Advanced Topics in Learning and Vision

Total Page:16

File Type:pdf, Size:1020Kb

Advanced Topics in Learning and Vision Advanced Topics in Learning and Vision Ming-Hsuan Yang [email protected] Lecture 6 (draft) Announcements • More course material available on the course web page • Project web pages: Everyone needs to set up one (format details will soon be available) • Reading (due Nov 1): - RVM application for 3D human pose estimation [1]. - Viola and Jones: Adaboost-based real-time face detector [25]. - Viola et al: Adaboost-based real-time pedestrian detector [26]. A. Agarwal and B. Triggs. 3D human pose from silhouettes by relevance vector regression. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, volume 2, pages 882–888, 2004. P. Viola and M. Jones. Robust real-time face detection. International Journal of Computer Vision, 57(2):137–154, 2004. P. Viola, M. Jones, and D. Snow. Markov face models. In Proceedings of the Ninth IEEE International Conference on Computer Vision, volume 2, pages 734–741, 2003. Lecture 6 (draft) 1 Overview • Linear classifier: Fisher linear discriminant (FLD), linear support vector machine (SVM). • Nonlinear classifier: nonlinear support vector machine, • SVM regression, relevance vector machine (RVM). • Kernel methods: kernel principal component, kernel discriminant analysis. • Ensemble of classifiers: Adaboost, bagging, ensemble of homogeneous/heterogeneous classifiers. Lecture 6 (draft) 2 Fisher Linear Discriminant • Based on Gaussian distribution: between-scatter/within-scatter matrices. • Supervised learning for multiple classes. 0 • Trick often used in ridge regression: Sw = Sw + λI without using PCA • Fisherfaces vs. Eigenfaces (FLD vs. PCA). • Further study: Aleix Martinez’s paper on analyzing FLD for object recognition [10][11]. A. M. Martinez and A. Kak. PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(2):228–233, 2001. A. M. Martinez and M. Zhu. Where are linear feature extraction methods applicable? IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(12):1934–1944, 2005. Lecture 6 (draft) 3 Intuitive Justification for SVM Two things come into picture: • what kind of function do we use for classification? • what are the parameters for this function? Which classifier do you expect to perform well? Lecture 6 (draft) 4 Support Vector Machine • Objective: To find an optimal hyperplane that correctly classifies data points as much as possible and separates the points of two classes as far as possible. • Approach: Formulate a constrained optimization problem, then solve it using constrained quadratic programming (constrained QP). • Theorem: Structural Risk Minimization. • Issues: VC dimension, linear separability, feature space, multiple class. Lecture 6 (draft) 5 Main Idea • Given a set of data points which belong to either of two classes, an SVM finds the hyperplane: - leaving the largest possible fraction of points of the same class on the same side. - and maximizing the distance of either class from the hyperplane. • Find the optimal separating hyperplane that minimizes the risk of misclassifying the training samples and unseen test samples. • Question: Why do we need this? Does it work well in test samples (i.e., generalization)? • Answer: Structural Risk Minimization. • Issues: - How do we determine the capacity of a classification model/function? - How do we determine the parameters for that model/function? Lecture 6 (draft) 6 Vapnik-Chervonenkis (VC) Dimension • A property of a set of functions (hypothesis space H, learning machine, learner) {f(α)} (we use α as a generic set of parameters: a choice of α specifies a particular function). • Shattered : if a given set of N points can be labeled in all possible 2N ways, and for each labeling, a member of the set {f(α)} can be found which correctly assigns those labels, we say that the set of points is shattered by that set of functions. • The functions f(α) are usually called hypothesis, and the set {f(α): α ∈ Λ} is called the hypothesis space and denoted by H. • The VC dimension for the set of functions {f(α)} , i.e., the hypothesis space H, is defined as the maximum number of training points that can be shattered by H. • Frequently used to find the sample complexity, mistake bound algorithm, neural network capacity, computational learning theory, etc. Lecture 6 (draft) 7 • Example: • While it is possible to find a set of 3 points that can be shattered by the set of oriented lines, it is not possible to shatter a set of 4 points (with any labeling). Thus the VC dimension of the set of oriented lines in R2 is 3. • The VC dimension of the set of oriented hyperplane in Rn is n + 1. Lecture 6 (draft) 8 Linear Classifiers • Instance space: X = Rn. • Set of class labels: Y = {+1, −1}. • Training data set: {(x1, y1),..., (xN , yN )}. • Hypothesis space: n n Hlin(n) = {h : R → Y |h(x) = sign(w · x + b), w ∈ R , b ∈ R} +1 if w · x + b > 0 sign(w · x + b) = −1 otherwise (1) • VC(Hlin(2)) = 3, VC(Hlin(n)) = n + 1. • Idea: - First need to find a hypothesis h ∈ Hlin(n) - Then the parameters to minimize error for unseen examples. Lecture 6 (draft) 9 Expected Risk Suppose we are given N observations. Each observation consists of a pair: a n vector xi ∈ < , i = 1,...,N and the associated class label yi. Assume there exists some unknown probability distribution P (x, y) from which these data points are drawn, i.e., the data points are assumed independently drawn and identically distributed. Consider a machine whose task is to learn the mapping xi → yi ∈ {−1, 1}, the machine is defined by a set of possible mappings x → f(x, α) ∈ {−1, 1}, where the functions f(x, α) themselves are labeled by the adjustable parameters α. Expected Risk: The expectation of the test error for a trained machine is Z 1 R(α) = |y − f(x, α)|dP (x, y) (2) 2 Lecture 6 (draft) 10 Upper Bound for Expected Risk The empirical risk Remp is N 1 X R (α) = |y − f(x , α)| (3) emp 2N i i i=1 Under PAC (Probably Approximately Correct) model, Vapnik shows that the bound for the expected risk which holds with probability 1 − η (0 ≤ η ≤ 1), r h(log(2N/h) + 1) − log(η/4) R(α) ≤ R (α) + (4) emp N where h is the VC dimension of f(x, α) (i.e., H). The second term on the right hand side is called VC confidence. Lecture 6 (draft) 11 Implications of the Bound for Expected Risk r h(log(2N/h) + 1) − log(η/4) R(α) ≤ R (α) + emp N • To achieve small expected risk, that is good generalization performance ⇒ both the empirical risk and the ratio between VC dimension and the number of data points have to be small. • Since the empirical risk is usually a decreasing function of h, it turns out, for a given number of data points, there is an optimal value of the VC dimension. Lecture 6 (draft) 12 r h(log(2N/h) + 1) − log(η/4) R(α) ≤ R (α) + emp N Lecture 6 (draft) 13 Implications of the bound for R(α) (cont) • The choice of an appropriate value for h (which in most techniques is controlled by the number of free parameters of the model) is crucial in order to get good performance, especially when the number of data points is small. • When using a multilayer perceptron or a radial basis function network, this is equivalent to the problem of finding an appropriate number of hidden units. • This is known to be difficult, and it is usually solved by cross-validation techniques. Lecture 6 (draft) 14 Structural Risk Minimization (SRM) • It is not enough just to minimize the empirical risk as often done by most neural networks. • Need to overcome the problem of choosing an appropriate VC dimension. • Structural Risk Minimization Principle: To make the expected risk small, both sides in (4) should be small • Minimize the empirical risk and VC confidence simultaneously: r h(log(2N/h) + 1) − log(η/4) min(Remp(α) + ) (5) Hn N • Introduce “structure” by dividing the entire class of functions into nested subsets. • For each subset, we must be able to compute h or a bound of h. Lecture 6 (draft) 15 • Then, SRM consists of finding that subset of functions which minimizes the bound on the actual risk. • The problem of selecting the right subset for a given amount of observations is referred as capacity control. • A trade off between reducing the training error and limiting model complexity. • Occam Razor models should be no more complex than is sufficient to explain the data. • “Things should be made as simple as possible – but not any simpler” Albert Einstein. Lecture 6 (draft) 16 Structural Risk Minimization (cont) • To implement SRM, one needs the nested structure of hypothesis space: H1 ⊂ H2 ⊂ ... ⊂ Hn ⊂ ... with the property that h(n) ≤ h(n + 1) where h(n) is the VC dimension of Hn. Lecture 6 (draft) 17 • A learning machine with larger complexity (higher VC dimension) ⇒ small empirical risk. • A simpler learning machine (lower VC dimension) ⇒ low VC confidence. • SRM picks a trade-off in between VC dimension and empirical risk such that the risk bound is minimized. • Problems: - It is usually difficult to compute the VC dimension of Hn, and there are only a small number of models for which we know how to compute the VC dimension. - Even when the VC dimension of Hn is known, it is not easy to solve the minimization problem. In most cases, one will have to minimize the empirical risk for every set Hn, and then choose the Hn that minimizes the (5). Lecture 6 (draft) 18 Support Vector Machine (SV Algorithm) One implementation based on Structural Risk Minimization theory • Each particular choice of structure gives rise to a learning algorithm, consisting of performing SRM in the given structure of sets of functions.
Recommended publications
  • Dropout-Based Automatic Relevance Determination
    Dropout-based Automatic Relevance Determination Dmitry Molchanov1, Arseniy Ashuha2 and Dmitry Vetrov3;4∗ 1Skolkovo Institute of Science and Technology 2Moscow Institute of Physics and Technology 3National Research University Higher School of Economics, 4Yandex Moscow, Russia [email protected], [email protected], [email protected] 1 Introduction During past several years, several works about treating dropout as a Bayesian model have appeared [1,3,4]. Authors of [1] proposed a method that represents dropout as a special case of Bayesian model and allows to tune individual dropout rates for each weight. Another direction of research is the exploration of the ways to train neural networks with sparse weight matrices [6,9] and the ways to prune excessive neurons [8]. One of the possible approaches is so-called Automatic Relevance Determination (ARD). A typical example of such models is the Relevance Vector Machine [4]. However, these models are usually relatively hard to train. In this work, we introduce a new dropout-based way to obtain the ARD effect that can be applied to complex models via stochastic variational inference framework. 2 Theory Variational dropout [1] is a recent technique that generalizes Gaussian dropout [7]. It allows to set individual dropout rates for each weight/neuron/layer and to tune them with a simple gradient descent based method. As in most modern Bayesian models, the goal is to obtain the variational approximation to the posterior distribution via optimization of the variational lower bound (1): L(q) = q(w) log p(T j X; w) − DKL(q(w) k pprior(w)) ! max (1) E q To put it simply, the main idea of Variational dropout is to search for posterior approximation in a 2 specific family of distributions: q(wi) = N (θi; αiθi ).
    [Show full text]
  • Healing the Relevance Vector Machine Through Augmentation
    Healing the Relevance Vector Machine through Augmentation Carl Edward Rasmussen [email protected] Max Planck Institute for Biological Cybernetics, 72076 T¨ubingen, Germany Joaquin Qui˜nonero-Candela [email protected] Friedrich Miescher Laboratory, Max Planck Society, 72076 T¨ubingen, Germany Abstract minimizing KL divergences between the approximated and true posterior, by Smola and Sch¨olkopf (2000) and The Relevance Vector Machine (RVM) is a Smola and Bartlett (2001) by making low rank approx- sparse approximate Bayesian kernel method. imations to the posterior. In (Gibbs & MacKay, 1997) It provides full predictive distributions for and in (Williams & Seeger, 2001) sparseness arises test cases. However, the predictive uncer- from matrix approximations, and in (Tresp, 2000) tainties have the unintuitive property, that from neglecting correlations. The use of subsets of they get smaller the further you move away regressors has also been suggested by Wahba et al. from the training cases. We give a thorough (1999). analysis. Inspired by the analogy to non- degenerate Gaussian Processes, we suggest The Relevance Vector Machine (RVM) introduced by augmentation to solve the problem. The pur- Tipping (2001) produces sparse solutions using an im- pose of the resulting model, RVM*, is primar- proper hierarchical prior and optimizing over hyperpa- ily to corroborate the theoretical and exper- rameters. The RVM is exactly equivalent to a Gaus- imental analysis. Although RVM* could be sian Process, where the RVM hyperparameters are pa- used in practical applications, it is no longer rameters of the GP covariance function (more on this a truly sparse model. Experiments show that in the discussion section).
    [Show full text]
  • Sparse Bayesian Classification with the Relevance Vector Machine
    Sparse Bayesian Classification with the Relevance Vector Machine In a pattern recognition setting, the Relevance Vector Machine (RVM) [3] can be viewed as a simple logistic regression model, with a Bayesian Automatic Relevance Determination (ARD) prior [1] over the weights associated with each feature in order to achieve a parsimonious model. Let A = {A, C, G, T} represent an alphabet of symbols representing the bases adenine, cytosine, guanine and thymine respectively. The RVM constructs a decision rule from a set of labelled training data, ` ni D = {(xi, ti)}i=1, xi ∈ A , ti ∈ {0, + 1}, where the input patterns, xi, consist of strings drawn from A of varying lengths, describing the upstream promoter regions of a set of co-regulated genes. The target patterns, ti, indicate whether the corresponding gene is up-regulated (class C1, yi = +1) or down-regulated (class C2, yi = 0) under a given treatment. The RVM constructs a logistic regression model based on a set of sequence features derived from the input patterns, i.e. N X p(C1|x) ≈ σ {y(x; w)} where y(x; w) = wiϕi(x) + w0, (1) i=1 and σ {y} = (1 + exp{y})−1 is the logistic inverse link function. In this study a d feature, ϕi(x), represents the number of times an arbitrary substring, si ∈ A , ocurrs in a promoter sequence x. A sufficiently large set of features is used such that it is reasonable to expect that some of these features will represent oligonucleotides forming a relevant promoter protein binding site and so provide discriminatory information for the pattern recognition task at hand.
    [Show full text]
  • Visual Sparse Bayesian Reinforcement Learning: a Framework for Interpreting What an Agent Has Learned
    Visual Sparse Bayesian Reinforcement Learning: A Framework for Interpreting What an Agent Has Learned Indrajeet Mishra, Giang Dao, and Minwoo Lee Department of Computer Science University of North Carolina at Charlotte {imishra, gdao, minwoo.lee}@uncc.edu Abstract— This paper presents a Visual Sparse Bayesian problem of deep learning as lack of visualization tools to un- Reinforcement Learning (V-SBRL) framework for recording derstand the computation performed in the hidden layers. For the images of the most important memories from the past this reason, many recent researches [10], [11], [12], [13], [14] experience. The key idea of this paper is to maintain an image snapshot storage to help understanding and analyzing have attempted different types of visualization to explore the the learned policy. In the extended framework of SBRL [1], learning process of a deep learning model. However, these the agent perceives the environment as the image state inputs, methods focus on visualizing how the features are computed encodes the image into feature vectors, train SBRL module in the intermediate layers in supervised learning, so it is and stores the raw images. In this process, the snapshot not enough to fully explain what it has learned and what storage keeps only the relevant memories which are important to make future decisions and discards the not-so-important the learned knowledge represents in reinforcement learning. memories. The stored snapshot images enable us to understand Although the recent visualization efforts for reinforcement the agent’s learning process by visualizing them. They also learning [15], [16] provides ways to interpret the learning of provide explanation of exploited policy in different conditions.
    [Show full text]
  • Modular Meta-Learning with Shrinkage
    Modular Meta-Learning with Shrinkage Yutian Chen∗ Abram L. Friesen∗ Feryal Behbahani Arnaud Doucet David Budden Matthew W. Hoffman Nando de Freitas DeepMind London, UK {yutianc, abef}@google.com Abstract Many real-world problems, including multi-speaker text-to-speech synthesis, can greatly benefit from the ability to meta-learn large models with only a few task- specific components. Updating only these task-specific modules then allows the model to be adapted to low-data tasks for as many steps as necessary without risking overfitting. Unfortunately, existing meta-learning methods either do not scale to long adaptation or else rely on handcrafted task-specific architectures. Here, we propose a meta-learning approach that obviates the need for this often sub-optimal hand-selection. In particular, we develop general techniques based on Bayesian shrinkage to automatically discover and learn both task-specific and general reusable modules. Empirically, we demonstrate that our method discovers a small set of meaningful task-specific modules and outperforms existing meta- learning approaches in domains like few-shot text-to-speech that have little task data and long adaptation horizons. We also show that existing meta-learning methods including MAML, iMAML, and Reptile emerge as special cases of our method. 1 Introduction The goal of meta-learning is to extract shared knowledge from a large set of training tasks to solve held-out tasks more efficiently. One avenue for achieving this is to learn task-agnostic modules and reuse or repurpose these for new tasks. Reusing or repurposing modules can reduce overfitting in low-data regimes, improve interpretability, and facilitate the deployment of large multi-task models on limited-resource devices as parameter sharing allows for significant savings in memory.
    [Show full text]
  • Sparse Bayesian Learning for Predicting Phenotypes and Identifying Influential Markers
    Sparse Bayesian Learning for Predicting Phenotypes and Identifying Influential Markers by Maryam Ayat A thesis submitted to The Faculty of Graduate Studies of The University of Manitoba in partial fulfillment of the requirements of the degree of Doctor of Philosophy Department of Computer Science The University of Manitoba Winnipeg, Manitoba, Canada December 2018 c Copyright 2018 by Maryam Ayat Thesis advisor Author Michael Domaratzki Maryam Ayat Sparse Bayesian Learning for Predicting Phenotypes and Identifying Influential Markers Abstract In bioinformatics, Genomic Selection (GS) and Genome-Wide Association Studies (GWASs) are two related problems that can be applied to the plant breeding industry. GS is a method to predict phenotypes (i.e., traits) such as yield and disease resis- tance in crops from high-density markers positioned throughout the genome of the varieties. By contrast, a GWAS involves identifying markers or genes that underlie the phenotypes of importance in breeding. The need to accelerate the development of improved varieties, and challenges such as discovering all sorts of genetic factors related to a trait, increasingly persuade researchers to apply state-of-the-art machine learning methods to GS and GWASs. The aim of this study is to employ sparse Bayesian learning as a technique for GS and GWAS. The sparse Bayesian learning uses Bayesian inference to obtain sparse solutions in regression or classification problems. This learning method is also called the Relevance Vector Machine (RVM), as it can be viewed as a kernel-based model of identical form to the renowned Support Vector Machine (SVM) method. ii The RVM has some advantages that the SVM lacks, such as having probabilistic outputs, providing a much sparser model, and the ability to work with arbitrary kernel functions.
    [Show full text]
  • Arxiv:1911.06028V2 [Cs.LG] 7 May 2021
    Published as a conference paper at ICLR 2021 1.2 1.2 1.2 1.6 1.6 1.0 1.0 1.0 1.4 1.4 1.2 1.2 0.8 0.8 0.8 1.0 1.0 0.6 0.6 0.6 0.8 0.8 0.4 0.4 0.4 0.6 0.6 0.4 0.4 0.2 0.2 0.2 0.2 0.2 0 0 0 0 0 -0.2 -0.2 -0.2 -1.2 -0.8 -0.6 -0.2 0.4 0.8 -0.2 -1.2 -0.8 -0.6 -0.2 0.4 0.8 -0.2 -1.2 -0.8 -0.6 -0.2 0.4 0.8 -1.5 -1.0 -0.5 0 0.5 1.0 -1.5 -1.0 -0.5 0 0.5 1.0 (a) FC + softmax (b) Gaussian process (c) RVM (d) Discriminative GMM (e) SDGM (ours) Figure 1: Comparison of decision boundaries. The black and green circles represent training samples from classes 1 and 2, respectively. The dashed black line indicates the decision boundary between classes 1 and 2 and thus satisfies P (c = 1 j x) = (c = 2 j x) = 0:5. The dashed blue and red lines represent the boundaries between the posterior probabilities of the mixture components. learning. This learning algorithm reduces memory usage without losing generalization capability by obtaining sparse weights while maintaining the multimodality of the mixture model. The technical highlight of this study is twofold: One is that the SDGM finds the multimodal structure in the feature space and the other is that redundant Gaussian components are removed owing to sparse learning.
    [Show full text]
  • A Novel Integrated Approach of Relevance Vector Machine Optimized by Imperialist Competitive Algorithm for Spatial Modeling of Shallow Landslides
    remote sensing Article A Novel Integrated Approach of Relevance Vector Machine Optimized by Imperialist Competitive Algorithm for Spatial Modeling of Shallow Landslides Dieu Tien Bui 1,2, Himan Shahabi 3,* , Ataollah Shirzadi 4 , Kamran Chapi 4, Nhat-Duc Hoang 5, Binh Thai Pham 6 , Quang-Thanh Bui 7, Chuyen-Trung Tran 8, Mahdi Panahi 9 , Baharin Bin Ahamd 10 and Lee Saro 11,12,* 1 Geographic Information Science Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam; [email protected] 2 Faculty of Environment and Labour Safety, Ton Duc Thang University, Ho Chi Minh City, Vietnam 3 Department of Geomorphology, Faculty of Natural Resources, University of Kurdistan, Sanandaj 66177-15175, Iran 4 Department of Rangeland and Watershed Management, Faculty of Natural Resources, University of Kurdistan, Sanandaj 66177-15175, Iran; [email protected] (A.S.); [email protected] (K.C.) 5 Faculty of Civil Engineering, Institute of Research and Development, Duy Tan University, P809-K7/25 Quang Trung, Danang 550000, Vietnam; [email protected] 6 Geotechnical Engineering and Artificial Intelligence Research Group (GEOAI), University of Transport Technology, Hanoi 100803, Vietnam; [email protected] 7 Faculty of Geography, VNU University of Science, 334 Nguyen Trai, ThanhXuan, Hanoi 100803, Vietnam; [email protected] 8 Faculty of Information Technology, Hanoi University of Mining and Geology, Pho Vien, Bac Tu Liem, Hanoi 100803, Vietnam; [email protected] 9 Young Researchers and Elites Club, North Tehran Branch, Islamic Azad University,
    [Show full text]
  • Software Reliability Prediction Via Relevance Vector Regression
    Neurocomputing 186 (2016) 66–73 Contents lists available at ScienceDirect Neurocomputing journal homepage: www.elsevier.com/locate/neucom Software reliability prediction via relevance vector regression Jungang Lou a,b, Yunliang Jiang b,n, Qing Shen b, Zhangguo Shen b, Zhen Wang c, Ruiqin Wang b a Institute of Cyber-Systems and Control, Zhejiang Univeristy, 310027 Hangzhou, China b School of Information Engineering, Huzhou University, 313000 Huzhou, China c College of Computer Science and Technology, Shanghai University of Electric Power, 200090 Shanghai, China article info abstract Article history: The aim of software reliability prediction is to estimate future occurrences of software failures to aid in Received 21 September 2015 maintenance and replacement. Relevance vector machines (RVMs) are kernel-based learning methods Received in revised form that have been successfully adopted for regression problems. However, they have not been widely 27 November 2015 explored for use in reliability applications. This study employs a RVM-based model for software relia- Accepted 9 December 2015 bility prediction so as to capture the inner correlation between software failure time data and the nearest Communicated by Liang Wang Available online 6 January 2016 m failure time data. We present a comparative analysis in order to evaluate the RVMs effectiveness in forecasting time-to-failure for software products. In addition, we use the Mann-Kendall test method to Keywords: explore the trend of predictive accuracy as m varies. The reasonable value range of m is achieved through Software reliability model paired T-tests in 10 frequently used failure datasets from real software projects. Relevance vector machine & 2016 Elsevier B.V.
    [Show full text]
  • Automatic Machine Learning Derived from Scholarly Big Data
    Automatic Machine Learning Derived from Scholarly Big Data Asnat Greenstein-Messicaa,b,∗, Roman Vainshteina,b, Gilad Katza,b, Bracha Shapiraa,b, Lior Rokacha,b aSoftware and Information Engineering Department, Ben Gurion University of the Negev bBe’er Sheva, Israel Abstract One of the challenging aspects of applying machine learning is the need to identify the algorithms that will perform best for a given dataset. This process can be difficult, time consuming and often requires a great deal of domain knowledge. We present Sommelier, an expert system for recom- mending the machine learning algorithms that should be applied on a previously unseen dataset. Sommelier is based on word embedding representations of the domain knowledge extracted from a large corpus of academic publications. When presented with a new dataset and its problem descrip- tion, Sommelier leverages a recommendation model trained on the word embedding representation to provide a ranked list of the most relevant algorithms to be used on the dataset. We demonstrate Sommelier’s effectiveness by conducting an extensive evaluation on 121 publicly available datasets and 53 classification algorithms. The top algorithms recommended for each dataset by Sommelier were able to achieve on average 97.7% of the optimal accuracy of all surveyed algorithms. Keywords: scholarly big data, algorithm recommendation, word embedding, expert system 1. Introduction The enormous growth in the creation of digital data has created numerous opportunities. Com- panies and organizations are now capable of mining data regarding almost every aspect of their activity. However, the ability to collect data far outstrips the ability of organizations to apply analytics or derive meaningful insights.
    [Show full text]
  • An Integrated Transfer Learning and Multitask Learning Approach For
    An Integrated Transfer Learning and Multitask Learning Approach for Pharmacokinetic Parameter Prediction Zhuyifan Ye1, Yilong Yang1,2, Xiaoshan Li2, Dongsheng Cao3, Defang Ouyang1* 1State Key Laboratory of Quality Research in Chinese Medicine, Institute of Chinese Medical Sciences (ICMS), University of Macau, Macau, China 2Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macau, China 3Xiangya School of Pharmaceutical Sciences, Central South University, No. 172, Tongzipo Road, Yuelu District, Changsha, People’s Republic of China Note: Zhuyifan Ye and Yilong Yang made equal contribution to the manuscript. Corresponding author: Defang Ouyang, email: [email protected]; telephone: 853-88224514. ABSTRACT: Background: Pharmacokinetic evaluation is one of the key processes in drug discovery and development. However, current absorption, distribution, metabolism, excretion prediction models still have limited accuracy. Aim: This study aims to construct an integrated transfer learning and multitask learning approach for developing quantitative structure-activity relationship models to predict four human pharmacokinetic parameters. Methods: A pharmacokinetic dataset included 1104 U.S. FDA approved small molecule drugs. The dataset included four human pharmacokinetic parameter subsets (oral bioavailability, plasma protein binding rate, apparent volume of distribution at steady-state and elimination half-life). The pre-trained model was trained on over 30 million bioactivity data. An integrated transfer learning and multitask learning approach was established to enhance the model generalization. Results: The pharmacokinetic dataset was split into three parts (60:20:20) for training, validation and test by the improved Maximum Dissimilarity algorithm with the representative initial set selection algorithm and the weighted distance function. The multitask learning techniques enhanced the model predictive ability.
    [Show full text]
  • Getting Started with Machine Learning
    1 Getting Started with Machine Learning CSC131 The Beauty & Joy of Computing Cornell College 600 First Street SW Mount Vernon, Iowa 52314 September 2018 2 Contents 1 Applications7 1.1 Sheldon Branch............................7 1.2 Bram Dedrick.............................8 1.3 Tony Ferenzi.............................9 1.3.1 Benefits of Machine Learning................9 1.4 William Golden............................ 11 1.4.1 Humans: The Teachers of Technology........... 11 1.5 Yuan Hong.............................. 13 1.6 Easton Jensen............................. 15 1.7 Rodrigo Martinez........................... 17 1.7.1 Machine Learning in Medicine............... 17 1.8 Matt Morrical............................. 19 1.9 Ella Nelson.............................. 20 1.10 Koichi Okazaki............................ 21 1.11 Jakob Orel.............................. 23 1.12 Marcellus Parks............................ 24 1.13 Lydia Sanchez............................. 26 1.14 Tiff Serra-Pichardo.......................... 28 1.15 Austin Stala.............................. 29 1.16 Nicole Trenholm........................... 30 1.17 Maddy Weaver............................ 32 1.18 Peter Weber.............................. 33 3 4 CONTENTS 2 Recommendations 35 2.1 Sheldon Branch............................ 35 2.1.1 Course 1: Machine Learning................. 35 2.1.2 Course 2: Robotics: Vision Intelligence and Machine Learn- ing............................... 36 2.1.3 Course 3: Machine Learning Fundamentals........ 38 2.2 Bram Dedrick............................
    [Show full text]