A Hidden Markov Model for Matching Spatial Networks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Multivariate Poisson Hidden Markov Models for Analysis of Spatial Counts
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Saskatchewan's Research Archive MULTIVARIATE POISSON HIDDEN MARKOV MODELS FOR ANALYSIS OF SPATIAL COUNTS A Thesis Submitted to the Faculty of Graduate Studies and Research in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Department of Mathematics and Statistics University of Saskatchewan, Saskatoon, SK, Canada by Chandima Piyadharshani Karunanayake @Copyright Chandima Piyadharshani Karunanayake, June 2007. All rights Reserved. PERMISSION TO USE The author has agreed that the libraries of this University may provide the thesis freely available for inspection. Moreover, the author has agreed that permission for copying of the thesis in any manner, entirely or in part, for scholarly purposes may be granted by the Professor or Professors who supervised my thesis work or in their absence, by the Head of the Department of Mathematics and Statistics or the Dean of the College in which the thesis work was done. It is understood that any copying or publication or use of the thesis or parts thereof for finanancial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to the author and to the University of Saskatchewan in any scholarly use which may be made of any material in this thesis. Requests for permission to copy or to make other use of any material in the thesis should be addressed to: Head Department of Mathematics and Statistics University of Saskatchewan 106, Wiggins Road Saskatoon, Saskatchewan Canada, S7N 5E6 i ABSTRACT Multivariate count data are found in a variety of fields. -
Regime Heteroskedasticity in Bitcoin: a Comparison of Markov Switching Models
Munich Personal RePEc Archive Regime heteroskedasticity in Bitcoin: A comparison of Markov switching models Chappell, Daniel Birkbeck College, University of London 28 September 2018 Online at https://mpra.ub.uni-muenchen.de/90682/ MPRA Paper No. 90682, posted 24 Dec 2018 06:38 UTC Regime heteroskedasticity in Bitcoin: A comparison of Markov switching models Daniel R. Chappell Department of Economics, Mathematics and Statistics Birkbeck College, University of London [email protected] 28th September 2018 Abstract Markov regime-switching (MRS) models, also known as hidden Markov models (HMM), are used extensively to account for regime heteroskedasticity within the returns of financial assets. However, we believe this paper to be one of the first to apply such methodology to the time series of cryptocurrencies. In light of Moln´arand Thies (2018) demonstrating that the price data of Bitcoin contained seven distinct volatility regimes, we will fit a sample of Bitcoin returns with six m-state MRS estimations, with m ∈ {2,..., 7}. Our aim is to identify the optimal number of states for modelling the regime heteroskedasticity in the price data of Bitcoin. Goodness-of-fit will be judged using three information criteria, namely: Bayesian (BIC); Hannan-Quinn (HQ); and Akaike (AIC). We determined that the restricted 5-state model generated the optimal estima- tion for the sample. In addition, we found evidence of volatility clustering, volatility jumps and asymmetric volatility transitions whilst also inferring the persistence of shocks in the price data of Bitcoin. Keywords Bitcoin; Markov regime-switching; regime heteroskedasticity; volatility transitions. 1 2 List of Tables Table 1. Summary statistics for Bitcoin (23rd April 2014 to 31st May 2018) . -
12 : Conditional Random Fields 1 Hidden Markov Model
10-708: Probabilistic Graphical Models 10-708, Spring 2014 12 : Conditional Random Fields Lecturer: Eric P. Xing Scribes: Qin Gao, Siheng Chen 1 Hidden Markov Model 1.1 General parametric form In hidden Markov model (HMM), we have three sets of parameters, j i transition probability matrix A : p(yt = 1jyt−1 = 1) = ai;j; initialprobabilities : p(y1) ∼ Multinomial(π1; π2; :::; πM ); i emission probabilities : p(xtjyt) ∼ Multinomial(bi;1; bi;2; :::; bi;K ): 1.2 Inference k k The inference can be done with forward algorithm which computes αt ≡ µt−1!t(k) = P (x1; :::; xt−1; xt; yt = 1) recursively by k k X i αt = p(xtjyt = 1) αt−1ai;k; (1) i k k and the backward algorithm which computes βt ≡ µt t+1(k) = P (xt+1; :::; xT jyt = 1) recursively by k X i i βt = ak;ip(xt+1jyt+1 = 1)βt+1: (2) i Another key quantity is the conditional probability of any hidden state given the entire sequence, which can be computed by the dot product of forward message and backward message by, i i i i X i;j γt = p(yt = 1jx1:T ) / αtβt = ξt ; (3) j where we define, i;j i j ξt = p(yt = 1; yt−1 = 1; x1:T ); i j / µt−1!t(yt = 1)µt t+1(yt+1 = 1)p(xt+1jyt+1)p(yt+1jyt); i j i = αtβt+1ai;jp(xt+1jyt+1 = 1): The implementation in Matlab can be vectorized by using, i Bt(i) = p(xtjyt = 1); j i A(i; j) = p(yt+1 = 1jyt = 1): 1 2 12 : Conditional Random Fields The relation of those quantities can be simply written in pseudocode as, T αt = (A αt−1): ∗ Bt; βt = A(βt+1: ∗ Bt+1); T ξt = (αt(βt+1: ∗ Bt+1) ): ∗ A; γt = αt: ∗ βt: 1.3 Learning 1.3.1 Supervised Learning The supervised learning is trivial if only we know the true state path. -
Oracle Database 10G: Oracle Spatial Network Data Model
Oracle Database 10g: Oracle Spatial Network Data Model An Oracle Technical White Paper May 2005 Oracle Spatial Network Data Model Table of Contents Introduction ....................................................................................................... 3 Design Goals and Architecture ....................................................................... 4 Major Steps Using the Network Data Model................................................ 5 Network Modeling........................................................................................ 5 Network Analysis.......................................................................................... 6 Network Modeling ............................................................................................ 6 Metadata and Schema ....................................................................................... 6 Network Java Representation and API.......................................................... 7 Network Creation Using SQL and PL/SQL ................................................ 8 Creating a Logical Network......................................................................... 9 Creating a Spatial Network.......................................................................... 9 Creating an SDO Geometry Network ................................................ 10 Creating an LRS Geometry Network.................................................. 10 Creating a Topology Geometry Network........................................... 11 Network Creation -
Ergodicity, Decisions, and Partial Information
Ergodicity, Decisions, and Partial Information Ramon van Handel Abstract In the simplest sequential decision problem for an ergodic stochastic pro- cess X, at each time n a decision un is made as a function of past observations X0,...,Xn 1, and a loss l(un,Xn) is incurred. In this setting, it is known that one may choose− (under a mild integrability assumption) a decision strategy whose path- wise time-average loss is asymptotically smaller than that of any other strategy. The corresponding problem in the case of partial information proves to be much more delicate, however: if the process X is not observable, but decisions must be based on the observation of a different process Y, the existence of pathwise optimal strategies is not guaranteed. The aim of this paper is to exhibit connections between pathwise optimal strategies and notions from ergodic theory. The sequential decision problem is developed in the general setting of an ergodic dynamical system (Ω,B,P,T) with partial information Y B. The existence of pathwise optimal strategies grounded in ⊆ two basic properties: the conditional ergodic theory of the dynamical system, and the complexity of the loss function. When the loss function is not too complex, a gen- eral sufficient condition for the existence of pathwise optimal strategies is that the dynamical system is a conditional K-automorphism relative to the past observations n n 0 T Y. If the conditional ergodicity assumption is strengthened, the complexity assumption≥ can be weakened. Several examples demonstrate the interplay between complexity and ergodicity, which does not arise in the case of full information. -
A Network-Of-Networks Percolation Analysis of Cascading Failures in Spatially Co-Located Road-Sewer Infrastructure Networks
Physica A 538 (2020) 122971 Contents lists available at ScienceDirect Physica A journal homepage: www.elsevier.com/locate/physa A network-of-networks percolation analysis of cascading failures in spatially co-located road-sewer infrastructure networks ∗ ∗ Shangjia Dong a, , Haizhong Wang a, , Alireza Mostafizi a, Xuan Song b a School of Civil and Construction Engineering, Oregon State University, Corvallis, OR 97331, United States of America b Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China article info a b s t r a c t Article history: This paper presents a network-of-networks analysis framework of interdependent crit- Received 26 September 2018 ical infrastructure systems, with a focus on the co-located road-sewer network. The Received in revised form 28 May 2019 constructed interdependency considers two types of node dynamics: co-located and Available online 27 September 2019 multiple-to-one dependency, with different robustness metrics based on their function Keywords: logic. The objectives of this paper are twofold: (1) to characterize the impact of the Co-located road-sewer network interdependency on networks' robustness performance, and (2) to unveil the critical Network-of-networks percolation transition threshold of the interdependent road-sewer network. The results Percolation modeling show that (1) road and sewer networks are mutually interdependent and are vulnerable Infrastructure interdependency to the cascading failures initiated by sewer system disruption; (2) the network robust- Cascading failure ness decreases as the number of initial failure sources increases in the localized failure scenarios, but the rate declines as the number of failures increase; and (3) the sewer network contains two types of links: zero exposure and severe exposure to liquefaction, and therefore, it leads to a two-phase percolation transition subject to the probabilistic liquefaction-induced failures. -
Particle Gibbs for Infinite Hidden Markov Models
Particle Gibbs for Infinite Hidden Markov Models Nilesh Tripuraneni* Shixiang Gu* Hong Ge University of Cambridge University of Cambridge University of Cambridge [email protected] MPI for Intelligent Systems [email protected] [email protected] Zoubin Ghahramani University of Cambridge [email protected] Abstract Infinite Hidden Markov Models (iHMM’s) are an attractive, nonparametric gener- alization of the classical Hidden Markov Model which can automatically infer the number of hidden states in the system. However, due to the infinite-dimensional nature of the transition dynamics, performing inference in the iHMM is difficult. In this paper, we present an infinite-state Particle Gibbs (PG) algorithm to re- sample state trajectories for the iHMM. The proposed algorithm uses an efficient proposal optimized for iHMMs and leverages ancestor sampling to improve the mixing of the standard PG algorithm. Our algorithm demonstrates significant con- vergence improvements on synthetic and real world data sets. 1 Introduction Hidden Markov Models (HMM’s) are among the most widely adopted latent-variable models used to model time-series datasets in the statistics and machine learning communities. They have also been successfully applied in a variety of domains including genomics, language, and finance where sequential data naturally arises [Rabiner, 1989; Bishop, 2006]. One possible disadvantage of the finite-state space HMM framework is that one must a-priori spec- ify the number of latent states K. Standard model selection techniques can be applied to the fi- nite state-space HMM but bear a high computational overhead since they require the repetitive trainingexploration of many HMM’s of different sizes. -
Hidden Markov Models (Particle Filtering)
CSE 473: Artificial Intelligence Spring 2014 Hidden Markov Models & Particle Filtering Hanna Hajishirzi Many slides adapted from Dan Weld, Pieter Abbeel, Dan Klein, Stuart Russell, Andrew Moore & Luke Zettlemoyer 1 Outline § Probabilistic sequence models (and inference) § Probability and Uncertainty – Preview § Markov Chains § Hidden Markov Models § Exact Inference § Particle Filters § Applications Example § A robot move in a discrete grid § May fail to move in the desired direction with some probability § Observation from noisy sensor at each time § Is a function of robot position § Goal: Find the robot position (probability that a robot is at a specific position) § Cannot always compute this probability exactly è Approximation methods Here: Approximate a distribution by sampling 3 Hidden Markov Model § State Space Model § Hidden states: Modeled as a Markov Process P(x0), P(xk | xk-1) § Observations: ek P(ek | xk) Position of the robot P(x1|x0) x x x 0 1 … n Observed position from P(e |x ) 0 0 the sensor y0 y1 yn 4 Exact Solution: Forward Algorithm § Filtering is the inference process of finding a distribution over XT given e1 through eT : P( XT | e1:t ) § We first compute P( X1 | e1 ): § For each t from 2 to T, we have P( Xt-1 | e1:t-1 ) § Elapse time: compute P( Xt | e1:t-1 ) § Observe: compute P(Xt | e1:t-1 , et) = P( Xt | e1:t ) Approximate Inference: § Sometimes |X| is too big for exact inference § |X| may be too big to even store B(X) § E.g. when X is continuous § |X|2 may be too big to do updates § Solution: approximate inference by sampling § How robot localization works in practice 6 What is Sampling? § Goal: Approximate the original distribution: § Approximate with Gaussian distribution § Draw samples from a distribution close enough to the original distribution § Here: A general framework for a sampling method 7 Approximate Solution: Perfect Sampling Robot path till time n 1 Time 1 Time n Assume we can sample Particle 1 x0:n from the original distribution . -
Hierarchical Dirichlet Process Hidden Markov Model for Unsupervised Bioacoustic Analysis
Hierarchical Dirichlet Process Hidden Markov Model for Unsupervised Bioacoustic Analysis Marius Bartcus, Faicel Chamroukhi, Herve Glotin Abstract-Hidden Markov Models (HMMs) are one of the the standard HDP-HMM Gibbs sampling has the limitation most popular and successful models in statistics and machine of an inadequate modeling of the temporal persistence of learning for modeling sequential data. However, one main issue states [9]. This problem has been addressed in [9] by relying in HMMs is the one of choosing the number of hidden states. on a sticky extension which allows a more robust learning. The Hierarchical Dirichlet Process (HDP)-HMM is a Bayesian Other solutions for the inference of the hidden Markov non-parametric alternative for standard HMMs that offers a model in this infinite state space models are using the Beam principled way to tackle this challenging problem by relying sampling [lO] rather than Gibbs sampling. on a Hierarchical Dirichlet Process (HDP) prior. We investigate the HDP-HMM in a challenging problem of unsupervised We investigate the BNP formulation for the HMM, that is learning from bioacoustic data by using Markov-Chain Monte the HDP-HMM into a challenging problem of unsupervised Carlo (MCMC) sampling techniques, namely the Gibbs sampler. learning from bioacoustic data. The problem consists of We consider a real problem of fully unsupervised humpback extracting and classifying, in a fully unsupervised way, whale song decomposition. It consists in simultaneously finding the structure of hidden whale song units, and automatically unknown number of whale song units. We use the Gibbs inferring the unknown number of the hidden units from the Mel sampler to infer the HDP-HMM from the bioacoustic data. -
Modelling Multi-Object Activity by Gaussian Processes 1
LOY et al.: MODELLING MULTI-OBJECT ACTIVITY BY GAUSSIAN PROCESSES 1 Modelling Multi-object Activity by Gaussian Processes Chen Change Loy School of EECS [email protected] Queen Mary University of London Tao Xiang E1 4NS London, UK [email protected] Shaogang Gong [email protected] Abstract We present a new approach for activity modelling and anomaly detection based on non-parametric Gaussian Process (GP) models. Specifically, GP regression models are formulated to learn non-linear relationships between multi-object activity patterns ob- served from semantically decomposed regions in complex scenes. Predictive distribu- tions are inferred from the regression models to compare with the actual observations for real-time anomaly detection. The use of a flexible, non-parametric model alleviates the difficult problem of selecting appropriate model complexity encountered in parametric models such as Dynamic Bayesian Networks (DBNs). Crucially, our GP models need fewer parameters; they are thus less likely to overfit given sparse data. In addition, our approach is robust to the inevitable noise in activity representation as noise is modelled explicitly in the GP models. Experimental results on a public traffic scene show that our models outperform DBNs in terms of anomaly sensitivity, noise robustness, and flexibil- ity in modelling complex activity. 1 Introduction Activity modelling and automatic anomaly detection in video have received increasing at- tention due to the recent large-scale deployments of surveillance cameras. These tasks are non-trivial because complex activity patterns in a busy public space involve multiple objects interacting with each other over space and time, whilst anomalies are often rare, ambigu- ous and can be easily confused with noise caused by low image quality, unstable lighting condition and occlusion. -
Planarity As a Driver of Spatial Network Structure
DOI: http://dx.doi.org/10.7551/978-0-262-33027-5-ch075 Planarity as a driver of Spatial Network structure Garvin Haslett and Markus Brede Institute for Complex Systems Simulation, School of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, United Kingdom [email protected] Downloaded from http://direct.mit.edu/isal/proceedings-pdf/ecal2015/27/423/1903775/978-0-262-33027-5-ch075.pdf by guest on 23 September 2021 Abstract include city science (Cardillo et al., 2006; Xie and Levin- son, 2007; Jiang, 2007; Barthelemy´ and Flammini, 2008; In this paper we introduce a new model of spatial network growth in which nodes are placed at randomly selected lo- Masucci et al., 2009; Chan et al., 2011; Courtat et al., 2011; cations in space over time, forming new connections to old Strano et al., 2012; Levinson, 2012; Rui et al., 2013; Gud- nodes subject to the constraint that edges do not cross. The mundsson and Mohajeri, 2013), electronic circuits (i Can- resulting network has a power law degree distribution, high cho et al., 2001; Bassett et al., 2010; Miralles et al., 2010; clustering and the small world property. We argue that these Tan et al., 2014), wireless networks (Huson and Sen, 1995; characteristics are a consequence of two features of our mech- anism, growth and planarity conservation. We further pro- Lotker and Peleg, 2010), leaf venation (Corson, 2010; Kat- pose that our model can be understood as a variant of ran- ifori et al., 2010), navigability (Kleinberg, 2000; Lee and dom Apollonian growth. -
Arxiv:2006.02870V1 [Cs.SI] 4 Jun 2020
The why, how, and when of representations for complex systems Leo Torres Ann S. Blevins [email protected] [email protected] Network Science Institute, Department of Bioengineering, Northeastern University University of Pennsylvania Danielle S. Bassett Tina Eliassi-Rad [email protected] [email protected] Department of Bioengineering, Network Science Institute and University of Pennsylvania Khoury College of Computer Sciences, Northeastern University June 5, 2020 arXiv:2006.02870v1 [cs.SI] 4 Jun 2020 1 Contents 1 Introduction 4 1.1 Definitions . .5 2 Dependencies by the system, for the system 6 2.1 Subset dependencies . .7 2.2 Temporal dependencies . .8 2.3 Spatial dependencies . 10 2.4 External sources of dependencies . 11 3 Formal representations of complex systems 12 3.1 Graphs . 13 3.2 Simplicial Complexes . 13 3.3 Hypergraphs . 15 3.4 Variations . 15 3.5 Encoding system dependencies . 18 4 Mathematical relationships between formalisms 21 5 Methods suitable for each representation 24 5.1 Methods for graphs . 24 5.2 Methods for simplicial complexes . 25 5.3 Methods for hypergraphs . 27 5.4 Methods and dependencies . 28 6 Examples 29 6.1 Coauthorship . 29 6.2 Email communications . 32 7 Applications 35 8 Discussion and Conclusion 36 9 Acknowledgments 38 10 Citation diversity statement 38 2 Abstract Complex systems thinking is applied to a wide variety of domains, from neuroscience to computer science and economics. The wide variety of implementations has resulted in two key challenges: the progenation of many domain-specific strategies that are seldom revisited or questioned, and the siloing of ideas within a domain due to inconsistency of complex systems language.