Mathematics and Statistics Volume 33 (2004), 69 76 DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS Hülya Olmuş and S. Oral Erbaş Received 22 : 07 : 2003 : Accepted 04
More informationAnother Look at Sensitivity of Bayesian Networks to Imprecise Probabilities
Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124
More informationSimulation-based traffic management for autonomous and connected vehicles
Simulation-based traffic management for autonomous and connected vehicles Paweł Gora Faculty of Mathematics, Informatics and Mechanics University of Warsaw ITS Kraków, 3-4.12.2015 Axioms Vehicles may communicate
More informationWIRELESS SENSOR NETWORKs (WSNs) have been
1132 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Passive Diagnosis for Wireless Sensor Networks Yunhao Liu, Senior Member, IEEE, Kebin Liu, and Mo Li, Member, IEEE Abstract Network
More information8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION
- 1-8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION 8.1 Introduction 8.1.1 Summary introduction The first part of this section gives a brief overview of some of the different uses of expert systems
More informationCompact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
More informationSimple Language Models for Spam Detection
Simple Language Models for Spam Detection Egidio Terra Faculty of Informatics PUC/RS - Brazil Abstract For this year s Spam track we used classifiers based on language models. These models are used to
More informationBayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationWhat is Artificial Intelligence?
CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is
More informationSpam Filtering based on Naive Bayes Classification. Tianhao Sun
Spam Filtering based on Naive Bayes Classification Tianhao Sun May 1, 2009 Abstract This project discusses about the popular statistical spam filtering process: naive Bayes classification. A fairly famous
More informationData Center Switch Fabric Competitive Analysis
Introduction Data Center Switch Fabric Competitive Analysis This paper analyzes Infinetics data center network architecture in the context of the best solutions available today from leading vendors such
More informationSanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a
More informationSpam Filtering with Naive Bayesian Classification
Spam Filtering with Naive Bayesian Classification Khuong An Nguyen Queens College University of Cambridge L101: Machine Learning for Language Processing MPhil in Advanced Computer Science 09-April-2011
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationA Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka Onisko, M.S., 1,2 Marek J. Druzdzel, Ph.D., 1 and Hanna Wasyluk, M.D.,Ph.D.
Research Report CBMI-99-27, Center for Biomedical Informatics, University of Pittsburgh, September 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka Onisko, M.S., 1,2 Marek J. Druzdzel,
More informationExpanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations
Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations Amara Keller, Martin Kelly, Aaron Todd 4 June 2010 Abstract This research has two components, both involving the
More informationUse of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet
Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet SUMMARY Dimitris Kotzinos 1, Poulicos Prastacos 2 1 Department of Computer Science, University of Crete
More informationUsing reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
More informationMachine Learning CS 6830. Lecture 01. Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu
Machine Learning CS 6830 Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu What is Learning? Merriam-Webster: learn = to acquire knowledge, understanding, or skill
More informationModeling Bayesian Networks for Autonomous Diagnosis of Web Services
Modeling Bayesian Networks for Autonomous Diagnosis of Web Services Haiqin Wang, Guijun Wang, Alice Chen, Changzhou Wang Casey K Fung, Stephen A Uczekaj, Rodolfo A Santiago Boeing Phantom Works P.O.Box
More informationBranch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationSYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline
More informationChapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom
More informationFactoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
More informationAmajor benefit of Monte-Carlo schedule analysis is to
2005 AACE International Transactions RISK.10 The Benefits of Monte- Carlo Schedule Analysis Mr. Jason Verschoor, P.Eng. Amajor benefit of Monte-Carlo schedule analysis is to expose underlying risks to
More informationNEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
More informationHow Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
More informationIMPROVING PIPELINE RISK MODELS BY USING DATA MINING TECHNIQUES
IMPROVING PIPELINE RISK MODELS BY USING DATA MINING TECHNIQUES María Fernanda D Atri 1, Darío Rodriguez 2, Ramón García-Martínez 2,3 1. MetroGAS S.A. Argentina. 2. Área Ingeniería del Software. Licenciatura
More informationLogical Evaluation of Consciousness: For Incorporating Consciousness into Machine Architecture
Logical Evaluation of Consciousness: For Incorporating Consciousness into Machine Architecture Mr C.N.Padhy, Ms. R.R.Panda Institute of Knowledge and Information Technology(IKIT) Abstract Machine Consciousness
More informationFocus on Customer Information. Stationary, highly automated customer information systems. Innovative and reliable Information Technologies
Focus on Customer Information Stationary, highly automated customer information systems Innovative and reliable Information Technologies Growing Need of Information In today s world, travelling comfort
More informationRepresentation of Electronic Mail Filtering Profiles: A User Study
Representation of Electronic Mail Filtering Profiles: A User Study Michael J. Pazzani Department of Information and Computer Science University of California, Irvine Irvine, CA 92697 +1 949 824 5888 pazzani@ics.uci.edu
More informationBuilding a Database to Predict Customer Needs
INFORMATION TECHNOLOGY TopicalNet, Inc (formerly Continuum Software, Inc.) Building a Database to Predict Customer Needs Since the early 1990s, organizations have used data warehouses and data-mining tools
More informationArtificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
More informationA Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University unlimit0909@hotmail.com, boxenju@yonsei.ac.kr Abstract
More information#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel.
D A N T E I N P R I N T #10 Technical Options for a European High-Speed Backbone Michael Behringer This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in
More informationScheduling Home Health Care with Separating Benders Cuts in Decision Diagrams
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery
More informationVisualisation in the Google Cloud
Visualisation in the Google Cloud by Kieran Barker, 1 School of Computing, Faculty of Engineering ABSTRACT Providing software as a service is an emerging trend in the computing world. This paper explores
More informationIncreasing the Accuracy of a Spam-Detecting Artificial Immune System
Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University terri@zone12.com Tony White Carleton University arpwhite@scs.carleton.ca Abstract- Spam, the electronic
More informationBayesian Networks and Classifiers in Project Management
Bayesian Networks and Classifiers in Project Management Daniel Rodríguez 1, Javier Dolado 2 and Manoranjan Satpathy 1 1 Dept. of Computer Science The University of Reading Reading, RG6 6AY, UK drg@ieee.org,
More informationIn Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999
In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka
More informationLoad Balancing in Distributed Data Base and Distributed Computing System
Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located
More informationLaboratory work in AI: First steps in Poker Playing Agents and Opponent Modeling
Laboratory work in AI: First steps in Poker Playing Agents and Opponent Modeling Avram Golbert 01574669 agolbert@gmail.com Abstract: While Artificial Intelligence research has shown great success in deterministic
More informationGerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
More informationCourse: Model, Learning, and Inference: Lecture 5
Course: Model, Learning, and Inference: Lecture 5 Alan Yuille Department of Statistics, UCLA Los Angeles, CA 90095 yuille@stat.ucla.edu Abstract Probability distributions on structured representation.
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationQuestion 2 Naïve Bayes (16 points)
Question 2 Naïve Bayes (16 points) About 2/3 of your email is spam so you downloaded an open source spam filter based on word occurrences that uses the Naive Bayes classifier. Assume you collected the
More informationTHE SCENARIO COORDINATION MODULE FOR THE MUNICIPALITY OF AMSTERDAM AND TRAFFIC MANAGEMENT CENTER OF NORTH-HOLLAND
11 th TRAIL Congress November 2010 THE SCENARIO COORDINATION MODULE FOR THE MUNICIPALITY OF AMSTERDAM AND TRAFFIC MANAGEMENT CENTER OF NORTH-HOLLAND Integration of urban and freeway network control by
More informationUse of group discussion and learning portfolio to build knowledge for managing web group learning
Use of group discussion and learning portfolio to build knowledge for managing web group learning Gwo-Dong Chen,Kuo-Liang Ou, Chin-Yeh Wang Department of Computer Science and Information Engineering National
More informationPrescriptive Analytics. A business guide
Prescriptive Analytics A business guide May 2014 Contents 3 The Business Value of Prescriptive Analytics 4 What is Prescriptive Analytics? 6 Prescriptive Analytics Methods 7 Integration 8 Business Applications
More informationNTT DATA Big Data Reference Architecture Ver. 1.0
NTT DATA Big Data Reference Architecture Ver. 1.0 Big Data Reference Architecture is a joint work of NTT DATA and EVERIS SPAIN, S.L.U. Table of Contents Chap.1 Advance of Big Data Utilization... 2 Chap.2
More informationSynergistic Sensor Location for Cost-Effective Traffic Monitoring
Synergistic Sensor Location for Cost-Effective Traffic Monitoring ManWo Ng, Ph.D. Assistant Professor Department of Modeling, Simulation and Visualization Engineering & Department of Civil and Environmental
More informationHUGIN Expert White Paper
HUGIN Expert White Paper White Paper Company Profile History HUGIN Expert Today HUGIN Expert vision Our Logo - the Raven Bayesian Networks What is a Bayesian network? The theory behind Bayesian networks
More informationOracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
More informationVisualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government
More informationEvaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware
Evaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware Mahyar Shahsavari, Zaid Al-Ars, Koen Bertels,1, Computer Engineering Group, Software & Computer Technology
More informationCost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationModel, Analyze and Optimize the Supply Chain
Model, Analyze and Optimize the Supply Chain Optimize networks Improve product flow Right-size inventory Simulate service Balance production Optimize routes The Leading Supply Chain Design and Analysis
More informationProblems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment,
Uncertainty Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, E.g., loss of sensory information such as vision Incorrectness in
More informationInformation Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
More informationTeaching Introductory Artificial Intelligence with Pac-Man
Teaching Introductory Artificial Intelligence with Pac-Man John DeNero and Dan Klein Computer Science Division University of California, Berkeley {denero, klein}@cs.berkeley.edu Abstract The projects that
More informationImplementation of traffic effect estimations. for intermodal dynamic routing services on VIELMOBIL - an. ITS-platform for the RheinMain region
Implementation of traffic effect estimations for intermodal dynamic routing services on VIELMOBIL - an ITS-platform for the RheinMain region Rüdiger BERNHARD, Enrico STEIGER, Stefan KRAMPE, Stefan KOLLARITS,
More informationAn Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
More informationDecision-Theoretic Troubleshooting: A Framework for Repair and Experiment
Decision-Theoretic Troubleshooting: A Framework for Repair and Experiment John S. Breese David Heckerman Abstract We develop and extend existing decisiontheoretic methods for troubleshooting a nonfunctioning
More informationA Comparison of General Approaches to Multiprocessor Scheduling
A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA jing@jolt.mt.att.com Michael A. Palis Department of Computer Science Rutgers University
More informationImage Spam Filtering Using Visual Information
Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationA Contribution to Expert Decision-based Virtual Product Development
A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,
More informationA Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)
A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department
More informationA Tool For Active FLEET Management and Analysis of Activities of a Snow PlowING and a Road Salting Fleet
A Tool For Active FLEET Management and Analysis Activities a Snow PlowING and a Road Salting Fleet Rok Strašek, Tina Vukasović Abstract - Current economic crisis combined with increasing fuel costs rises
More informationKNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS. Henk de Swaan Arons
KNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS Henk de Swaan Arons Erasmus University Rotterdam Faculty of Economics, ment of Computer Science P.O. Box 1738, H9-28 3000 DR Rotterdam, The
More informationBPM and SOA require robust and scalable information systems
BPM and SOA require robust and scalable information systems Smart work in the smart enterprise Authors: Claus Torp Jensen, STSM and Chief Architect for SOA-BPM-EA Technical Strategy Rob High, Jr., IBM
More informationApplication of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu
More information