TIETS34 Seminar: Data Mining on Biometric identification



Similar documents
Machine Learning for Data Science (CS4786) Lecture 1

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing

Introduction to Pattern Recognition

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

In this presentation, you will be introduced to data mining and the relationship with meaningful use.

Comparison of K-means and Backpropagation Data Mining Algorithms

An Introduction to Data Mining

Machine Learning Introduction

Social Media Mining. Data Mining Essentials

Predictive Analytics Techniques: What to Use For Your Big Data. March 26, 2014 Fern Halper, PhD

May For other information please contact:

Learning outcomes. Knowledge and understanding. Competence and skills

Intelligent Computing at LUT

Robust Outlier Detection Technique in Data Mining: A Univariate Approach

Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data

Machine Learning with MATLAB David Willingham Application Engineer

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)

Database Marketing, Business Intelligence and Knowledge Discovery

An Overview of Knowledge Discovery Database and Data mining Techniques

The Scientific Data Mining Process

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center

Index Contents Page No. Introduction . Data Mining & Knowledge Discovery

ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION

Statistics for BIG data

Data Mining Part 5. Prediction

Data Mining: Overview. What is Data Mining?

6.2.8 Neural networks for data mining

Data Mining Applications in Higher Education

TDWI Best Practice BI & DW Predictive Analytics & Data Mining

TDS - Socio-Environmental Data Science

MS1b Statistical Data Mining

How To Perform An Ensemble Analysis

Learning is a very general term denoting the way in which agents:

Data Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Using Data Mining for Mobile Communication Clustering and Characterization

Data Mining: A Preprocessing Engine

Government of Russian Federation. Faculty of Computer Science School of Data Analysis and Artificial Intelligence

Example: Document Clustering. Clustering: Definition. Notion of a Cluster can be Ambiguous. Types of Clusterings. Hierarchical Clustering

Biometric Authentication using Online Signatures

A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

Information Management course

Chapter ML:XI. XI. Cluster Analysis

MA2823: Foundations of Machine Learning

Machine Learning: Overview

COURSE RECOMMENDER SYSTEM IN E-LEARNING

Maschinelles Lernen mit MATLAB

False alarm in outdoor environments

CPSC 340: Machine Learning and Data Mining. Mark Schmidt University of British Columbia Fall 2015

Introduction to Data Mining

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

Unsupervised and supervised dimension reduction: Algorithms and connections

Nagarjuna College Of

No BI without Machine Learning

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

An Empirical Study of Application of Data Mining Techniques in Library System

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Application of Data Mining Methods in Health Care Databases

How To Cluster

Environmental Remote Sensing GEOG 2021

Detection of Heart Diseases by Mathematical Artificial Intelligence Algorithm Using Phonocardiogram Signals

Data Mining and Neural Networks in Stata

Anomaly Detection and Predictive Maintenance

A Survey on Intrusion Detection System with Data Mining Techniques

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

CS 2750 Machine Learning. Lecture 1. Machine Learning. CS 2750 Machine Learning.

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

How To Use Neural Networks In Data Mining

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

A Case of Study on Hadoop Benchmark Behavior Modeling Using ALOJA-ML

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

INTRODUCTION TO MACHINE LEARNING 3RD EDITION

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group

Data Mining and Exploration. Data Mining and Exploration: Introduction. Relationships between courses. Overview. Course Introduction

REVIEW OF ENSEMBLE CLASSIFICATION

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

Introduction to Data Mining and Business Intelligence Lecture 1/DMBI/IKI83403T/MTI/UI

Machine Learning and Data Mining. Fundamentals, robotics, recognition

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

DATA MINING TECHNIQUES AND APPLICATIONS

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health

Machine learning for algo trading

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Syllabus for MATH 191 MATH 191 Topics in Data Science: Algorithms and Mathematical Foundations Department of Mathematics, UCLA Fall Quarter 2015

Neural Networks in Data Mining

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

ECLT 5810 E-Commerce Data Mining Techniques - Introduction. Prof. Wai Lam

Neural Networks and Back Propagation Algorithm

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Transcription:

TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi

Course Description Content of seminar: Data mining and the whole procedure. The popular biometric data types for identification. Some simple methods of pattern classification. Evaluation of identification methods and results. Other knowledge of statistic. Grade: 3-4 ECTS and one extra credit will be given if you participate a series measurements of biometric verification. Measurements have 4 sessions, 4 weeks interval. Each session has 2 tests: one in morning and another in afternoon. Each test will take 10-15mins.

Requirements: No exercise, no project, no report and no exam. Minimum 30 minutes individual presentation Acting as a opponent for one presentation Participating in 80% sessions Schedule: Two short introductions One presentation session per week

Data Mining What is data mining: It is the computational process of discovering patterns in large data sets. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Involved methods: artificial intelligence, machine learning, statistics, and database systems Sometimes called Knowledge Discovery. Data mining be used in many fields: Business, marketing, medical, geography, music etc. Data mining task: Descriptive data mining: summary statistics, visualization, association analysis etc. Predictive data mining: predict unknown or new data (classification).

Association analysis Discovering interesting relationship hidden in large data set.

Classification Construct models that describe and distinguish classes and predict classes of new cases. Supervised vs. unsupervised. 2-classes vs. n-classes. Parameters vs. non-parameters.

Cluster analysis Grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

Processing of Data Mining Preprocessing Be collect for various purpose; Large amount; Noisy or outliers; unreasonable in practice; For less time consuming; To get better result. Data integration; Data cleaning; Data reduction; Data transformation Data mining Choose data mining task Choose mining method or algorithm Postprocessing The aim is to show the most interesting mining results to the user in an understandable form Knowledge evaluation, interpretation and presentation

More information of data mining TIETS11 Data Mining TIETS31 Knowledge Discovery

Fingerprint Fingerprint Identification is the method of identification using the impressions made by the minute ridge formations or patterns found on the fingertips. No two persons have exactly the same arrangement of ridge patterns, and the patterns of any one individual remain unchanged throughout life. Fingerprints offer an infallible means of personal identification. Other personal characteristics may change, but fingerprints do not. http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm

Face A general statement of the face recognition problem (in computer vision) can be formulated as follows: Given still or video images of a scene, identify or verify one or more persons in the scene using a stored database of faces. http://www.face-rec.org/general-info/ Image and Video Features selection Distance between the eyes Width of the nose Depth of the eye sockets The shape of the cheekbones The length of the jaw line

Iris Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the irises of an individual's eyes, whose complex random patterns are unique and can be seen from some distance. ------Wikipedia

Electrocardiography (ECG) One dimension signals

Data source (signals) dimension Fingerprint, face image, iris: 2D ECG:1D Video:3D Data dimension How many attributes or variables be selected? 5 for face and 21 for ECG in above examples.

Principal component analysis (PCA) Find a projection that best represent the data

Linear discriminant analysis (LDA) Find a linear combination of features which characterizes or separates two or more classes of objects or events.

Multiple discriminant analysis (MDA)

Independent component analysis (ICA) Apply to the problem of blind source separation.