stat841f11

From statwiki
Jump to navigation Jump to search

Proposal for Final Project

Presentation Sign Up

Editor Sign Up

STAT 441/841 / CM 463/763 - Tuesday, 2011/09/20

Wiki Course Notes

Students will need to contribute to the wiki for 20% of their grade. Access via wikicoursenote.com Go to editor sign-up, and use your UW userid for your account name, and use your UW email.

primary (10%) Post a draft of lecture notes within 48 hours. You will need to do this 1 or 2 times, depending on class size.

secondary (10%) Make improvements to the notes for at least 60% of the lectures. More than half of your contributions should be technical rather than editorial. There will be a spreadsheet where students can indicate what they've done and when. The instructor will conduct random spot checks to ensure that students have contributed what they claim.


Classification (Lecture: Sep. 20, 2011)

Introduction

Machine learning (ML) methodology in general is an artificial intelligence approach to establish and train a model to recognize the pattern or underlying mapping of a system based on a set of training examples consisting of input and output patterns. Unlike in classical statistics where inference is made from small datasets, machine learning involves drawing inference from an overwhelming amount of data that could not be reasonably parsed by manpower.

In machine learning, pattern recognition is the assignment of some sort of output value (or label) to a given input value (or instance), according to some specific algorithm. The approach of using examples to produce the output labels is known as learning methodology. When the underlying function from inputs to outputs exists, it is referred to as the target function. The estimate of the target function which is learnt or output by the learning algorithm is known as the solution of learning problem. In case of classification this function is referred to as the decision function.

In the broadest sense, any method that incorporates information from training samples in the design of a classifier employs learning. Learning tasks can be classified along different dimensions. One important dimension is the distinction between supervised and unsupervised learning. In supervised learning a category label for each pattern in the training set is provided. The trained system will then generalize to new data samples. In unsupervised learning , on the other hand, training data has not been labeled, and the system forms clusters or natural grouping of input patterns based on some sort of measure of similarity and it can then be used to determine the correct output value for new data instances.

The first category is known as pattern classification and the second one as clustering. Pattern classification is the main focus in this course.


Classification problem formulation : Suppose that we are given n observations. Each observation consists of a pair: a vector xiRd,i=1,...,n, and the associated label yi. Where xi=(xi1,xi2,...xid)XRd and Yi belongs to some finite set Y.

The classification task is now looking for a function f:xiy which maps the input data points to a target value (i.e. class label). Function f(x,θ) is defined by a set of parametrs θ and the goal is to train the classifier in a way that among all possible mappings with different parameters the obtained decision boundary gives the minimum classification error.

Definitions

The true error rate for classifier h is the error with respect to the unknown underlying distribution when predicting a discrete random variable Y from a given input X.

L(h)=P(h(X)Y)


The empirical error rate is the error of our classification function h(x) on a given dataset with known outputs (e.g. training data, test data)

L^n(h)=(1/n)i=1nI(h(Xi)Yi) where h is a clssifier and I() is an indicator function. The indicator function is defined by

I(x)={1if x is true0if x is false

So in this case, I(h(Xi)Yi)={1if h(Xi)Yi (i.e. misclassification)0if h(Xi)=Yi (i.e. classified properly)


For example, suppose we have 100 new data points with known (true) labels

X1...X100 y1...y100

To calculate the empirical error, we count how many times our function h(X) classifies incorrectly (does not match y) and divide by n=100.

Bayes Classifier

The principle of the Bayes Classifier is to calculate the posterior probability of a given object from its prior probability via Bayes' Rule, and then assign the object to the class with the largest posterior probability<ref> http://www.wikicoursenote.com/wiki/Stat841#Bayes_Classifier </ref>.

First recall Bayes' Rule, in the format P(Y|X)=P(X|Y)P(Y)P(X)

P(Y|X)  : posterior , probability of Y given X

P(X|Y)  : likelihood, probability of X being generated by Y

P(Y)  : prior, probability of Y being selected

P(X)  : marginal, probability of obtaining X


We will start with the simplest case: Y={0,1}

r(x)=P(Y=1|X=x)=P(X=x|Y=1)P(Y=1)P(X=x)=P(X=x|Y=1)P(Y=1)P(X=x|Y=1)P(Y=1)+P(X=x|Y=0)P(Y=0)

Bayes' rule can be approached by computing either one of the following:

1) The posterior:  P(Y=1|X=x) and  P(Y=0|X=x)

2) The likelihood:  P(X=x|Y=1) and  P(X=x|Y=0)


The former reflects a Bayesian approach. The Bayesian approach uses previous beliefs and observed data (e.g., the random variable  X) to determine the probability distribution of the parameter of interest (e.g., the random variable  Y). The probability, according to Bayesians, is a degree of belief in the parameter of interest taking on a particular value (e.g.,  Y=1), given a particular observation (e.g.,  X=x). Historically, the difficulty in this approach lies with determining the posterior distribution. However, more recent methods such as Markov Chain Monte Carlo (MCMC) allow the Bayesian approach to be implemented <ref name="PCAustin">P. C. Austin, C. D. Naylor, and J. V. Tu, "A comparison of a Bayesian vs. a frequentist method for profiling hospital performance," Journal of Evaluation in Clinical Practice, 2001</ref>.

The latter reflects a Frequentist approach. The Frequentist approach assumes that the probability distribution (including the mean, variance, etc.) is fixed for the parameter of interest (e.g., the variable  Y, which is not random). The observed data (e.g., the random variable  X) is simply a sampling of a far larger population of possible observations. Thus, a certain repeatability or frequency is expected in the observed data. If it were possible to make an infinite number of observations, then the true probability distribution of the parameter of interest can be found. In general, frequentists use a technique called hypothesis testing to compare a null hypothesis (e.g. an assumption that the mean of the probability distribution is  μ0) to an alternative hypothesis (e.g. assuming that the mean of the probability distribution is larger than  μ0) <ref name="PCAustin"/>. For more information on hypothesis testing see <ref>R. Levy, "Frequency hypothesis testing, and contingency tables" class notes for LING251, Department of Linguistics, University of California, 2007. Available: http://idiom.ucsd.edu/~rlevy/lign251/fall2007/lecture_8.pdf </ref>.

There was some class discussion on which approach should be used. Both the ease of computation and the validity of both approaches were discussed. A main point that was brought up in class is that Frequentists consider X to be a random variable, but they do not consider Y to be a random variable because it has to take on one of the values from a fixed set (in the above case it would be either 0 or 1 and there is only one correct label for a given value X=x). Thus, from a Frequentist's perspective it does not make sense to talk about the probability of Y. This is actually a grey area and sometimes Bayesians and Frequentists use each others' approaches. So using Bayes' rule doesn't necessarily mean you're a Bayesian. Overall, the question remains unresolved.


The Bayes Classifier uses  P(Y=1|X=x)

P(Y=1|X=x)=P(X=x|Y=1)P(Y=1)P(X=x|Y=1)P(Y=1)+P(X=x|Y=0)P(Y=0)

P(Y=1) : the prior, based on belief/evidence beforehand

denominator : marginalized by summation

h(x)={1  r^(x)>1/20  otherwise

The set D(h)={x:P(Y=1|X=x)=P(Y=0|X=x)...}

which defines a decision boundary.

h(x)={1  if  P(Y=1|X=x)>P(Y=0|X=x)0      otherwise

Theorem: The Bayes Classifier is optimal, i.e., if h is any other classification rule, then L(h)<=L(h)

Proof: Consider any classifier h. We can express the error rate as

P({h(X)Y})=EX,Y[1{h(X)Y}]=EX[EY[1{h(X)Y}|X]]

To minimize this last expression, it suffices to minimize the inner expectation. Expanding this expectation:

EY[1{h(X)Y}|X]=ySupp(Y)P(h(X)y|X)1{h(X)y}

which, in the two-class case, simplifies to

=P(h(X)0|X)1{h(X)0}+P(h(X)1|X)1{h(X)1}
=r(X)1{h(X)0}+(1r(X))1{h(X)1}

where r(x) is defined as above. We should 'choose' h(X) to equal the label that minimizes the sum. Consider if r(X)>1/2, then r(X)>1r(X) so we should let h(X)=1 to minimize the sum. Thus the Bayes classifier is the optimal classifier.

Why then do we need other classification methods? Because X densities are often/typically unknown. I.e., fk(x) and/or πk unknown.

P(Y=k|X=x)=P(X=x|Y=k)P(Y=k)P(X=x)=fk(x)πkkfk(x)πk f_k(x) is referred to as the class conditional distribution (~likelihood).

Therefore, we rely on some data to estimate quantities.

Three Main Approaches

1. Empirical Risk Minimization: Choose a set of classifiers H (e.g., line, neural network) and find hH that minimizes (some estimate of) L(h).

2. Regression: Find an estimate (r^) of function r and define h(x)={1  r^(x)>1/20  otherwise

The 1/2 in the expression above is a threshold set for the regression prediction output.

In general regression refers to finding a continuous, real valued y. The problem here is more difficult, because of the restricted domain (y is a set of discrete label values).

3. Density Estimation: Estimate P(X=x|Y=0) from Xi's for which Yi=0 Estimate P(X=x|Y=1) from Xi's for which Yi=1 and let P(Y=?)=(1/n)i=1nYi

Define r^(x)=P^(Y=1|X=x) and h(x)={1  r^(x)>1/20  otherwise

It is possible that there may not be enough data to estimate from for density estimation. But the main problem lies with high dimensional spaces, as the estimation results may not be good (high error rate) and sometimes even infeasible. The term curse of dimensionality was coined by Bellman <ref>R. E. Bellman, Dynamic Programming. Princeton University Press, 1957</ref> to describe this problem.

As the dimension of the space goes up, the learning requirements go up exponentially.

To Learn more about methods for handling high-dimensional data <ref> https://docs.google.com/viewer?url=http%3A%2F%2Fwww.bios.unc.edu%2F~dzeng%2FBIOS740%2Flecture_notes.pdf</ref>

The simplest approach to classification is to use the third approach.

Multi-Class Classification

Generalize to case Y takes on k>2 values.


Theorem: YY={1,2,...,k} optimal rule

 h(x)=argmaxkP(Y=k|X=x)

where P(Y=k|X=x)=fk(x)πkrfrπr

Examples of Classification

  • Face detection in images.
  • Medical diagnosis.
  • Detecting credit card fraud (fraudulent or legitimate).
  • Speech recognition.
  • Handwriting recognition.

LDA and QDA

Discriminant function analysis finds features that best allow discrimination between two or more classes. The approach is similar to analysis of Variance (ANOVA) in that discriminant function analysis looks at the mean values to determine if two or more classes are very different and should be separated. Once the discriminant functions (that separate two or more classes) have been determined, new data points can be classified (i.e. placed in one of the classes) based on the discriminant functions <ref> StatSoft, Inc. (2011). Electronic Statistics Textbook. [Online]. Available: http://www.statsoft.com/textbook/discriminant-function-analysis/. </ref>. Linear discriminant analysis (LDA) and Quadratic discriminant analysis (QDA) are methods of discriminant analysis that are best applied to linearly and quadradically separable classes, respectively. Fisher discriminant analysis (FDA) another method of discriminant analysis that is different from linear discriminant analysis, but oftentimes both terms are used interchangeably.

LDA

The simplest method is to use approach 3 (above) and assume a parametric model for densities. Assume class conditional is Gaussian.

Y={0,1} assumed (i.e., 2 labels)

h(x)={1  P(Y=1|X=x)>P(Y=0|X=x)0  otherwise

P(Y=1|X=x)=f1(x)π1kfkπk   (denom = P(x))

1) Assume Gaussian distributions

fk(x)=1(2π)d/2|Σk|1/2exp(12(xμk)Σk1(xμk))

must compare f1(x)π1p(x) with f0(x)π0p(x) Note that the p(x) denom can be ignored: f1(x)π1 with f0(x)π0

To find the decision boundary, set f1(x)π1=f0(x)π0

1(2π)d/2|Σ1|1/2exp(12(xμ1)Σ11(xμ1))π1=1(2π)d/2|Σ0|1/2exp(12(xμ0)Σ01(xμ0))π0

2) Assume Σ1=Σ0, we can use Σ=Σ0=Σ1.

1(2π)d/2|Σ|1/2exp(12(xμ1)Σ1(xμ1))π1=1(2π)d/2|Σ|1/2exp(12(xμ0)Σ1(xμ0))π0

3) Cancel (2π)d/2|Σ|1/2 from both sides.


exp(12(xμ1)Σ1(xμ1))π1=exp(12(xμ0)Σ1(xμ0))π0

4) Take log of both sides.

12(xμ1)Σ1(xμ1))+log(π1)=12(xμ0)Σ1(xμ0))+log(π0)

5) Subtract one side from both sides, leaving zero on one side.


12(xμ1)TΣ1(xμ1)+log(π1)[12(xμ0)TΣ1(xμ0)+log(π0)]=0


12[xTΣ1xμ1TΣ1μ1+2μ1TΣ1x+xTΣ1x+μ0TΣ1μ02μ0TΣ1x]+log(π1π0)=0


Cancelling out the terms quadratic in x and rearranging results in

12[μ1TΣ1μ1+μ0TΣ1μ0+(2μ1TΣ12μ0TΣ1)x]+log(π1π0)=0


We can see that the first pair of terms is constant, and the second pair is linear in x. Therefore, we end up with something of the form ax+b=0. For more about LDA <ref>http://sites.stat.psu.edu/~jiali/course/stat597e/notes2/lda.pdf</ref>

LDA and QDA Continued (Lecture: Sep. 22, 2011)

If we relax assumption 2 (i.e. Σ1Σ0) then we get a quadratic equation that can be written as xTax+bx+c=0

Generalizing LDA and QDA

Theorem:


Suppose that Y{1,,K}, if fk(x)=Pr(X=x|Y=k) is Gaussian. The Bayes Classifier is

h(x)=argmaxkδk(x)

Where

δk(x)=12log(|Σk|)12(xμk)Σk1(xμk)+log(πk)

When the Gaussian variances are equal Σ1=Σ0 (e.g. LDA), then

δk(x)=xΣ1μk12μkΣ1μk+log(πk)

(To compute this, we need to calculate the value of δ for each class, and then take the one with the max. value).

In practice

We estimate the prior to be the chance that a random item from the collection belongs to class k, e.g.

πk^=Pr^(y=k)=nkn

The mean to be the average item in set k, e.g.

μk^=1nki:yi=kxi

and calculate the covariance of each class e.g.

Σk^=1nki:yi=k(xiμk^)(xiμk^)

If we wish to use LDA we must calculate a common covariance, so we average all the covariances e.g.

Σ=r=1k(nrΣr)r=1knr

Where: nr is the number of data points in class r, Σr is the covariance of class r, n is the total number of data points, and k is the number of classes.

Computation

For QDA we need to calculate: δk(x)=12log(|Σk|)12(xμk)Σk1(xμk)+log(πk)

Lets first consider when Σk=I,k. This is the case where each distribution is spherical, around the mean point.

Case 1

When Σk=I

We have:

δk=12log(|I|)12(xμk)I(xμk)+log(πk)

but  log(|I|)=log(1)=0

and (xμk)I(xμk)=(xμk)(xμk) is the squared Euclidean distance between two points x and μk

Thus in this condition, a new point can be classified by its distance away from the center of a class, adjusted by some prior.

Further, for two-class problem with equal prior, the discriminating function would be the bisector of the 2-class's means.

Case 2

When ΣkI


Using the Singular Value Decomposition (SVD) of Σk we get Σk=UkSkVk. In particular, Uk is a collection of eigenvectors of ΣkΣk, and Vk is a collection of eigenvectors of ΣkΣk. Since Σk is a symmetric matrix<ref> http://en.wikipedia.org/wiki/Covariance_matrix#Properties </ref>, Σk=Σk, so we have Σk=UkSkUk.

For δk, the second term becomes what is also known as the Mahalanobis distance <ref>P. C. Mahalanobis, "On The Generalised Distance in Statistics," Proceedings of the National Institute of Sciences of India, 1936</ref> :

(xμk)Σk1(xμk)=(xμk)UkSk1UkT(xμk)=(UkxUkμk)Sk1(UkxUkμk)=(UkxUkμk)Sk12Sk12(UkxUkμk)=(Sk12UkxSk12Ukμk)I(Sk12UkxSk12Ukμk)=(Sk12UkxSk12Ukμk)(Sk12UkxSk12Ukμk)

If we think of Sk12Uk as a linear transformation that takes points in class k and distributes them spherically around a point, like in case 1. Thus when we are given a new point, we can apply the modified δk values to calculate  h(x). After applying the singular value decomposition, Σk1 is considered to be an identity matrix such that

δk=12log(|I|)12[(Sk12UkxSk12Ukμk)(Sk12UkxSk12Ukμk)]+log(πk)

and,

 log(|I|)=log(1)=0

For applying the above method with classes that have different covariance matrices (for example the covariance matrices  Σ0 and  Σ1 for the two class case), each of the covariance matrices has to be decomposed using SVD to find the according transformation. Then, each new data point has to be transformed using each transformation to compare its distance to the mean of each class (for example for the two class case, the new data point would have to be transformed by the class 1 transformation and then compared to  μ0 and the new data point would also have to be transformed by the class 2 transformation and then compared to  μ1).


The difference between Case 1 and Case 2 (i.e. the difference between using the Euclidean and Mahalanobis distance) can be seen in the illustration below.

Illustration of Euclidean distance (a) and Mahalanobis distance (b) where the contours represent equidistant points from the center using each distance metric. Source: <ref>R. De Maesschalck, D. Jouan-Rimbaud and D. L. Massart, "Tutorial - The Mahalanobis distance," Chemometrics and Intelligent Laboratory Systems, 2000 </ref>

As can be seen from the illustration above, the Mahalanobis distance takes into account the distribution of the data points, whereas the Euclidean distance would treat the data as though it has a spherical distribution. Thus, the Mahalanobis distance applies for the more general classification in Case 2, whereas the Euclidean distance applies to the special case in Case 1 where the data distribution is assumed to be spherical.

Generally, we can conclude that QDA provides a better classifier for the data then LDA because LDA assumes that the covariance matrix is identical for each class, but QDA does not. QDA still uses Gaussian distribution as a class conditional distribution. In our real life, this distribution can not be happened each time, so we have to use other distribution as a complement.

The Number of Parameters in LDA and QDA

Both LDA and QDA require us to estimate some parameters. Here is a comparison between the number of parameters needed to be estimated for LDA and QDA:

LDA: Since we just need to compare the differences between one given class and remaining K1 classes, totally, there are K1 differences. For each of them, aTx+b requires d+1 parameters. Therefore, there are (K1)×(d+1) parameters.

QDA: For each of the differences, xTax+bTx+c requires 12(d+1)×d+d+1=d(d+3)2+1 parameters. Therefore, there are (K1)(d(d+3)2+1) parameters.

A plot of the number of parameters that must be estimated, in terms of (K-1). The x-axis represents the number of dimensions in the data. As is easy to see, QDA is far less robust than LDA for high-dimensional data sets.

Trick: Using LDA to do QDA

There is a trick that allows us to use the linear discriminant analysis (LDA) algorithm to generate as its output a quadratic function that can be used to classify data. This trick is similar to, but more primitive than, the Kernel trick that will be discussed later in the course.

In this approach the feature vector is augmented with the quadratic terms (i.e. new dimensions are introduced) where the original data will be projected to that dimensions. We then apply LDA on the new higher-dimensional data.

The motivation behind this approach is to take advantage of the fact that fewer parameters have to be calculated in LDA , as explained in previous sections, and therefore have a more robust system in situations where we have fewer data points.

If we look back at the equations for LDA and QDA, we see that in LDA we must estimate μ1, μ2 and Σ. In QDA we must estimate all of those, plus another Σ; the extra d(d1)2 estimations make QDA less robust with fewer data points.

Theoretically

Suppose we have a quadratic function to estimate: g(x)=y=xTvx+wTx.

Using this trick, we introduce two new vectors, w^ and x^ such that:

w^=[w1,w2,...,wd,v1,v2,...,vd]T

and

x^=[x1,x2,...,xd,x12,x22,...,xd2]T

We can then apply LDA to estimate the new function: g^(x,x2)=y^=w^Tx^.

Note that we can do this for any x and in any dimension; we could extend a D×n matrix to a quadratic dimension by appending another D×n matrix with the original matrix squared, to a cubic dimension with the original matrix cubed, or even with a different function altogether, such as a sin(x) dimension. Pay attention, We don't do QDA with LDA. If we try QDA directly on this problem the resulting decision boundary will be different. Here we try to find a nonlinear boundary for a better possible boundary but it is different with general QDA method. We can call it nonlinear LDA.

Principal Component Analysis (PCA) (Lecture: Sep. 27, 2011)

Principal Component Analysis (PCA) is a method of dimensionality reduction/feature extraction that transforms the data from a D dimensional space into a new coordinate system of dimension d, where d <= D ( the worst case would be to have d=D). The goal is to preserve as much of the variance in the original data as possible when switching the coordinate systems. Give data on D variables, the hope is that the data points will lie mainly in a linear subspace of dimension lower than D. In practice, the data will usually not lie precisely in some lower dimensional subspace.


The new variables that form a new coordinate system are called principal components (PCs). PCs are denoted by  u1,u2,...,uD. The principal components form a basis for the data. Since PCs are orthogonal linear transformations of the original variables there is at most D PCs. Normally, not all of the D PCs are used but rather a subset of d PCs,  u1,u2,...,ud, to approximate the space spanned by the original data points  x=[x1,x2,...,xD]T. We can choose d based on what percentage of the original data we would like to maintain.

The first PC,  u1 is called first principal component and has the maximum variance, thus it accounts for the most significant variance in the data. The second PC,  u2 is called second principal component and has the second highest variance and so on until PC,  uD which has the minimum variance.

Let u=wTx=wTSw Where  S is the sample covariance matrix.

We would like to find the  w which gives us maximum variation:

 max(Var(wTx))=max(wTSw)


Note: we require the constraint  wTw=1 because if there is no constraint on the length of  w then there is no upper bound. With the constraint, the direction and not the length that maximizes the variance can be found.


Lagrange Multiplier

Before we proceed, we should review Lagrange multipliers.

"The red line shows the constraint g(x,y) = c. The blue lines are contours of f(x,y). The point where the red line tangentially touches a blue contour is our solution." [Lagrange Multipliers, Wikipedia]


Lagrange multipliers are used to find the maximum or minimum of a function f(x,y) subject to constraint g(x,y)=0

we define a new constant λ called a Lagrange Multiplier and we form the Lagrangian,

L(x,y,λ)=f(x,y)λg(x,y)

If f(x,y) is the max of f(x,y), there exists λ such that (x,y,λ) is a stationary point of L (partial derivatives are 0).
In addition (x,y) is a point in which functions f and g touch but do not cross. At this point, the tangents of f and g are parallel or gradients of f and g are parallel, such that:

x,yf=λx,yg

where,
x,yf=(fx,fy) the gradient of f
x,yg=(gx,gy) the gradient of g

Example :

Suppose we want to maximize the function f(x,y)=xy subject to the constraint x2+y2=1. We can apply the Lagrange multiplier method to find the maximum value for the function f; the Lagrangian is:

L(x,y,λ)=xyλ(x2+y21)

We want the partial derivatives equal to zero:


Lx=1+2λx=0

Ly=1+2λy=0

Lλ=x2+y21

Solving the system we obtain two stationary points: (2/2,2/2) and (2/2,2/2). In order to understand which one is the maximum, we just need to substitute it in f(x,y) and see which one as the biggest value. In this case the maximum is (2/2,2/2).

Determining w :

Use the Lagrange multiplier conversion to obtain: L(w,λ)=wTSwλ(wTw1) where λ is a constant

Take the derivative and set it to zero: Lw=0


To obtain: 2Sw2λw=0


Rearrange to obtain: Sw=λw


where w is eigenvector of S and  λ is the eigenvalue of S as Sw=λw , and wTw=1 , then we can write

wTSw=wTλw=λwTw=λ

Note that the PCs decompose the total variance in the data in the following way :

i=1DVar(ui)

=i=1D(λi)

 =Tr(S) ---- (S is a co-variance matrix, and therefore it's symmetric)

=i=1DVar(xi)

Principal Component Analysis (PCA) Continued (Lecture: Sep. 29, 2011)

As can be seen from the above expressions,  Var(ww)=wSw=λ where lambda is an eigenvalue of the sample covariance matrix  S and  w is its corresponding eigenvector. So  Var(ui) is maximized if  λi is the maximum eigenvalue of  S and the first principal component (PC) is the corresponding eigenvector. Each successive PC can be generated in the above manner by taking the eigenvectors of  S<ref>www.wikipedia.org/wiki/Eigenvalues_and_eigenvectors</ref> that correspond to the eigenvalues:

 λ1...λD

such that

 Var(u1)...Var(uD)

Alternative Derivation

Another way of looking at PCA is to consider PCA as a projection from a higher D-dimension space to a lower d-dimensional subspace that minimizes the squared reconstruction error. The squared reconstruction error is the difference between the original data set  X and the new data set X^ obtained by first projecting the original data set into a lower d-dimensional subspace and then projecting it back into the the original higher D-dimension space. Since information is (normally) lost by compressing the the original data into a lower d-dimensional subspace, the new data set will (normally) differ from the original data even though both are part of the higher D-dimension space. The reconstruction error is computed as shown below.

Reconstruction Error

e=i=1n||xix^i||2

Minimize Reconstruction Error

Suppose x¯=0 where x^i=xix¯

Let  f(y)=Udy where  Ud is a D by d matrix with d orthogonal unit vectors as columns.

Fit the model to the data and minimize the reconstruction error:

 minUd,yii=1n||xiUdyi||2

Differentiate with respect to  yi:

eyi=0

we can rewrite reconstruction-error as :  e=i=1n(xiUdyi)T(xiUdyi)

 eyi=2(Ud)(xiUdyi)=0

since  Ud(xiUdyi) is a linear combination of the columns of  Ud,

which are independent (orthogonal to each other) we can conclude that:

 xiUdyi=0 or equivalently,

 xi=Udyi

 yi=UdTxi

Find the orthogonal matrix  Ud:

 minUdi=1n||xiUdUdTxi||2

PCA Implementation Using Singular Value Decomposition

A unique solution can be obtained by finding the Singular Value Decomposition (SVD) of  X:

 X=USVT

For each rank d,  Ud consists of the first d columns of  U. Also, the covariance matrix can be expressed as follows  S=1n1i=1n(xiμ)(xiμ)T.

Simply put, by subtracting the mean of each of the data point features and then applying SVD, one can find the principal components:

X~=Xμ

 X~=USVT

Where  X is a d by n matrix of data points and the features of each data point form a column in  X. Also,  μ is a d by n matrix with identical columns each equal to the mean of the  xi's, ie μ:,j=1ni=1nxi. Note that the arrangement of data points is a convention and indeed in Matlab or conventional statistics, the transpose of the matrices in the above formulae is used.

As the  S matrix from the SVD has the eigenvalues arranged from largest to smallest, the corresponding eigenvectors in the  U matrix from the SVD will be such that the first column of  U is the first principal component and the second column is the second principal component and so on.

Examples

Note that in the Matlab code in the examples below, the mean was not subtracted from the datapoints before performing SVD. This is what was shown in class. However, to properly perform PCA, the mean should be subtracted from the datapoints.

Example 1

Consider a matrix of data points  X with the dimensions 560 by 1965. 560 is the number of elements in each column. Each column is a vector representation of a 20x28 grayscale pixel image of a face (see image below) and there is a total of 1965 different images of faces. Each of the images are corrupted by noise, but the noise can be removed by projecting the data back to the original space taking as many dimensions as one likes (e.g, 2, 3 4 0r 5). The corresponding Matlab commands are shown below:

</ref>
 >> % start with a 560 by 1965 matrix X that contains the data points
 >> load(noisy.mat);
 >>  
 >> % set the colors to grayscale 
 >> colormap gray
 >> 
 >> % show image in column 10 by reshaping column 10 into a 20 by 28 matrix
 >> imagesc(reshape(X(:,10),20,28)')
 >> 
 >> % perform SVD, if X matrix if full rank, will obtain 560 PCs
 >> [S U V] = svd(X);
 >> 
 >> % reconstruct X ( project X onto the original space) using only the first ten principal components
 >> Y_pca = U(:, 1:10)'*X;
 >> 
 >> % show image in column 10 of X_hat which is now a 560 by 1965 matrix
 >> imagesc(reshape(X_hat(:,10),20,28)')

The reason why the noise is removed in the reconstructed image is because the noise does not create a major variation in a single direction in the original data. Hence, the first ten PCs taken from  U matrix are not in the direction of the noise. Thus, reconstructing the image using the first ten PCs, will remove the noise.

Example 2

Consider a matrix of data points  X with the dimensions 64 by 400. 64 is the number of elements in each column. Each column is a vector representation of a 8x8 grayscale pixel image of either a handwritten number 2 or a handwritten number 3 (see image below) and there are a total of 400 different images, where the first 200 images show a handwritten number 2 and the last 200 images show a handwritten number 3.

An example of the handwritten number images used in Example 2. Source: <ref>A. Ghodsi, "PCA" class notes for STAT841, Department of Statistics and Actuarial Science, University of Waterloo, 2011. </ref>

The corresponding Matlab commands for performing PCA on the data points are shown below:

 >> % start with a 64 by 400 matrix X that contains the data points
 >> load 2_3.mat;
 >> 
 >> % set the colors to grayscale 
 >> colormap gray
 >> 
 >> % show image in column 2 by reshaping column 2 into a 8 by 8 matrix
 >> imagesc(reshape(X(:,2),8,8))
 >> 
 >> % perform SVD, if X matrix if full rank, will obtain 64 PCs
 >> [U S V] = svd(X);
 >> 
 >> % project data down onto the first two PCs
 >> Y = U(:,1:2)'*X;
 >> 
 >> % show Y as an image (can see the change in the first PC at column 200,
 >> % when the handwritten number changes from 2 to 3)
 >> imagesc(Y)
 >> 
 >> % perform PCA using Matlab build-in function (do not use for assignment)
 >> % also note that due to the Matlab convention, the transpose of X is used
 >> [COEFF, Y] = princomp(X');
 >> 
 >> % again, use the first two PCs
 >> Y = Y(:,1:2);
 >> 
 >> % use plot digits to show the distribution of images on the first two PCs
 >> images = reshape(X, 8, 8, 400);
 >> plotdigits(images, Y, .1, 1);

Using the plotdigits function in Matlab, clearly illustrates that the first PC captured the differences between the numbers 2 and 3 as they are projected onto different regions of the axis for the first PC. Also, the second PC captured the tilt of the handwritten numbers as numbers tilted to the left or right were projected onto different regions of the axis for the second PC.

Example 3

(Not discussed in class) In the news recently was a story that captures some of the ideas behind PCA. Over the past two years, Scott Golder and Michael Macy, researchers from Cornell University, collected 509 million Twitter messages from 2.4 million users in 84 different countries. The data they used were words collected at various times of day and they classified the data into two different categories: positive emotion words and negative emotion words. Then, they were able to study this new data to evaluate subjects' moods at different times of day, while the subjects were in different parts of the world. They found that the subjects generally exhibited positive emotions in the mornings and late evenings, and negative emotions mid-day. They were able to "project their data onto a smaller dimensional space" using PCS. Their paper, "Diurnal and Seasonal Mood Vary with Work, Sleep, and Daylength Across Diverse Cultures," is available in the journal Science.<ref>http://www.pcworld.com/article/240831/twitter_analysis_reveals_global_human_moodiness.html</ref>.

Assumptions Underlying Principal Component Analysis can be found here<ref>http://support.sas.com/publishing/pubcat/chaps/55129.pdf</ref>

Example 4

(Not discussed in class) A somewhat well known learning rule in the field of neural networks called Oja's rule can be used to train networks of neurons to compute the principal component directions of data sets. <ref>A Simplified Neuron Model as a Principal Component Analyzer. Erkki Oja. 1982. Journal of Mathematical Biology. 15: 267-273</ref> This rule is formulated as follows

Δw=ηyxηy2w

where Δw is the neuron weight change, η is the learning rate, y is the neuron output given the current input, x is the current input and w is the current neuron weight. This learning rule shares some similarities with another method for calculating principal components: power iteration. The basic algorithm for power iteration (taken from wikipedia: <ref>Wikipedia. http://en.wikipedia.org/wiki/Principal_component_analysis#Computing_principal_components_iteratively</ref>) is shown below


[math]\displaystyle{ \mathbf{p} = }[/math] a random vector
do c times:
      [math]\displaystyle{ \mathbf{t} = 0 }[/math] (a vector of length m)
      for each row [math]\displaystyle{ \mathbf{x} \in \mathbf{X^T} }[/math]
            [math]\displaystyle{ \mathbf{t} = \mathbf{t} + (\mathbf{x} \cdot \mathbf{p})\mathbf{x} }[/math]
      [math]\displaystyle{ \mathbf{p} = \frac{\mathbf{t}}{|\mathbf{t}|} }[/math]
return [math]\displaystyle{ \mathbf{p} }[/math]

Comparing this with the neuron learning rule we can see that the term ηyx is very similar to the t update equation in the power iteration method, and identical if the neuron model is assumed to be linear (y(x)=xp) and the learning rate is set to 1. Additionally, the ηy2w term performs the normalization, the same function as the p update equation in the power iteration method.

Observations

Some observations about the PCA were brought up in class:

  • PCA assumes that data is on a linear subspace or close to a linear subspace. For non-linear dimensionality reduction, other techniques are used. Amongst the first proposed techniques for non-linear dimensionality reduction are Locally Linear Embedding (LLE) and Isomap. More recent techniques include Maximum Variance Unfolding (MVU) and t-Distributed Stochastic Neighbor Embedding (t-SNE). Kernel PCAs may also be used, but they depend on the type of kernel used and generally do not work well in practice. (Kernels will be covered in more detail later in the course.)
  • Finding the number of PCs to use is not straightforward. It requires knowledge about the instrinsic dimentionality of data. In practice, oftentimes a heuristic approach is adopted by looking at the eigenvalues ordered from largest to smallest. If there is a "dip" in the magnitude of the eigenvalues, the "dip" is used as a cut off point and only the large eigenvalues before the "dip" are used. Otherwise, it is possible to add up the eigenvalues from largest to smallest until a certain percentage value is reached. This percentage value represents the percentage of variance that is preserved when projecting onto the PCs corresponding to the eigenvalues that have been added together to achieve the percentage.
  • It is a good idea to normalize the variance of the data before applying PCA. This will avoid PCA finding PCs in certain directions due to the scaling of the data, rather than the real variance of the data.
  • PCA can be considered as an unsupervised approach, since the main direction of variation is not known beforehand, i.e. it is not completely certain which dimension the first PC will capture. The PCs found may not correspond to the desired labels for the data set. There are, however, alternate methods for performing supervised dimensionality reduction.
  • (Not in class) Even though the traditional PCA method does not work well on data set that lies on a non-linear manifold. A revised PCA method, called c-PCA, has been introduced to improve the stability and convergence of intrinsic dimension estimation. The approach first finds a minimal cover (a cover of a set X is a collection of sets whose union contains X as a subset<ref>http://en.wikipedia.org/wiki/Cover_(topology)</ref>) of the data set. Since set covering is an NP-hard problem, the approach only finds an approximation of minimal cover to reduce the complexity of the run time. In each subset of the minimal cover, it applies PCA and filters out the noise in the data. Finally the global intrinsic dimension can be determined from the variance results from all the subsets. The algorithm produces robust results.<ref>Mingyu Fan, Nannan Gu, Hong Qiao, Bo Zhang, Intrinsic dimension estimation of data by principal component analysis, 2010. Available: http://arxiv.org/abs/1002.2050</ref>
  • (Not in class) While PCA finds the mathematically optimal method (as in minimizing the squared error), it is sensitive to outliers in the data that produce large errors PCA tries to avoid. It therefore is common practice to remove outliers before computing PCA. However, in some contexts, outliers can be difficult to identify. For example in data mining algorithms like correlation clustering, the assignment of points to clusters and outliers is not known beforehand. A recently proposed generalization of PCA based on a Weighted PCA increases robustness by assigning different weights to data objects based on their estimated relevancy.<ref>http://en.wikipedia.org/wiki/Principal_component_analysis</ref>
  • (Not in class) Comparison between PCA and LDA: Principal Component Analysis (PCA)and Linear Discriminant Analysis (LDA) are two commonly used techniques for data classification and dimensionality reduction. Linear Discriminant Analysis easily handles the case where the within-class frequencies are unequal and their performances has been examined on randomly generated test data. This method maximizes the ratio of between-class variance to the within-class variance in any particular data set thereby guaranteeing maximal separability. ... The prime difference between LDA and PCA is that PCA does more of feature classification and LDA does data classification. In PCA, the shape and location of the original data sets changes when transformed to a different space whereas LDA doesn’t change the location but only tries to provide more class separability and draw a decision region between the given classes. This method also helps to better understand the distribution of the feature data." <ref> Balakrishnama, S., Ganapathiraju, A. LINEAR DISCRIMINANT ANALYSIS - A BRIEF TUTORIAL. http://www.isip.piconepress.com/publications/reports/isip_internal/1998/linear_discrim_analysis/lda_theory.pdf </ref>

Summary

The PCA algorithm can be summarized into the following steps:

  1. Recover basis
      Calculate XXT=Σi=1txixiT and let U= eigenvectors of XXT corresponding to the largest d eigenvalues.
  2. Encode training data
     Let Y=UTX, where Y is a d×t matrix of encodings of the original data.
  3. Reconstruct training data
    X^=UY=UUTX.
  4. Encode test example
     y=UTx where y is a d-dimensional encoding of x.
  5. Reconstruct test example
    x^=Uy=UUTx.

Dual PCA

Singular value decomposition allows us to formulate the principle components algorithm entirely in terms of dot products between data points and limit the direct dependence on the original dimensionality d. Now assume that the dimensionality d of the d × n matrix of data X is large (i.e., d >> n). In this case, the algorithm described in previous sections become impractical. We would prefer a run time that depends only on the number of training examples n, or that at least has a reduced dependence on n. Note that in the SVD factorization  X=UΣVT, the eigenvectors in  U corresponding to non-zero singular values in  Σ (square roots of eigenvalues) are in a one-to-one correspondence with the eigenvectors in  V . After performing dimensionality reduction on  U and keep only the first l eigenvectors, corresponding to the top l non-zero singular values in  Σ, these eigenvectors will still be in a one-to-one correspondence with the first l eigenvectors in  V :

 XV=UΣ

 Σ is square and invertible, because its diagonal has non-zero entries. Thus, the following conversion between the top l eigenvectors can be derived:

 U=XVΣ1

Now Replacing  U with  XVΣ1 gives us the dual form of PCA.

Fisher Discriminant Analysis (FDA) (Lecture: Sep. 29, 2011 - Oct. 04, 2011)

Fisher Discriminant Analysis (FDA) is sometimes called Fisher Linear Discriminant Analysis (FLDA) or just Linear Discriminant Analysis (LDA). This causes confusion with the Linear Discriminant Analysis (LDA) technique covered earlier in the course. The LDA technique covered earlier in the course has a normality assumption and is a boundary finding technique. The FDA technique outlined here is a supervised feature extraction technique. FDA differs from PCA as well because PCA does not use the class labels,  yi, of the data  (xi,yi) while FDA organizes data into their classes by finding the direction of maximum separation between classes.


  • PCA

- Find a rank d subspace which minimize the squared reconstruction error:

Σ=|xix^|2

where x^ is projection of original data.


One main drawback of the PCA technique is that the direction of greatest variation may not produce the classification we desire. For example, imagine if the data set above had a lightening filter applied to a random subset of the images. Then the greatest variation would be the brightness and not the more important variations we wish to classify. As another example , if we imagine 2 cigar like clusters in 2 dimensions, one cigar has y=1 and the other y=1. The cigars are positioned in parallel and very closely together, such that the variance in the total data-set, ignoring the labels, is in the direction of the cigars. For classification, this would be a terrible projection, because all labels get evenly mixed and we destroy the useful information. A much more useful projection is orthogonal to the cigars, i.e. in the direction of least overall variance, which would perfectly separate the data-cases (obviously, we would still need to perform classification in this 1-D space.) See figure below <ref>www.ics.uci.edu/~welling/classnotes/papers_class/Fisher-LDA.pdf</ref>. FDA circumvents this problem by using the labels,  yi, of the data  (xi,yi) i.e. the FDA uses supervised learning. The main difference between FDA and PCA is that, in PCA we are interested in transforming the data to a new coordinate system such that the greatest variance of data lies on the first coordinate, but in FDA, we project the data of each class onto a point in such a way that the resulting points would be as far apart from each other as possible. The FDA goal is achieved by projecting data onto a suitably chosen line that minimizes the within class variance, and maximizes the distance between the two classes i.e. group similar data together and spread different data apart. This way, new data acquired can be compared, after a transformation, to where these projections, using some well-chosen metric.

We first consider the cases of two-classes. Denote the mean and covariance matrix of class i=0,1 by μi and Σi respectively. We transform the data so that it is projected into 1 dimension i.e. a scalar value. To do this, we compute the inner product of our dx1-dimensional data, x, by a to-be-determined dx1-dimensional vector w. The new means and covariances of the transformed data:

μi:→wTμi
Σi:→wTσiw

The new means and variances are actually scalar values now, but we will use vector and matrix notation and arguments throughout the following derivation as the multi-class case is then just a simpler extension.

Goals of FDA

As will be shown in the objective function, the goal of FDA is to maximize the separation of the classes (between class variance) and minimize the scatter within each class (within class variance). That is, our ideal situation is that the individual classes are as far away from each other as possible and at the same time the data within each class are as close to each other as possible (collapsed to a single point in the most extreme case). An interesting note is that R. A. Fisher who FDA is named after, used the FDA technique for purposes of taxonomy, in particular for categorizing different species of iris flowers. <ref name="RAFisher">R. A. Fisher, "The Use of Multiple measurements in Taxonomic Problems," Annals of Eugenics, 1936</ref>. It is very easy to visualize what is meant by within class variance (i.e. differences between the iris flowers of the same species) and between class variance (i.e. the differences between the iris flowers of different species) in that case.

First, we need to reduce the dimensionality of covariate to one dimension (two-class case) by projecting the data onto a line. That is take the d-dimensional input values x and project it to one dimension by using z=wTx where wT is 1 by d and x is d by 1.

Goal: choose the vector w=[w1,w2,w3,...,wd]T that best seperate the data, then we perform classification with projected data z instead of original data x .


μ0^=1n0i:yi=0xi

μ1^=1n1i:yi=1xi

xwTx.
μwTμ.
ΣwTΣw



1) Our first goal is to minimize the individual classes' covariance. This will help to collapse the data together. We have two minimization problems

minwwTΣ0w

and

minwwTΣ1w.

But these can be combined:

minwwTΣ0w+wTΣ1w
=minwwT(Σ0+Σ1)w

Define SW=Σ0+Σ1, called the within class variance matrix.

2) Our second goal is to move the minimized classes as far away from each other as possible. One way to accomplish this is to maximize the distances between the means of the transformed data i.e.

maxw|wTμ0wTμ1|2

Simplifying:

maxw(wTμ0wTμ1)T(wTμ0wTμ1)
=maxw(μ0μ1)TwwT(μ0μ1)
=maxwwT(μ0μ1)(μ0μ1)Tw

Recall that μi are known. Denote

SB=(μ0μ1)(μ0μ1)T

This matrix, called the between class variance matrix, is a rank 1 matrix, so an inverse does not exist. Altogether, we have two optimization problems we must solve simultaneously:

1) minwwTSWw
2) maxwwTSBw

There are other metrics one can use to both minimize the data's variance and maximizes the distance between classes, and other goals we can try to accomplish (see metric learning, below...one day), but Fisher used this elegant method, hence his recognition in the name, and we will follow his method.

We can combine the two optimization problems into one after noting that the negative of max is min:

maxwαwTSBwwTSWw

The α coefficient is a necessary scaling factor: if the scale of one of the terms is much larger than the other, the optimization problem will be dominated by the larger term. This means we have another unknown, α, to solve for. Instead, we can circumvent the scaling problem by looking at the ratio of the quantities, the original solution Fisher proposed:

maxwwTSBwwTSWw

This optimization problem can be shown<ref> http://www.socher.org/uploads/Main/optimizationTutorial01.pdf </ref> to be equivalent to the following optimization problem:

maxwwTSBw

(optimized function)

subject to:

wTSWw=1

(constraint)

A heuristic understanding of this equivalence is that we have two degrees of freedom: direction and scalar. The scalar value is irrelevant to our discussion. Thus, we can set one of the values to be a constant. We can use Lagrange multipliers to solve this optimization problem:

L(w,λ)=wTSBwλ(wTSWw1)
Lw=2SBw2λSWw

Setting the partial derivative to 0 gives us a generalized eigenvalue problem:

SBw=λSWw
SW1SBw=λw

This is a generalized eigenvalue problem and  w can be computed as the eigenvector corresponds to the largest eigenvalue of

SW1SB

It is very likely that SW has an inverse. If not, the pseudo-inverse<ref> http://en.wikipedia.org/wiki/Generalized_inverse </ref><ref> http://www.mathworks.com/help/techdoc/ref/pinv.html </ref> can be used. In Matlab the pseudo-inverse function is named pinv. Thus, we should choose w to equal the eigenvector of the largest eigenvalue as our projection vector.

In fact we can simplify the above expression further in the case of two classes. Recall the definition of SB=(μ0μ1)(μ0μ1)T. Substituting this into our expression:

SW1(μ0μ1)(μ0μ1)Tw=λw
(SW1(μ0μ1))((μ0μ1)Tw)=λw

This second term is a scalar value, let's denote it β. Then

SW1(μ0μ1)=λβw
SW1(μ0μ1)w


(this equation indicates the direction of the separation). All we are interested in the direction of w, so to compute this is sufficient to finding our projection vector. Though this will not work in higher dimensions, as w would be a matrix and not a vector in higher dimensions.

Extensions to Multiclass Case

If we have  k classes, we need  k1 directions i.e. we need to project  k 'points' onto a  k1 dimensional hyperplane. What does this change in our above derivation? The most significant difference is that our projection vector,w, is no longer a vector but instead is a matrix W, where W is a d*(k-1) matrix if X is in d-dim. We transform the data as:

x:→WTx

so our new mean and covariances for class k are:

μk:→WTμk
Σk:→WTΣkW

What are our new optimization sub-problems? As before, we wish to minimize the within class variance. This can be formulated as:

minWWTΣ1W++WTΣkW

Again, denoting SW=Σ1++Σk, we can simplify above expression:

minWWTSWW

Similarly, the second optimization problem is:

maxWWTSBW

What is SB in this case? It can be shown that ST=SB+SW where ST is the covariance matrix of all the data. From this we can compute SB.

Next, if we express W=(w1,w2,,wk) observe that, for A=SB,SW:

Tr(WTAW)=w1TAw1T++wkAwk

where  Tr() is the trace of a matrix. Thus, following the same steps as in the two-class case, we have the new optimization problem:

maxWTr(WTSBW)Tr(WTSWW)

The first (k-1) eigenvector of SW1SB are required (k-1) direction. That is why under multiclass case, for the k-class problem, we need to project initial points onto k-1 direction.

subject to:

Tr(WSWWT)=1

Again, in order to solve the above optimization problem, we can use the Lagrange multiplier <ref> http://en.wikipedia.org/wiki/Lagrange_multiplier </ref>:

L(W,Λ)=Tr[WTSBW]Λ{Tr[WTSWW]I}.

where  Λ is a d by d diagonal matrix.

Then, we differentiating with respect to W:

LW=(SB+SBT)WΛ(SW+SWT)W=0.

Thus:

SBW=ΛSWW
SW1SBW=ΛW

where, Λ=(λ100λd)

The above equation is of the form of an eigenvalue problem. Thus, for the solution the k-1 eigenvectors corresponding to the k-1 largest eigenvalues should be chosen as the projection matrix, W. In fact, there should only by k-1 eigenvectors corresponding to k-1 non-zero eigenvalues using the above equation.

Summary

FDA has two optimization problems:

1) minwwTSWw
2) maxwwTSBw

where SW=Σ1++Σk is called the within class variance and  SB=STSW is called the between class variance where ST is the variance of all the data together.

Every column of w paranell a single eigenvector.

The two optimization problems are combined as follows:

maxwwTSBwwTSWw

By adding a constraint as shown:

maxwwTSBw

subject to:

wTSWw=1

Lagrange multipliers can be used and essentially the problem becomes an eigenvalue problem:

SW1SBw=λw

And  w can be computed as the k-1 eigenvectors corresponding to the largest k-1 eigenvalues of SW1SB.

Variations

Some adaptations and extensions exist for the FDA technique (Source: <ref>R. Gutierrez-Osuna, "Linear Discriminant Analysis" class notes for Intro to Pattern Analysis, Texas A&M University. Available: [1]</ref>):

1) Non-Parametric LDA (NPLDA) by Fukunaga

This method does not assume that the Gaussian distribution is unimodal and it is actually possible to extract more than k-1 features (where k is the number of classes).

2) Orthonormal LDA (OLDA) by Okada and Tomita

This method finds projections that are orthonormal in addition to maximizing the FDA objective function. This method can also extract more than k-1 features (where k is the number of classes).

3) Generalized LDA (GLDA) by Lowe

This method incorporates additional cost functions into the FDA objective function. This causes classes with a higher cost to be placed further apart in the lower dimensional representation.

Optical Character Recognition (OCR) using FDA

Optical Character Recognition (OCR) is a method to translate scanned, human-readable text into machine-encoded text. In class, we have employed FDA to recognize digits. A paper <ref>Manjunath Aradhya, V.N., Kumar, G.H., Noushath, S., Shivakumara, P., "Fisher Linear Discriminant Analysis based Technique Useful for Efficient Character Recognition", Intelligent Sensing and Information Processing, 2006.</ref> describes the use of FDA to recognize printed documents written in English and Kannada, the fifth most popular language in India. The researchers conducted two types of experiments: one on printed Kannada and English documents and another on handwritten English characters. In the first type of experiments, they conducted four experiments: i) clear and degraded characters in specific fonts; ii) characters in various size; iii) characters in various fonts; iv) characters with noise. In experiment i, FDA achieved 98.2% recognition rate with 12 projection vectors in 21,560 samples. In experiment ii, it achieved 96.9% recognition rate with 10 projection vectors in 11,200 samples. In experiment iii, it achieved 93% recognition rate with 17 projection vectors in 19,850 samples. In experiment iv, it achieved 96.3% recognition rate with 14 projection vectors in 20,000 samples. Overall, the recognition by FDA was very satisfying. In the second type of experiment, a total of 12,400 handwriting samples from 200 different writers were collected. With 175 samples for training purpose, the recognition rate by FDA is 92% with 35 projection vectors.

Facial Recognition using FDA

The Fisherfaces method of facial recognition uses PCA and FDA in a similar way to using just PCA. However, it is more advantageous than using on PCA because it minimizes variation within each class and maximizes class separation. The PCA only method is, therefore, more sensitive to lighting and pose variations. In studies done by Belhumeir, Hespanda, and Kiregeman (1997) and Turk and Pentland (1991), this method had a 96% recognition rate. <ref>Bagherian, Elham. Rahmat, Rahmita. Facial Feature Extraction for Face Recognition: a Review. International Symposium on Information Technology, 2008. ITSim2 article number 4631649.</ref>

Linear and Logistic Regression (Lecture: Oct. 06, 2011)

Linear Regression

Both Regression and Classification are aimed to find a function h which maps data X to feature Y. In regression,  y is a continuous variable. In classification,  y is a discrete variable. In linear regression, data is modeled using a linear function, and unknown parameters are estimated from the data. Regression problems are easier to formulate into functions (since  y is continuous) and it is possible to solve classification problems by treating them like regression problems. In order to do so, the requirement in classification that  y is discrete must first be relaxed. Once  y has been found using regression techniques, it is possible to determine the discrete class corresponding to the  y that has been found to solve the original classification problem. The discrete class is obtained by defining a threshold where  y values below the threshold belong to one class and  y values above the threshold belong to another class.


More formally: a more direct approach to classification is to estimate the regression function  r(x)=E[Y|X] without bothering to estimate  fk(x). For the linear model, we assume that either the regression function r(x) is linear, or the linear model has a reasonable approximation.

Here is a simple example. If  Y={0,1} (a two-class problem), then h(x)={1, if r^(x)>120,otherwise

Basically, we can use a linear function  f(x,β)=yi=βTxi+β0 , xiRd and use the least squares approach to fit the function to the given data. This is done by minimizing the following expression:

minβi=1n(yiβTxiβ0)2

For convenience, β and β0 can be combined into a d+1 dimensional vector, β~. And an extra term 1 is appended to  x. Thus, the function to be minimized can now be re-expressed as:

 LS=minβ~i=1n(yiβ~Txi~)2

 LS=minβ~||yXβ~||2

where

β~=(β1βdβ0)Rd+1 and

x~=(x1xd1)Rd+1.

where β~ is a d+1 by 1 matrix(a d+1 dimensional vector)

Here  y and β~ are vectors and  X is a n by d+1 matrix with each row represents a data point with a 1 as the last entry. X also can be seen as a matrix in which each column represents a feature and the  (d+1)th column is an all-one vector corresponding to  β0 .

 β~ that minimizes the error is:

 LSβ~=2(XT)(yXβ~)=0, which gives us  β~=(XTX)1XTy. When  XTX is singular we have to use pseudo inverse for obtaining optimal  β~.

Using regression to solve classification problems is not mathematically correct, if we want to be true to classification. However, this method works well in practice, if the problem is not complicated. When we have only two classes (for which the target values are encoded as  nn1 and  nn2, where  ni is the number of data points in class i and n is the total number of points in the data set) this method is identical to LDA.

Matlab Example

The following is the code and the explanation for each step.

Again, we use the data in 2_3.m.

 >>load 2_3;
 >>[U, sample] = princomp(X');
 >>sample = sample(:,1:2);

We carry out Principal Component Analysis (PCA) to reduce the dimensionality from 64 to 2.

 >>y = zeros(400,1);
 >>y(201:400) = 1;

We let y represent the set of labels coded as 0 and 1.

 >>x=[sample;ones(1,400)];

Construct x by adding a row of vector 1 to data.

 >>b=inv(x*x')*x*y;

Calculate b, which represents β in the linear regression model.

 >>x1=x';
 >>for i=1:400
   if x1(i,:)*b>0.5
        plot(x1(i,1),x1(i,2),'.')
        hold on
   elseif x1(i,:)*b < 0.5
       plot(x1(i,1),x1(i,2),'r.')
   end 
 end

Plot the fitted y values.

File:linearregression.png
the figure shows that the classification of the data points in 2_3.m by the linear regression model

Practical Usefulness

Linear regression in general is not very useful for classification purposes. One of the main problems is that new data may not always have a positive ("more successful") impact on the linear regression learning algorithm due to the non-linear "binary" form of the classes. Consider the following simple example:

File:linreg1.jpg

The boundary decision at r(x)=0.5 was added for visualization purposes. Clearly, linear regression categorises this data properly. However, consider adding one more datum:

File:linreg2.jpg

This datum actually skews linear regression to the point that it misclassifies some of the data points that should be labelled '1'. This shows how linear regression cannot adapt well to binary classification problems.

Logistic Regression

Logistic regression is a more advanced method for classification, and is more commonly used. In statistics, logistic regression (sometimes called the logistic model or logit model) is used for prediction of the probability of occurrence of an event by fitting data to a logit function logistic curve. It is a generalized linear model used for binomial regression. Like many forms of regression analysis, it makes use of several predictor variables that may be either numerical or categorical. For example, the probability that a person has a heart attack within a specified time period might be predicted from knowledge of the person's age, sex and body mass index. Logistic regression is used extensively in the medical and social sciences fields, as well as marketing applications such as prediction of a customer's propensity to purchase a product or cease a subscription.<ref>http://en.wikipedia.org/wiki/Logistic_regression</ref>

We can define a function
f1(x)=P(Y=1|X=x)=(eβTx1+eβTx)

P(Y=1|X=x)


This is a valid conditional density function since the two components (f1 and f2, shown just below) sum to 1 and remain in [0, 1].

It looks similar to a step function, but we have relaxed it so that we have a smooth curve, and can therefore take the derivative.

The range of this function is (0,1) since

limxf1(x)=0 and limxf1(x)=1.

As shown on this graph of  P(Y=1|X=x).

Then we compute the complement of f1(x), and get

f2(x)=P(Y=0|X=x)=1f1(x)=(11+eβTx), denoted f2.

P(Y=0|X=x)


Function f2 is commonlly called Logistic function, and it behaves like
limxf2(x)=1 and
limxf2(x)=0.

As shown on this graph of  P(Y=0|X=x).

Since f1 and f2 specify the conditional distribution, the Bernoulli distribution is appropriate for specifying the likelihood of the class. Conveniently code the two classes via 0 and 1 responses, then the likelihood of yi for given input xi is given by,

f(yi|xi)=(f1(xi))y(1f1xi))1y=(eβTxi1+eβTxi)yi(11+eβTxi)1yi

Thus y takes value 1 with success probability f1 and value 0 with failure probability 1f1. We can use this to derive the likelihood for N training observations, and search for the maximizing parameter β.

In general, we can think of the problem as having a box with some knobs. Inside the box is our objective function which gives the form to classify our input (xi) to our output (yi). The knobs in the box are functioning like the parameters of the objective function. Our job is to find the proper parameters that can minimize the error between our output and the true value. So we have turned our machine learning problem into an optimization problem.

Since we need to find the parameters that maximize the chance of having our observed data coming from the distribution of f(x|θ), we need to introduce Maximum Likelihood Estimation.

Maximum Likelihood Estimation

Given iid data points (xi)i=1n (i.i.d) and density function f(x|θ), where the form of f is known but the parameters θ are our unknown. For example, we know that the data come from a Gaussian distribution but we don't know the mean and variance of the distribution. The maximum likelihood estimation of θML is a set of parameters that maximize the probability of observing (xi)i=1n given θML.

θML=argmaxθ f(x|θ).

There was some discussion in class regarding the notation. In literature, Bayesians use f(x|μ) while Frequentists use f(x;μ). In practice, these two are equivalent.

Our goal is to find theta to maximize L(θ)=f(x|θ)=i=1nf(xi|θ). where x={xi}i=1n (The second equality holds because data points are iid.)

In many cases, it’s more convenient to work with the natural logarithm of the likelihood. (Recall that the logarithm preserves minumums and maximums.) (θ)=lnL(θ)

(θ)=i=1nlnf(xi|θ)

Applying Maximum Likelihood Estimation to f(y|x)=(eβTx1+eβTx)y(11+eβTx)1y, gives

L(β)=i=1n(eβTxi1+eβTxi)yi(11+eβTxi)1yi

(β)=i=1n[yiln(P(Y=yi|X=xi))+(1yi)ln(1P(Y=yi|X=xi))]

This is the likelihood function we want to maximize. Note that (β) can be interpreted as the cost function we want to minimize. Simplifying, we get:

(β)=i=1n(yi(βTxiln(1+eβTxi))+(1yi)(ln1ln(1+eβTxi)))=i=1n(yi(βTxiln(1+eβTxi))(1yi)ln(1+eβTxi))=i=1n(yi(βTxiln(1+eβTxi))ln(1+eβTxi)+yiln(1+eβTxi))=i=1n(yiβTxiln(1+eβTxi))

β=i=1n(yixieβTxi1+eβTxixi)=i=1n(yixiP(xi|β)xi)

Now set β equal to 0, and β can be numerically solved by Newton's method.

Newton's Method

Newton's Method (or Newton-Raphson method) is a numerical method to find better approximations to the solutions of real-valued function. The function usually does not have an analytical form.

The goal is to find x such that f(x)=0, such Xs are called the roots of function f. The recursion can be implemented by x1=x0f(x0)f(x0)..

It takes an initial guess x0 and the direction  f(x0)f(x0) that moves toward a better approximation. It then finds a newer and better x1. Taking this x1 as x0 in the second run, it finds a newer and better x1 than the previous x1. Repeating the same process, the x1 will be sufficiently accurate to the actual solutions.

Matlab Example

Below is the Matlab code to find a root of the function y=x22500 from the initial guess of x=90. The roots of this equation are trivially solved analytically to be x=±50.

x=1:100;
y=x.^2 - 2500;  %function to find root of
plot(x,y);

x_opt=90;  %starting guess
x_traversed=[];
y_traversed=[];
error=[];

for i=1:6,
   y_opt=x_opt^2-2500;
   y_prime_opt=2*x_opt;
   
   %save results of each iteration
   x_traversed=[x_traversed x_opt];
   y_traversed=[y_traversed y_opt];
   error=[error abs(y_opt)];
   
   %update minimum
   x_opt=x_opt-(y_opt/y_prime_opt);
end

hold on;
plot(x_traversed,y_traversed,'r','LineWidth',2);
title('Progressions Towards Root of y=x^2 - 2500');
legend('y=x^2 - 2500','Progression');
xlabel('x');
ylabel('y');

hold off;
figure();
semilogy(1:6,error);
title('Error vs Iteration');
xlabel('Iteration');
ylabel('Absolute Y Error');

In this example the Newton method converges to an optimum to within machine precision in only 6 iterations as can be seen from the plot of the Y deviate below.

File:newton error.png File:newton progression.png

Advantages of Logistic Regression

Logistic regression has several advantages over discriminant analysis:

  • It is more robust: the independent variables don't have to be normally distributed, or have equal variance in each group.
  • It does not assume a linear relationship between the IV and DV.
  • It may handle nonlinear effects.
  • You can add explicit interaction and power terms.
  • The DV need not be normally distributed.
  • There is no homogeneity of variance assumption.
  • Normally distributed error terms are not assumed.
  • It does not require that the independent variables be interval.
  • It does not require that the independent variables be unbounded.

Comparison Between Logistic Regression And Linear Regression

Linear regression is a regression where the explanatory variable X and response variable Y are linearly related. Both X and Y can be continuous variables, and for every one unit increase in the explanatory variable, there is a set increase or decrease in the response variable Y. A closed form solution exists for the least squares estimate of β.

Logistic regression is a regression where the explanatory variable X and response variable Y are not linearly related. The response variable provides the probability of occurrence of an event. X can be continuous but Y must be a categorical variable (e.g., can only assume two values, i.e. 0 or 1). For every one unit increase in the explanatory variable, there is a set increase or decrease in the probability of occurrence of the event. No closed form solution exists for the least squares estimate of β.


In terms of making assumptions on the data set: In LDA, we assumed that the probability density function (PDF) of each class and priors were Gaussian and Bernoulli, respectively. However, in Logistic Regression, we assumed that the PDF of each class had a parametric form and we ignored the priors. Therefore, we may conclude that Logistic regression has less assumptions than LDA.

Newton-Raphson Method (Lecture: Oct 11, 2011)

Previously we had derivated the log likelihood function for the logistic function.

L(β)=i=1n((eβTxi1+eβTxi)yi(11+eβTxi)1yi)

After taking log, we can have:

(β)=i=1n(yilneβTxi1+eβTxi+(1yi)ln11+eβTxi)

This implies that:

(β)=i=1n(yi(βTxiln(1+eβTxi))(1yi)ln(1+eβTxi))

(β)=i=1n(yiβTxiln(1+eβTxi))

Our goal is to find the β that maximizes (β). We use calculus to do this ie solve β=0. To do this we use the famous numerical method of Newton-Raphson. This is an iterative method where we calculate the first and second derivative at each iteration.

Newton's Method

Here is how we usually implement Newton's Method: xn+1=xnf(xn)f(xn).. In our particular case, we look for x such that g'(x) = 0, and implement it by xn+1=xnf(xn)f(xn)..
In practice, the convergence speed depends on |F'(x*)|, where F(x) = xf(x)f(x).. The smaller the |F'(x*)| is, the faster the convergence is.


The first derivative is typically called the score vector.

S(β)=β=i=1n(yixieβTxi1+eβTxixi)

S(β)=β=i=1n(yixiP(xi|β)xi)

where  P(xi|β)=eβTxi1+eβTxi

The negative of the second derivative is typically called the information matrix.

I(β)=2ββT=i=1n(xixiT(eβTxi1+eβTxi)(1eβTxi1+eβTxi))

I(β)=2ββT=i=1n(xixiT(eβTxi1+eβTxi)(11+eβTxi))

I(β)=2ββT=i=1n(xixiT(P(xi|β))(1P(xi|β)))

again where  P(xi|β)=eβTxi1+eβTxi

βnewβoldf(βold)f(βold)

We then use the following update formula to calcalute continually better estimates of the optimal β. It is not typically important what you use as your initial estimate β(1) is. (However, some improper beta will cause I to be a singular matrix).

β(r+1)=β(r)+(I(β(r)))1S(β(r))

Matrix Notation

Let y be a (n x 1) vector of all class labels. This is called the response in other contexts.

Let X be a (n x (d+1)) matrix of all your features. Each row represents a data point. Each column represents a feature/covariate.

Let p(r) be a (n x 1) vector with values P(xi|β(r))

Let W(r) be a (n x n) diagonal matrix with Wii(r)=P(xi|β(r))(1P(xi|β(r)))

The score vector, information matrix and update equation can be rewritten in terms of this new matrix notation, so the first derivative is

S(β(r))=β=XT(yp(r))

And the second derivative is

I(β(r))=2ββT=XTW(r)X

Therfore, we can fit a regression problem as follows

β(r+1)=β(r)+(I(β(r)))1S(β(r))

β(r+1)=β(r)+(XTW(r)X)1XT(yp(r))

Iteratively Re-weighted Least Squares

If we reorganize this updating formula we can see it is really iteratively solving a least squares problem each time with a new weighting.

β(r+1)=(XTW(r)X)1(XTW(r)Xβ(r)+XT(yp(r)))

β(r+1)=(XTW(r)X)1XTW(r)(z)(r)

where z(r)=Xβ(r)+(W(r))1(yp(r))


Recall that linear regression by least squares finds the following minimum:  minβ(yXβ)T(yXβ)

Similarly, we can say that  β(r+1) is the solution of a weighted least square problem in the new space of  z: ( compare the equation of  β(r+1) with the solution of weighted least square  β~=(XTX)1XTy )

β(r+1)argminβ(zXβ)TW(zXβ)

Fisher Scoring Method

Fisher Scoring is a method very similiar to Newton-Raphson. It uses the expected Information Matrix as opposed to the observed information matrix. This distinction simplifies the problem and in perticular the computational complexity. To learn more about this method & logistic regression in general you can take Stat431/831 at the University of Waterloo.

Multi-class Logistic Regression

In a multi-class logistic regression we have K classes. For 2 classes K and l

P(Y=l|X=x)P(Y=K|X=x)=eβlTx
(this is resulting from f1(x)=(eβTx1+eβTx) and f2(x)=(11+eβTx) )

We call log(P(Y=l|X=x)P(Y=k|X=x))=(βlβk)Tx , the log ratio of the posterior probabilities as the logit transformation. The decision boundary between the 2 classes is the set of points where the logit transformation is 0.

For each class from 1 to K-1 we then have:

log(P(Y=1|X=x)P(Y=K|X=x))=β1Tx

log(P(Y=2|X=x)P(Y=K|X=x))=β2Tx

log(P(Y=K1|X=x)P(Y=K|X=x))=βK1Tx

Note that choosing Y=K is arbitrary and any other choice is equally valid.

Based on the above the posterior probabilities are given by: P(Y=k|X=x)=eβkTx1+i=1K1eβiTxfork=1,,K1

P(Y=K|X=x)=11+i=1K1eβiTx

Logistic Regression Vs. Linear Discriminant Analysis (LDA)

Logistic Regression Model and Linear Discriminant Analysis (LDA) are widely used for classification. Both models build linear boundaries to classify different groups. Also, the categorical outcome variables (i.e. the dependent variables) must be mutually exclusive.

LDA used more parameters.

However, these two models differ in their basic approach. While Logistic Regression is more relaxed and flexible in its assumptions, LDA assumes that its explanatory variables are normally distributed, linearly related and have equal covariance matrices for each class. Therefore, it can be expected that LDA is more appropriate if the normality assumptions and equal covariance assumption are fulfilled in its explanatory variables. But in all other situations Logistic Regression should be appropriate.


Also, the total number of parameters to compute is different for Logistic Regression and LDA. If the explanatory variables have d dimensions and there are two classes to categorize, we need to estimate  d+1 parameters in Logistic Regression (all elements of the d by 1  β vector plus the scalar  β0) and the number of parameters grows linearly w.r.t. dimension, while we need to estimate 2d+d(d+1)2+2 parameters in LDA (two mean values for the Gaussians, the d by d symmetric covariance matrices, and two priors for the two classes) and the number of parameters grows quadratically w.r.t. dimension.


Note that the number of parameters also corresponds to the minimum number of observations needed to compute the coefficients of each function. Techniques do exist though for handling high dimensional problems where the number of parameters exceeds the number of observations. Logistic Regression can be modified using shrinkage methods to deal with the problem of having less observations than parameters. When maximizing the log likelihood, we can add a λ2k=1Kβk22 penalization term where K is the number of classes. This resulting optimization problem is convex and can be solved using Newton-Raphson method as given in Zhu and hastie (2004). LDA involves the inversion of a d x d covariance matrix. When d is bigger than n (where n is the number of observations) this matrix has rank n < d and thus is singular. When this is the case, we can either use the pseudo inverse or perform regularized discriminant analysis which solves this problem. In RDA, we define a new covariance matrix Σ(γ)=γΣ+(1γ)diag(Σ) with γ[0,1]. Cross validation can be used to calculate the best γ. More details on RDA can be found in Guo et al. (2006).


Because the Logistic Regression model has the form logf1(x)f0(x)=βx, we can clearly see the role of each input variable in explaining the outcome. This is one advantage that Logistic Regression has over other classification methods and is why it is so popular in data analysis.


In terms of the performance speed, since LDA is non-iterative, unlike Logistic Regression which uses the iterative Newton-Raphson method, LDA can be expected to be faster than Logistic Regression.

Example

(Not discussed in class.) One application of logistic regression that has recently been used is predicting the winner of NFL games. Previous predictors, like Yards Per Carry (YPC), were used to build probability models for games. Now, the Success Rate (SR), defined as the percentage of runs in which the a team’s point expectancy has improved, is shown to be a better predictor of a team's performance. SR is based on down, distance and yard line and is less susceptible to rare breakaway plays that can be considered outliers. More information can be found at [2].

Perceptron

Simple perceptron
Simple perceptron where β0 is defined as 1

Perceptron is a simple, yet effective, linear separator classifier. The perceptron is the building block for neural networks. It was invented by Rosenblatt in 1957 at Cornell Labs, and first mentioned in the paper "The Perceptron - a perceiving and recognizing automaton". The perceptron is used on linearly separable data sets. The LS computes a linear combination of factor of input and returns the sign.

For a 2 class problem, and a set of inputs with d features, a perceptron will use a weighted sum and it will classify the information using the sign of the result (i.e it uses a step function as it's activation function ). The figures on the right give an example of a perceptron. In these examples,  xi is the i-th feature of a sample and  βi is the i-th weight. β0 is defined as the bias. The bias alters the position of the decision boundary between the 2 classes. From a geometrical point of view, Perceptron assigns label "1" to elements on one side of vector  β and label "-1" to to elements on the other of  β, where  β is a vector of  βis.

Perceptrons are generally trained using gradient descent. This type of learning can have 2 side effects:

  • If the data sets are well separated, the training of the perceptron can lead to multiple valid solutions.
  • If the data sets are not linearly separable, the learning algorithm will never finish.

Perceptrons are the simplest kind of a feedforward neural network. A perceptron is the building block for other neural networks such as Multi-Layer Perceptron (MLP) which uses multiple layers of perceptrons with nonlinear activation functions so that it can classify data that is not linearly separable.

History of Perceptrons and Other Neural Models

One of the first perceptron-like models is the "McCulloch-Pitts Neuron" model developed by McCulloch and Pitts in the 1940's <ref> W. Pitts and W. S. McCulloch, "How we know universals: the perception of auditory and visual forms," Bulletin of Mathematical Biophysics, 1947.</ref>. It uses a weighted sum of the inputs that is fed through an activation function, much like the perceptron. However, unlike the perceptron, the weights in the "McCulloch-Pitts Neuron" model are not adjustable, so the "McCulloch-Pitts Neuron" is unable to perform any learning based on the input data.

As stated in the introduction of the perceptron section, the Perceptron was developed by Rosenblatt around 1960. Around the same time as the perceptron was introduced, the Adaptive Linear Neuron (ADALINE) was developed by Widrow <ref name="Widrow"> B. Widrow, "Generalization and information storage in networks of adaline 'neurons'," Self Organizing Systems, 1959.</ref>. The ADALINE differs from the standard perceptron by using the weighted sum (the net) to adjust the weights in the learning phase. The standard perceptron uses the output to adjust its weights (i.e. the net after it passed through the activation function).

Since both the perceptron and ADALINE are only able to handle data that is linearly separable Multiple ADALINE (MADALINE) was introduced <ref name="Widrow"/>. MADALINE is a two layer network to process multiple inputs. Each layer contains a number of ADALINE units. The lack of an appropriate learning algorithm prevented more layers of units to be cascaded at the time and interest in "neural networks" receded until the 1980's when the backpropagation algorithm was applied to neural networks and it became possible to implement the Multi-Layer Perceptron (MLP).

Many importand advances have been boosted by the use of inexpensive computer emulations. Following an initial period of enthusiasm, the field survived a period of frustration and disrepute. During this period when funding and professional support was minimal, important advances were made by relatively few reserchers. These pioneers were able to develop convincing technology which surpassed the limitations identified by Minsky and Papert. Minsky and Papert, published a book (in 1969) in which they summed up a general feeling of frustration (against neural networks) among researchers, and was thus accepted by most without further analysis. Currently, the neural network field enjoys a resurgence of interest and a corresponding increase in funding.<ref> http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html#Historical background </ref>

Perceptron Learning Algorithm (Lecture: Oct. 13, 2011)

Perceptron learning is done by minimizing the cost function, ϕ(β,β0), which is same as minimizing the sum of the distances between the misclassified points and the decision boundary. To achieve this, we define a cost function, ϕ(β,β0), as a summation of the distance between all misclassified points and the hyper-plane, or the decision boundary. To minimize this cost function, we need to estimate β,β0.

minϕ(β,β0) = {distance of all misclassified points}

The logic is as follows:

Distance between the point  x and the decision boundary hyperplane  L (black line). Note that the vector  β is orthogonal to the decision boundary hyperplane and that points  x0,x1,x2 are arbitrary points on the decision boundary hyperplane.

1) Because a hyper-plane L can be defined as

L={x:f(x)=βTx+β0=0},


For any two arbitrary points x1 and x2 on L, we have

βTx1+β0=0,

βTx2+β0=0,

such that

βT(x1x2)=0.

Therefore, β is orthogonal to the hyper-plane and it is the normal vector.


2) For any point x0 in  L, βTx0+β0=0, which means βTx0=β0.


3) We set β=β||β|| as the unit normal vector of the hyper-planeL. For simplicity we call β norm vector. The distance of point x to  L is given by

βT(xx0)=βTxβTx0=βTx||β||+β0||β||=(βTx+β0)||β||

Where x0 is any point on  L. Hence, βTx+β0 is proportional to the distance of the point x to the hyper-planeL.


4) The distance from a misclassified data point xi to the hyper-plane L is

di=yi(βTxi+β0)

where yi is a target value, such that yi=1 if βTxi+β0<0, yi=1 if βTxi+β0>0

Note that the added negative sign in front of the yi in the above expression is to find the distance of the misclassified data points (i.e. when the sign of yi is different from βTxi+β0 instead of the correctly classified data points (i.e. when the sign of yi is the same as βTxi+β0.

Perceptron Learning using Gradient Descent

The gradient descent is an optimization method that finds the minimum of an objective function by incrementally updating its parameters in the negative direction of the derivative of this function. In our case, the objective function to be minimized is classification error and the parameters of this function are the weights associated with the inputs, β . The gradient descent algorithm updates the weights as follows:

βnewβoldρErrβ

ρ is called the learning rate.
The Learning Rate ρ is positively related to the step size of convergence of minϕ(β,β0). i.e. the larger ρ is, the larger the step size is.

The classification error is defined as the distance of misclassified observations to the decision boundary:


To minimize the cost function ϕ(β,β0)=iMyi(βTxi+β0) where  M={all points that are misclassified}
ϕβ=iMyixi and ϕβ0=iMyi

Therefore, the gradient is D(β,β0)=(iMyixiiMyi)


Using the gradient descent algorithm to solve these two equations, we have (βnewβ0new)=(βoldβ0old)+ρ(yixiyi)


If the data is linearly-separable, the solution is theoretically guaranteed to converge to a separating hyperplane in a finite number of iterations. In this situation the number of iterations depends on the learning rate and the margin. However, if the data is not linearly separable there is no guarantee that the algorithm converges.

(β0β00)

Note that we consider the offset term β0 separately from  β to distinguish this formulation from those in which the direction of the hyperplane ( β) has been considered.

A major concern about gradient descent is that it may get trapped in local optimal solutions. Many works such as this paper by Cetin et al. and this paper by Atakulreka et al. have been done to tackle this issue.


Features

  • A Perceptron can only discriminate between two classes at a time.
  • When data is (linearly) separable, there are many solutions depending on the starting point.
  • Even though convergence to a solution is guaranteed if the solution exists, the finite number of steps until convergence can be very large.
  • The smaller the gap between the two classes, the longer the time of convergence.
  • When the data is not separable, the algorithm will not converge.
  • A learning rate that is too high will make the perceptron periodically oscillate around the solution unless additional steps are taken.
  • The L.S compute a linear combination of feature of input and return the sign.
  • This were called Perceptron in the engineering literate in late 1950.
  • Learning rate affects the accuracy of the solution and the number of iterations directly.


Separability and convergence

The training set D is said to be linearly separable if there exists a positive constant γ and a weight vector β such that (βTxi+β0)yi>γ for all 1<i<n. That is, if we say that β is the weight vector of Perceptron and yi is the true label of xi, then the signed distance of the xi from β is greater than a positive constant γ for any (xi,yi)D.


Novikoff (1962) proved that the perceptron algorithm converges after a finite number of iterations if the data set is linearly separable. The idea of the proof is that the weight vector is always adjusted by a bounded amount in a direction that it has a negative dot product with, and thus can be bounded above by O(t)where t is the number of changes to the weight vector. But it can also be bounded below byO(t)because if there exists an (unknown) satisfactory weight vector, then every change makes progress in this (unknown) direction by a positive amount that depends only on the input vector. This can be used to show that the number t of updates to the weight vector is bounded by (2Rγ)2 , where R is the maximum norm of an input vector.<ref>http://en.wikipedia.org/wiki/Perceptron</ref>

Choosing a Proper Learning Rate

choosing different learning rates affect the performance of gradient descent optimization algorithm.

Choice of a learning rate value will affect the final result of gradient descent algorithm. If the learning rate is too small then the algorithm would take too long to converge which could cause problems for the situations where time is an important factor. If the learning rate is chosen too be too large, then the optimal point can be skipped and never converge. In fact, if the step size is too large, larger than twice the largest eigenvalue of the second derivative matrix (Hessian) of cost function, then gradient steps will go upward instead of downward. However, the step size is not the only factor than can cause these kind of situations: even with the same learning rate and different initial values algorithm might end up in different situations. In general it can be said that having some prior knowledge could help in choice of initial values and learning rate.

There are different methods of choosing the step size in an gradient descent optimization problem. The most common method is choosing a fixed learning rate and finding a proper value for it by trial and error. This for sure is not the most sophisticated method, but the easiest one. Learning rate can also be adaptive; that means the value of learning rate can be different at each step of the algorithm. This can be specially a helpful approach when one is dealing with on-line training and non-stationary environments (i.e. when data characteristics vary over time). In such a case learning rate has to be adapted at each step of the learning algorithm. Different approaches and algorithms for learning rate adaptation can be found in <ref> V P Plagianakos, G D Magoulas, and M N Vrahatis, Advances in convex analysis and global optimization Pythagorion 2000 (2001), Volume: 54, Publisher: Kluwer Acad. Publ., Pages: 433-444. </ref>.

The learning rate leading to a local error minimum in the error function in one learning step is optimal. <ref>[Duda, Richard O., Hart, Peter E., Stork, David G. "Pattern Classification". Second Edition. John Wiley & Sons, 2001.]</ref>

Application of Perceptron: Branch Predictor

Perceptron could be used for both online and batch learning. Online learning tasks take place in a sequence of trials. In each round of trial, the learner is given an instance and is asked to use his current knowledge to predict a label for the point. In online learning, the true label of the point is revealed to learner at each round after he makes a prediction. At the last stage of each round the learner has a chance to use the feedback he received on the true label of the instance to help improve his belief about the data for future trials.

Instruction pipelining is a technique to increase the throughput in modern microprocessor architecture. A microprocessor instruction can be broken into several independent steps. In a single CPU clock cycle, several instructions at different stage can be executed at the same time. However, a problem arises with a branch, e.g. if-and-else- statement. It is not known whether the instructions inside the if- or else- statements will be executed until the condition is executed. This stalls the pipeline.

A branch predictor is used to address this problem. Using a predictor the pipelined processor predicts the execution path and speculatively executes instructions in the branch. Neural networks are good technique for prediction; however, they are expensive for microprocessor architecture. A research studied the use of perceptron, which is less expensive and simpler to implement, as the branch predictor. The inputs are the history of binary outcomes of the executed branches. The output of the predictor is whether a particular branch will be taken. Every time a branch is executed and its true outcome is known, it can be used to train the predictor. The experiments showed that with a 4 Kb hardware, a global perceptron predictor has a misprediction rate of 1.94%, a superior accuracy. <ref>Daniel A. Jimenez , Calvin Lin, "Neural Methods for Dynamic Branch Prediction", ACM Transactions on Computer Systems, 2002</ref>

Feed-Forward Neural Networks

  • The term 'neural networks' is used because historically, it was used to describe the processes of the brain (e.g. synapses).
  • A neural network is a multistate regression model which is typically represented by a network diagram (see right).
Feed Forward Neural Network
  • The feedforward neural network was the first and arguably simplest type of artificial neural network devised. In this network, the information moves in only one direction, forward, from the input nodes, through the hidden nodes (if any) and to the output nodes. There are no cycles or loops in the network.<ref>http://en.wikipedia.org/wiki/Feedforward_neural_network</ref>
  • For regression, typically k = 1 (the number of nodes in the last layer), there is only one output unit y1 at the end.
  • For c-class classification, there are typically c units at the end with the cth unit modelling the probability of class c, each yc is coded as 0-1 variable for the cth class.
  • Neural networks are known as universal approximators, where a two-layer feed-forward neural network can approximate any continuous function to an arbitrary accuracy (assuming sufficient hidden nodes exist and that the necessary parameters for the neural network can be found) <ref name="CMBishop">C. M. Bishop, Pattern Recognition and Machine Learning. Springer, 2006</ref>. It should be noted that fitting training data to a very high accuracy may lead to overfitting, which is discussed later in this course.
  • We often use Perceptron to blocks in Feed-Forward neural networks. We can easily to solve the problem by using Perceptron in many different classes. Feed-Forward neural networks looks like a complicated system of Perceptrons. We can regard the neural networks as an unit or a subset of Neural Network. Feed-Forward neural networks include many hidden layers of perceptron.

Backpropagation (Finding Optimal Weights)

There are many algorithms for calculating the weights in a feed-forward neural network. One of the most used approaches is the backpropagation algorithm. The application of the backpropagation algorithm for neural networks was popularized in the 1980's by researchers like Rumelhart, Hinton and McClelland (even though the backpropagation algorithm had existed before then). <ref>S. Seung, "Multilayer perceptrons and backpropagation learning" class notes for 9.641J, Department of Brain & Cognitive Sciences, MIT, 2002. Available: [3] </ref>

As the learning part of the network (the first part being feed-forward), backpropagation consists of "presenting an input pattern and changing the network parameters to bring the actual outputs closer to the desired teaching or target values." It is one of the "simplest, most general methods for the supervised training of multilayer neural networks." (pp. 288-289) <ref>[Duda, Richard O., Hart, Peter E., Stork, David G. "Pattern Classification". Second Edition. John Wiley & Sons, 2001.]</ref>

For the backpropagation algorithm, we consider three hidden layers of nodes

Refer to figure from October 18th lecture where  l represents the column of nodes in the first column,
 i represents the column of nodes in the second column, and
 k represents the column of nodes in the third column.

We want the output of the feed forward neural network y^ to be as close to the known target value  y as possible (i.e. we want to minimize the distance between  y and y^). Mathematically, we would write it as: Minimize (|yy^|)2

Instead of the sign function that has no derivative we use the so called logistic function (a smoothed form of the sign function):

σ(a)=11+ea


"Notice that if σ is the identity function, then the entire model collapses to a linear model in the inputs. Hence a neural network can be thought of as a nonlinear generalization of the linear model, both for regression and classification." <ref>Friedman, J., Hastie, T. and Tibshirani, R. (2008) “The Elements of Statistical Learning”, 2nd ed, Springer.</ref>


Logistic function is a common sigmoid curve .It can model the S-curve of growth of some population σ. The initial stage of growth is approximately exponential; then, as saturation begins, the growth slows, and at maturity, growth stops.


To solve the optimization problem, we take the derivative with respect to weight uil:
|yy^|2uil=|yy^|2ajajuil by Chain rule
|yy^|2uil=δjzl

where δj=|yy^|2aj which will be computed recursively.

 aj=ziuji

 zi=δ(ai)

 aj=δ(ai)uji

Backpropagation Continued (Lecture: Oct. 18, 2011)

Nodes from three hidden layers within the neural network are considered for the backpropagation algorithm. Each node has been divided into the weighted sum of the inputs  a and the output of the activation function  z. The weights between the nodes are denoted by  u.

From the figure to the right it can be seen that the input ( a's) can be expressed in terms of the weighted sum of the outputs of the previous nodes and output ( z's) can be expressed as the input as follows:

 ai=lzluil

 zi=σ(ai)


The goal is to optimize the weights to reduce the L2-norm between the target output values  y (i.e. the correct labels) and the actual output of the neural network  y^:

|yy^|2

Since the L2-norm is differentiable, the optimization problem can be tackled by differentiating |yy^|2 with respect to each weight in the hidden layers. By using the chain rule we get:

|yy^|2uil=|yy^|2aiaiuil=δizl

where  δi=|yy^|2ai

The above equation essentially shows the effect of changes in the input  ai on the overall output  y^ as well as the effect of changes in the weights  uil on the input  ai. In the above equation,  zl is a known value (i.e. it can be calculated directly), whereas  δi is unknown but can be expressed as a recursive definition in terms of  δj:

δi=|yy^|2ai=j|yy^|2ajajai

δi=jδjajziziai

δi=jδjujiσ(ai)

where δj=|yy^|2aj

The above equation essentially shows the effect of changes in the input  aj on the overall output  y^ as well as the effect of changes in input  ai on the input  aj.

The recursive definition of  δi can be considered as a cost function for achieving the original goal of optimizing the weights to minimize |yy^|2:

δi=σ(ai)jδjuji.

Now considering  δk for the output layer:

δk=|yy^|2ak.

where ak=y^ because an activation function is not applied in the output layer. So, our calculation becomes:

δk=|yy^|2y^

δk=2|yy^|
uiluilρ|yy^|2uil

Since  y is known and  y^ can be computed for each data point (assuming small, random, initial values for the weights of the neural network),  δk can be calculated and "backpropagated" (i.e. the  δ values for the layer before the output layer can be computed using  δk and then the  δ values for the layer before the layer before the output layer can be computed etc.). Once all  δ values are known, the errors due to each of the weights  u will be known and techniques like gradient descent can be used to optimize the weights. However, as the cost function for  δi shown above is not guaranteed to be convex, convergence to a global minimum is no guaranteed. This also means that changing the order in which the training points are fed into the network or changing the initial random values for the weights may lead to finding different results for the optimized weights (i.e. different local minima may be reached).

Overview of Full Backpropagation Algorithm

The network weights are updated using the backpropagation algorithm when each training data point  xis fed into the feed forward neural network (FFNN). This update procedure is done using the following steps:

  • First arbitrarily choose some random weights (preferably close to zero) for your network.
  • Apply  x to the FFNN's input layer, and calculate the outputs of all input neurons.
  • Propagate the outputs of each hidden layer forward, one hidden layer at a time, and calculate the outputs of all hidden neurons.
  • Once  x reaches the output layer, calculate the output(s) of all output neuron(s) given the outputs of the previous hidden layer.
  • At the output layer, compute δk=2(yky^k) for each output neuron(s).
  • Then compute |yy^|2uil=δizl for all weights uil, where δi=σ(ai)jδjuji.
  • Then update uilnewuiloldρ|yy^|2uil for all weights uil.
  • Continue for next data points until weights converge.

Limitations

  • The convergence obtained from backpropagation learning is very slow.
  • The convergence in backpropagation learning is not guaranteed.
  • The result may generally converge to any local minimum on the error surface, since stochastic gradient descent exists on a surface which is not flat.
  • Numerical problems may be encountered when there are a large number of hidden layers, as the errors at each layer may become very small and vanish.

Deep Neural Network

Increasing the number of units within a hidden layer can increase the "flexibility" of the neural network, i.e. the network is able to fit to more complex functions. Increasing the number of hidden layers on the other hand can increase the "generalizability" of the neural network, i.e. the network is able to generalize well to new data points that it was not trained on. A deep neural network is a neural network with many hidden layers. Deep neural networks were introduced in recent years by the same researchers (Hinton et al. <ref name="HintonDeepNN"> G. E. Hinton, S. Osindero and Y. W. Teh, "A Fast Learning Algorithm for Deep Belief Nets", Neural Computation, 2006. </ref>) that introduced the backpropagation algorithm to neural networks. The increased number of hidden layers in deep neural networks cannot be directly trained using backpropagation, because the errors at each layer will become very small and vanish as stated in the limitations section. To get around this problem, deep neural networks are trained a few layers at a time (i.e. two layers at a time). This process is still not straightforward as the target values for the hidden layers are not well defined (i.e. it is unknown what the correct target values are for the hidden layers given a data point and a label). Restricted Boltzmann Machines (RBM) and Greedy Learning Algorithms have been used to address this issue. For more information about how deep neural networks are trained, please refer to <ref name="HintonDeepNN"/>. A comparison of various neural network layouts including deep neural networks on a database of handwritten digits can be found at THE MNIST DATABASE.

An interesting structure of the deep neural network is where the number of nodes in each hidden layer decreases towards the "center" of the network and then increases again. See figure below for an illustration.

A specific architecture for deep neural networks with a "bottleneck".

The central part with the least number of nodes in the hidden layer can be seen a reduced dimensional representation of the input data features. It would be interesting to compare the dimensionality reduction effect of this kind of deep neural network to a cascade of PCA.

It is known that training DNNs is hard <ref>http://ecs.victoria.ac.nz/twiki/pub/Courses/COMP421_2010T1/Readings/TrainingDeepNNs.pdf</ref> since randomly initializing weights for the network and applying gradient descent can find poor local minimums. In order to better train DNNs, Exploring Strategies for Training Deep Neural Networks looks at 3 principles to better train DNNs:

  1. Pre-training one layer at a time in a greedy way,
  2. Using unsupervised learning at each layer,
  3. Fine-tuning the whole network with respect to the ultimate criterion.

Their experiments show that by providing hints at each layer for the representation, the weights can be initialized such that a more optimal minimum can be reached.


Applications of Neural Networks

  • Sales forecasting
  • Industrial process control
  • Customer research
  • Data validation
  • Risk management
  • Target marketing

<ref> Reference:http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html#Applications of neural networks </ref>

Model Selection (Complexity Control)

Selecting a proper model complexity is a well-known problem in pattern recognition and machine learning. Systems with the optimal complexity have a good generalization to yet unobserved data. In the complexity control problem, we are looking for an appropriate model order which gives us the best generalization capability for the unseen data points. Model complexity here can be defined in terms of over-fitting and under-fitting situations defined in the following section.

Over-fitting and Under-fitting

File:overfitting-model.png
Example of overfitting and underfitting situations. The blue line is a high-degree polynomial which goes through most of the training data points and gives a very low training error, however has a very poor generalization for the unseen data points. The red line, on the other hand, is underfitted to the training data samples.

There are two situations which should be avoided in classification and pattern recognition systems:

  1. Overfitting
  2. Underfitting

Suppose there is no noise in the training data, then we would face no problem with over-fitting, because in this case every training data point lies on the underlying function, and the only goal is to build a model that is as complex as needed to pass through every training data point.

However, in the real-world, the training data are noisy, i.e. they tend to not lie exactly on the underlying function, instead they may be shifted to unpredictable locations by random noise. If the model is more complex than what it needs to be in order to accurately fit the underlying function, then it would end up fitting most or all of the training data. Consequently, it would be a poor approximation of the underlying function and have poor prediction ability on new, unseen data.

The danger of overfitting is that the model becomes susceptible to predicting values outside of the range of training data. It can cause wild predictions in multilayer perceptrons, even with noise-free data. The best way to avoid overfitting is to use lots of training data. Unfortunately, that is not always useful. Increasing the training data alone does not guarantee that over-fitting will be avoided. The best strategy is to use a large-enough size training set, and control the complexity of the model. The training set should have a sufficient number of data points which are sampled appropriately, so that it is representative of the whole data space.

In a Neural Network, if the number of hidden layers or nodes is too high, the network will have many degrees of freedom and will learn every characteristic of the training data set. That means it will fit the training set very precisely, but will not be able to generalize the commonality of the training set to predict the outcome of new cases.

Underfitting occurs when the model we picked to describe the data is not complex enough, and has a high error rate on the training set. There is always a trade-off. If our model is too simple, underfitting could occur and if it is too complex, overfitting can occur.

Different Approaches for Complexity Control

We would like to have a classifier that minimizes the true error rate  L(h):

 L(h)=Pr{h(x)y}

Model complexity

Because the true error rate cannot be determined directly in practice, we can try using the empirical true error rate (i.e. training error rate):

 L^(h)=1ni=1nI(h(xi)yi)

However, the empirical true error rate (i.e. training error rate) is biased downward. Minimizing this error rate does not find the best classifier model, but rather ends up overfitting to the training data. Thus, this error rate cannot be used.

The complexity of a fitting model depends on the degree of the fitting function. According to the graph, the area on the LHS of the critical point is considered as under-fitting. This inaccuracy is resulted by the low complexity of fitting. The area on the RHS of the critical point is over-fitting, because it's not generalized.

As illustrated in the figure to the right, the training error rate is always less than the true error rate, i.e. "biased downward". Also, the training error will always decrease with an increase in the complexity of the model used to fit the data. This does not reflect the behavior of the true error rate. The true error rate will have a unique minimum as the model complexity changes.

So, if the training error rate is the only criteria used for picking a model, overfitting will occur. Overfitting is when a model that is too complex for the data is picked. The training data error rate may become very low or even zero, but the model will not be able to generalize well to new test data points. On the other hand, underfitting can occur when a model that is not complex enough is picked (e.g. using a first order model for data that follows a second order trend). Both training and test error rates will be high in that case. The best choice for the model complexity is where the true error rate reaches its minimum point. Thus, model selection involves controlling the complexity of the model. The true error rate can be approximated using the test error rate, i.e. the test error follows the same trend that the true error rate does when the model complexity is changed. In this case, we assume there is a test data set x1,...,xn and these points follow some unknown distribution. In order to find out this distribution, we can make some estimationg of some unknown parameters, such as f, the mean E(xi), the variance var(xi) and more.

To estimate f, we use an observation function as our estimator.

f^(x1,...,xn).

Bias(f^)=E(f^)f

MSE(f^)=E[(f^f)2]=Varince(f^)+Bias2(f^)

Variance(f^)=E[(f^E(f^))2]

This estimaor is unbiased.

Bias(f^)=E(f^)f=0

which means that we just need to minimize MSE(f^).

MSE(f^)=Variance(f^)+Bias2(f^).

Thus given the Mean Squared Error (MSE), if we have a low bias, then we will have a high variance and vice versa.



In order to avoid overfitting, there are two main strategies:

  1. Estimate the error rate
    1. Cross-validation
    2. Computing error bound ( probability in-equality )
  2. Regulazition
    1. We basically make the function (model) smooth by limiting the complexity or by limiting the size of weights.

Cross Validation

File:k-fold.png
Graphical illustration of 4-fold cross-validation. V is the part used for validation and T is used for training.

Cross-validation is an approach for avoiding overfitting while modelling data that bases the choice of model parameters on a portion of the training set, while using the rest of the set for validation, i.e., some of the data is left out when fitting the model. One round of the process involves partitioning the data set into two complementary subsets, fitting the model to one subset (called the training set), and testing the model against the other subset (called the validation or testing subset). This is usually repeated several times using different partitions in order to reduce variability, and the validation results are then averaged over the rounds.

K-Fold Cross Validation

Instead of minimizing the training error, here we minimize the validation error.

A common type of cross-validation that is used for relatively small data sets is K-fold cross-validation, the algorithm for which can be stated as follows:

Let h denote a classification model to be fitted to a given data set.

  1. Randomly partition the original data set into K subsets of approximately the same size. A common choice for K is K = 10.
  2. For k = 1 to K do the following
    1. Remove subset k from the data set
    2. Estimate the parameters of each different classification model based only on the remaining data points. Denote the resulting function by h(k)
    3. Use h(k) to predict the data points in subset k. Denote by L^k(h) the observed error rate.
  3. Compute the average error L^(h)=1Kk=1KL^k(h)

The best classifier is the model that results in the lowest average error rate.

A common variation of k-fold cross-validation uses a single observation from the original sample as the validation data, and the remaining observations as the training data. This is then repeated such that each sample is used once for validation. It is the same as a K-fold cross-validation with K being equal to the number of points in the data set, and is referred to as leave-one-out cross-validation. <ref> stat.psu.edu/~jiali/course/stat597e/notes2/percept.pdf</ref>

Alternatives to Cross Validation for model selection:

  1. Akaike Information Criterion (AIC): This approach ranks models by their AIC values. The model with the minimum AIC is chosen. The formula of AIC value is: AIC=2k+2log(Lmax), where k is the number of parameters and Lmax is the maximum value of the likelihood function of the model. This selection method penalizes the number of parameters.<ref>http://en.wikipedia.org/wiki/Akaike_information_criterion</ref>
  2. Bayesian Information Criterion (BIC): It is similar to AIC but penalizes the number of parameters even more. The formula of BIC value is: BIC=klog(n)2log(L), where n is the sample size.<ref>http://en.wikipedia.org/wiki/Bayesian_information_criterion</ref>

Model Selection Continued (Lecture: Oct. 20, 2011)

Error Bound Computation

Apart from cross validation, another approach for estimating the error rates of different models is to find a bound to the error. This works well theoretically to compare different models, however, in practice the error bounds are not a good indication of which model to pick because the error bounds are not tight. This means that the actual error observed in practice may be a lot better than what was indicated by the error bounds. This is because the error bounds indicate the worst case errors and by only comparing the error bounds of different models, the worst case performance of each model is compared, but not the overall performance under normal conditions.

Penalty Function

Another approach for model selection to avoid overfitting is to use regularization which minimizes the squared error plus a penalty function.
This means minimizing the following new objective function:
|yy^|2+f(θ)
where  θ is model complexity and  f(θ) is the penalty function. The penalty function must be increasing in model complexity in order for it to counteract the downward bias of the training error rate.
Thus, we want  f(θ) to have behaviour opposite to the objective function and be a good estimate of the true error.

Some Matrix Differentiation Properties

Tr(AX)X=AT

Tr(XTA)X=A

Tr(XTAX)X=(AT+A)X


Example: Penalty Function in Neural Network Model Selection

In MLP neural networks, the activation function is of the form of a logistic function, where the function behaves almost linearly when the input is close to zero (i.e., the weights of the neural network are close to zero), while the function behaves non-linearly as the magnitude of the input increases (i.e., the weights of the neural network become larger). In order to penalize additional model complexity (i.e., unnecessary non-linearities in the model), large weights will be penalized by the penalty function.

The objective function to minimize with respect to the weights  uji is:

 Reg=|yy^|2+λi=1n(uji)2

The derivative of the objective function with respect to the weights  uji is:
Reguji=|yy^|2uji+2λuji

This objective function is used during gradient descent. In practice, cross validation is used to determine the value of  λ in the objective function.

Radial Basis Function Neural Network (RBF NN)

Radial Basis Function Network(RBF) NN is a type of neural network with only one hidden layer in addition to an input and output layer. Each node within the hidden layer uses a radial basis activation function, hence the name of the RBF NN. The weights from the input layer to the hidden layer are always "1" in a RBF NN, while the weights from the hidden layer to the output layer are adjusted during training. The output unit implements a weighted sum of hidden unit outputs. The input into an RBF NN is nonlinear while the output is linear. Due to their nonlinear approximation properties, RBF NNs are able to model complex mappings, which perceptron based neural networks can only model by means of multiple hidden layers. It can be trained without back propagation since it has a closed-form solution. RBF NNs have been successfully applied to a large diversity of applications including interpolation, chaotic time series modeling, system identification, control engineering, electronic device parameter modeling, channel equalization, speech recognition, image restoration, shape-form-shading, 3-D object modeling, motion estimation and moving object segmentation, data fusion, etc. <ref>www-users.cs.york.ac.uk/adrian/Papers/Others/OSEE01.pdf</ref>

The Network System

1. Input:
n data points xiRd,i=1,...,n
2. Basis function (the single hidden layer):
ϕnm, where m is the number of the neurons/basis functions that project original data points into a new space.
There are many choices for the basis function. The commonly used is radial basis:
ϕj(xi)=e|xiμj|2
3. Weights associated with the last layer: Wmk, where k is the number of classes in the output Y.
4. Output: Y, where
yk(x)=j=1m(Wjkϕj(x))
Alternatively, the output Y can be written as Y=ϕW

where

Y^n,k=[y^1,1y^1,2y^1,ky^2,1y^2,2y^2,ky^n,1y^n,2y^n,k] is the matrix of output variables.
Φn,m=[ϕ1(x1)ϕ2(x1)ϕm(x1)ϕ1(x2)ϕ2(x2)ϕm(x2)ϕ1(xn)ϕ2(xn)ϕm(xn)] is the matrix of Radial Basis Functions.
Wm,k=[w1,1w1,2w1,kw2,1w2,2w2,kwm,1wm,2wm,k] is the matrix of weights.

Here, k is the number of outputs, n is the number of data points, and m is the number of hidden units. If k=1, Y^ and W are column vectors. If m = n, then μi=xi, so ϕi checks to see how similar the two data points are.

Network Training

To construct m basis functions, first cluster data points into m groups. Then find the centre of each cluster μ1 to μm.

Clustering: the K-means algorithm <ref>This section is taken from Wikicourse notes stat441/841 fall 2010.</ref>
K-means is a commonly applied technique in clustering observations into groups by computing the distance from each of individual observations to the cluster centers. A typical K-means algorithm can be described as follows:

Step1: Select the number of clusters m

Step2: Randomly select m observations from the n observations, to be used as m initial centers.

Step3: For each data point from the rest of observations, compute the distance to each of the initial centers and classify it into the cluster with the minimum distance.

Step4: Obtain updated cluster centers by computing the mean of all the observations in the corresponding clusters.

Step5: Repeat Step 3 and Step 4 until all of the differences between the old cluster centers and new cluster centers are acceptable.


Having constructed the basis functions, next minimize the objective function with respect to W:
min||YϕW||22

The solution to the problem is  W=(ϕTϕ)1ϕTY

Single Basis Function vs. Multiple Basis Functions

Suppose the data points belong to a mixture of Gaussian distributions.

Under single basis function approach, every class in Y is represented by a single basis function. This approach is similar to the approach of linear discriminant analysis.

Compare yk(x)=j=1m(Wjkϕj(x))
with P(Y|X)=P(X|Y)P(Y)P(X).
Here, the basis function ϕj can be thought of as equivalent to P(X|Y)P(X).

Under multiple basis function approach, a layer of j basis functions are placed between Y and X. The probability function of the joint distribution of X, J and Y is

P(X,J,Y)=P(Y)P(J|Y)P(X|J)

Here, instead of using single Gaussian to represent each class, we use a "mixture of Gaussian" to represent.
The probability funcion of Y conditional on X is

P(Y|X)=P(X,Y)P(X)=jP(X,J,Y)P(X)

Multiplying both the nominator and the denominator by  P(J) yields

 P(Y|X)=jP(J|X)P(Y|J)
where  P(J|X) tells that, with given X (data), how likely the data is in the Gaussian J, and  P(Y|J) tells that, with given Gaussian J, how likely this Gaussian belongs to class K.


since
 P(J|X)=P(X|J)P(J)P(X) and  P(Y|J)=P(Y|J)P(Y)P(J)

If the weights in the radial basis neural network have proper properties of probability function, then the basis function ϕj can be thought of as  P(J|X), representing the probability that x is in Gaussian class j; and the weight function W can be thought of as  P(Y|J), representing the probability that a data point belongs to class k given that the point is from Gaussian class j.

In conclusion, given a mixture of Gaussian distributions, multiple basis function approach is better than single basis function, since the former produces a non-linear boundary.

RBF Network Complexity Control (Lecture: Oct. 25, 2011)

When performing model selection, overfitting is a common issue. As model complexity increases, there comes a point where the model becomes worse and worse at fitting real data even though it fits the training data better. It becomes too sensitive to small perturbations in the training data that should be treated as noise to allow flexibility in the general case. In this section we will show that training error (empiricial error from the training data) is a poor estimator for true error and that minimizing training error will increase complexity and result in overfitting. We will show that test error (empirical error from the test data) is a better estimator of true error.


First, some notation is defined.

The assumption for the training data set is that it consists of the true model values  f(xi) plus some additive Gaussian noise  ϵi:

 yi=f(xi)+ϵi where  ϵN(0,σ2)

 yi=truemodel+noise

Important Notation

Let:

  • f(x) denote the true model.
  • f^(x) denote the prediction/estimated model, which is generated from a training data set T={(xi,yi)}i=1n. The observation is not accurate.

Remark: f^(xi)=y^i.

  • err denote the empirical error based on actual data points. This can be either test error or training error depending on the data points used.It's the difference between (yy^)2
  • Err denote the true error or generalization error, and is what we are trying to minimize.It is the difference between (ff^)2
  • MSE=E[(f^(x)f(x))2] denote the mean squared error.

We use the training data to estimate our model parameters.

D={(xi,yi)}i=1n


For a given point y0, the expectation of the empirical error is:

E[(y0^y0)2]=E[(f0^f0ϵ0)2]=E[(f0^f0)2+ϵ022ϵ0(f0^f0)]=E[(f0^f0)2]+E[ϵ02]2E[ϵ0(f0^f0)]=E[(f0^f0)2]+σ22E[ϵ0(f0^f0)]

This is the formula partitions the training error into the true error and others errors. Our goal is to select the model that minimizes the true error so we must try to understand the effects of these other error terms if we are to use training error as a estimate for the true error.

Moreover,(f0^f0)2 is true error.

The first term is essentially true error. The second term is a constant. The third term is problematic, since in general this expectation is not 0. We will break this into 2 cases to simplify the third term.

Case 1: Estimating Error using Data Points from Test Set

In Case 1, the empirical error is test error and the data points used to calculate test error are from the test set, not the training set. That is, y0T.

We can rewrite the third term in the following way, since both y0 and f0^ have expectation f0, the true value, which is a constant and not random.

E[ϵ0(f0^f0)]=E[(y0f0)(f0^f0)]=cov(y0,f0^)

(The reason why covariance is here since yi is a new point, f^ and yi are independent.)

Consider  f0 is a mean.

Since y0 is not part of the training set, it is independent of the model f0^ generated by the training set. Therefore,

y0Ty0f^

 cov(y0,f^0)=0


The equation for the expectation of empirical error simplifies to the following:

E[(y0y0^)2]=E[(f0f0^)2]+σ2


This result applies to every output value in the test data set, so we can generalize this equation by summing over all m data points that have NOT been seen by the model:

i=1m(yiyi^)2=i=1m(fifi^)2)+mσ2err=Err+mσ2=Err+constant

Rearranging to solve for true error, we get

 Err=errmσ2

We see that test error is a good estimator for true error, since they only differ by a constant. Minimizing test error will minimize true error. There is no term adding unnecessary complexity. This is the justification for Cross Validation.

Case 2: Estimating Error using Data Points from Training Set

In Case 2, the data points used to calculate error are from the training set, so  y0T, i.e.  (xi,yi) is in the training set. We will show that this results in a worse estimator for true error.

Now  y0 has been used to estimate  f^ so they are not independent. We use Stein's lemma to simplify the term  E[ϵ0(f0^f0)].

Stein's Lemma states that if  xN(θ,σ2) and  g(x) is differentiable, then

E[g(x)(xθ)]=σ2E[g(x)x]

Substitute  ϵ0 for  x and  (f0^f0) for  g(x). Note that  f0^ is a function of the noise, since as noise changes, f0^ will change. Using Stein's Lemma, we get:

E[ϵ0(f0^f0)]=σ2E[(f0^f0)ϵ0]=σ2E[f0^ϵ0]=σ2E[f0^y0]=σ2E[D0]


Remark: (f0^f0)y0=(f0^f0)ϵ0ϵ0y=(f0^f0)ϵ0(y0y0^)y

The reason why (f0^)ϵ0=0 is that f0 is a constant instead of a function.

where (y0y0^)y=1


We take  D0=f0^y0, where  D0 represents the derivative of the fitted model with respect to the observations. The equation for the expectation of empirical error becomes:

E[(y0y0^)2]=E[(f0f0^)2]+σ22σ2E[D0]

Generalizing the equation for all n data points in the training set:

i=1n(yiyi^)2=i=1n(fifi^)2+nσ22σ2i=1nDierr=Err+nσ22σ2i=1nDiErr=errnσ2+2σ2i=1nDi

This equation for the true error is called Stein's unbiased risk estimator (SURE). SURELY someone will try to slip a terrible pun into the notes before it gets edited out. Note that  Di depends on complexity of the model. It measures how sensitive the model is to small perturbations in a single  yi in the training set. As complexity increases, the model will try to chase every little change and will be more sensitive to such perturbations. Minimizing training error without accounting for the impact of this term will result in overfitting. Thus, we need to know how to find  Di. Below we show an example, applying SURE to RBFs, where computing  Di is straightforward.

RBF Network Complexity Control

Problem: Assuming we want to fit our data using a radial basis function network, how many radial basis functions should be used? Too few RBFs and the model will have limited classification capabilities. Too many RBFs and the model could over fit the training data. For further information about RBF network complexity control check [4]

We can use Stein's unbiased risk estimator (SURE) to give us an approximation for how many RBFs to use.

The SURE equation is

Err=errnσ2+2σ2i=1nDi

where  Err is the true error,  err is the empirical error,  n is the number of training samples,  σ2 is the variance of the noise of the training samples and  Di is derivative of the model output with respect to true output as shown below

Di=fi^yi

Optimal Number of Basis in RBF

The optimal number of basis functions should be rearranged in order to minimize the generalization error  err.

The formula for an RBF network is:

f^=ΦW

where  f^ is a matrix of RBFN outputs for each training sample,  Φ is the matrix of neuron outputs for each training sample, and  W is the weight vector between each neuron and the output. Suppose we have m + 1 neurons in the network, where one has a constant function.

Given the training labels  Y we define the empirical error and minimize it

minW|YΦW|2

W=(ΦTΦ)1ΦTY

f^=Φ(ΦTΦ)1ΦTY


For simplification let  H be the hat matrix defined as

H=Φ(ΦTΦ)1ΦT

Our optimal output then becomes

f^=HY

We calculate D from the SURE equation. We now consider applying SURE to Radial Basis Function networks specifically. Based on SURE, the optimum number of basis functions should be assigned so that the generalization error err is minimized. Based on the RBF Network, by setting errW equal to zero we obtain the least squares solution of  W=(ΦTΦ)1ΦTY. Then the fitted values are Y^=f^=ΦW=Φ(ΦTΦ)1ΦTY=HY, where  H=Φ(ΦTΦ)1ΦT is the hat matrix for this model.


Consider only one node of the network. In this case we can write: f^i=Hi1y1+Hi2y2++Hiiyi++Hinyn.

Note here that H depends on the input vector xi but not on the observation yi.

By taking the derivative of  f^i with respect to yi, we can readily obtain:

i=1nf^yi=i=1nHii

Di=f^iyi=[HY]iyi , f^i=jHijYj


Here we recall that i=1nDi=i=1nHii=Trace(H), the sum of the diagonal elements of H. Using the permutation property of the trace function we can further simplify the expression as follows: Trace(H)=Trace(Φ(ΦTΦ)1ΦT)=Trace(ΦTΦ(ΦTΦ)1)=m, by the trace cyclical permutation property, where m is the number of basis functions in the RBF network (and hence Φ has dimension n×m).

Sketch of Trace Cyclical Property Proof:

For Amn,Bnm,Tr(AB)=i=1nj=1mAijBji=j=1mi=1nBjiAij=Tr(BA).
With that in mind, for Ann,Bnn=CD,Tr(AB)=Tr(ACD)=Tr(BA) (from above) =Tr(CDA).

Note that since Φ is a projection of the input matrix X onto a basis set spanned by m, the number of basis functions, that sometimes an extra Φ0 term is included without any input to represent the intercept of a fitted model. In this case, if considering an intercept, then Trace(H)=m+1.


The SURE equation then becomes

Err=errnσ2+2σ2(m+1)

As the number of RBFs  m increases the empirical error  err decreases, but the right term of the SURE equation increases. An optimal true error  Err can be found by increasing  m until  Err begins to grow. At that point the estimate to the minimum true error has been reached.

One way to estimate the noise variance is

σ^2=(yy^)2n1

This application of SURE is straightforward because minimizing Radial Basis Function error reduces to a simple least squares estimator problem with a linear solution. This makes computing  Di quite simple. In general,  Di can be much more difficult to solve for.

RBF Network Complexity Control (Alternate Approach)

An alternate approach (not covered in class) to tackling RBF Network complexity control is controlling the complexity by similarity <ref name="Eickhoff">R. Eickhoff and U. Rueckert, "Controlling complexity of RBF networks by similarity," Proceedings of European Symposium on Artificial Neural Networks, 2007</ref>. In <ref name="Eickhoff" />, the authors suggest looking at the similarity between the basis functions multiplied by their weight by determining the cross-correlations between the functions. The cross-correlation is calculated as follows:

 ρij=E[gi(x)gj(x)](E[gi2(x)]E[gj2(x)])

where  E[] denotes the expectation and  gi(x) and  gj(x) would denote two of the basis functions multiplied by their respective weights.

If the cross-correlation between two functions is high, <ref name="Eickhoff" /> suggests that the two basis functions be replaced with one basis function that covers the same region of both basis functions and that the corresponding weight of this new basis function be the average of the weights of the two basis functions. For the case of Gaussian radial basis functions, the equations for finding the new weight ( wnew), mean ( cnew) and variance ( σnew) are as follows:

 wnew=wi+wj2

 cnew=1wiσin+wjσjn(wiσinci+wjσjncj)

 σnew2=(σi+σj2+min(||mci||,||mcj||)2)2

where  n denotes the input dimension and  m denotes the total number of radial basis functions.

This process is repeated until the cross-correlation between the basis functions falls below a certain threshold, which is a tunable parameter.

Note 1) Though not extensively discussed in <ref name="Eickhoff" />, this approach to RBF Network complexity control presumably requires a starting RBF Network with a large number basis functions.

Note 2) This approach does not require the repeated implementation of differently sized RBF Networks to determine the empirical error, unlike the approach using SURE. However, the SURE approach is backed up by theory to find the number of radial basis functions that optimizes the true error and does not rely on some tunable threshold. It would be interesting to compare the results of both approaches (in terms of the resulting RBF Network obtained and the test error).

Support Vector Machines (Lecture: Oct. 27, 2011)

Support vector machines (SVMs) are learning systems that use a hypothesis space of linear functions in a high dimensional feature space, trained with a learning algorithm from opti- mization theory that implements a learning bias derived from statistical learning theory. SVMs are kernel machines based on the principle of structural risk minimization, which are used in applications of regression and classification; however, they are mostly used as binary classifiers. Although the subject can be said to have started in the late seventies (Vapnik, 1979), it is receiving increasing attention recently by researchers. It is such a powerful method that in the few years since its introduction has outperformed most other systems in a wide variety of applications, especially in pattern recognition.

Support Vector Machines are motivated by the idea of training linear machines with margins. It involves preprocessing the data to represent patterns in a high dimension (generally much higher than the original feature space). Note that using a suitable non-linear mapping to a sufficiently high dimensional space, the data will always be separable. (p. 263) <ref>[Duda, Richard O., Hart, Peter E., Stork, David G. "Pattern Classification". Second Edition. John Wiley & Sons, 2001.]</ref>

A suitible way to describe the interest in SVM can be seen in the following quote. "The problem which drove the initial development of SVMs occurs in several guises - the bias variance tradeoff (Geman, Bienenstock and Doursat, 1992), capacity control (Guyon et al., 1992), overfitting (Montgomery and Peck, 1992) - but the basic idea is the same. Roughly speaking, for a given learning task, with a given finite amount of training data, the best generalization performance will be achieved if the right balance is struck between the accuracy attained on that particular training set, and the “capacity” of the machine, that is, the ability of the machine to learn any training set without error. A machine with too much capacity is like a botanist with a photographic memory who, when presented with a new tree, concludes that it is not a tree because it has a different number of leaves from anything she has seen before; a machine with too little capacity is like the botanist’s lazy brother, who declares that if it’s green, it’s a tree. Neither can generalize well. The exploration and formalization of these concepts has resulted in one of the shining peaks of the theory of statistical learning (Vapnik, 1979). A Tutorial on Support Vector Machines for Pattern Recognition

Structural Risk Minimization and VC Dimension

Linear learning machines are the fundamental formulations of SVMs. The objective of the linear learning machine is to find the linear function that minimizes the generalization error from a set of functions which can approximate the underlying mapping between the input and output data. Consider a learning machine that implements linear functions in the plane as decision rules

f(x,β,β0)=sign(βTx+β0)


With n given training data with input values xiRd and output values yi{1,+1}. The empirical error is defined as

emp(θ)=1ni=1n|yif(x,β,β0)|=1ni=1n|yisign(βTx+β0)|


where θ=(x,β)

The generalization error can be expressed as

(θ)=|yf(x,θ)|p(x,y)dxdy

which measures the error for all input/output patterns that are generated from the underlying generator of the data characterized by the probability distribution p(x,y) which is considered to be unknown. According to statistical learning theory, the generalization (test) error can be upper bounded in terms of training error and a confidence term as shown in

(θ)emp(θ)+h(ln(2n/h)+1)ln(η/4)n


The term on left side represents generalization error. The first term on right hand side is empirical error calculated from the training data and the second term is called VC confidence which is associated with the VC dimension h of the learning machine. VC dimension is used to describe the complexity of the learning system. The relationship between these three items is illustrated in figure below:


File:risk.png
The relation between expected risk, empirical risk and VC confidence in SVMs.


Thus, even though we don’t know the underlying distribution based on which the data points are generated, it is possible to minimize the upper bound of the generalization error in place of minimizing the generalization error. That means one can minimize the expression in the right hand side of the inequality above.

Unlike the principle of Empirical Risk Minimization (ERM) applied in Neural Networks which aims to minimize the training error, SVMs implement Structural Risk Minimization (SRM) in their formulations. SRM principle takes both the training error and the complexity of the model into account and intends to find the minimum of the sum of these two terms as a trade-off solution (as shown in figure above) by searching a nested set of functions of increasing complexity.

Introduction

Support Vector Machineis a popular linear classifier. Suppose that we have a data set with two classes which could be separated using a hyper-plane. Support Vector Machine (SVM) is a method which will give us the "best" hyper-plane. There are other classifier that find a hyper-plane that separate the data, namely Perceptron. However, the output of Perceptron and many other algorithms depends on the input parameters, so every run of Percetron can give you a different output. On the other hand, SVM tries to find the hyper-plane that separates the data and have the farthest distance from the points. This is also known as the Max-Margin hyper-plane.

No matter whether the training data are linearly-separable or not, the linear boundary produced by any of the versions of SVM is calculated using only a small fraction of the training data rather than using all of the training data points. This is much like the difference between the median and the mean. SVM can also be considered a special case of Tikhonov regularization. A special property is that they simultaneously minimize the empirical classification error and maximize the geometric margin; hence they are also known as maximum margin classifiers. The key features of SVM are the use of kernels, the absence of local minima, the sparseness of the solution (i.e. few training data points are needed to construct the linear decision boundary) and the capacity control obtained by optimizing the margin.(Shawe-Taylor and Cristianini (2004)). Another key feature of SVM, as discussed below, is the use of slack variables to control the amount of tolerable misclassification on the training data, which form the soft margin SVM. This key feature can serve to improve the generalization of SVM to new data.


So with Perceptron, there can be infinitely many solutions you can get, where the training error will be zero. But the question is that among all these possible solution which one is the best. Intuitively we choose the solution with the largest margin between both classes. So if we choose the hyper-plane with the maximum margin between the two classes that could be a better solution. This makes sense because at test time, more points will be observed and they may be closer to the other class, so the safest choice for the hyper-plane would be the one farthest from both classes.

One of the great things about SVM is that not only it has solid theoretical guarantees, but also it works very well in practice.

To summarize:

What we mean by margin is the distance between the hyperplane and the closest point in a class.

If the data is Linearly separable, then there exists infinitely many solution hyperplanes. Of those, infinitely many hyperplanes one of them is the best choice for the solution. Then the best decision to make is the hyperplane which is furthest from both classes. So our goal is to find a hyperplane amoung all possible hyperplanes which is furthest from both classes. which is to find a Hyperplane that has maximum margin.

What we mean by margin is the distance between the hyperplane and the closest point in a class.

If the mean value were to be used instead of the closest point, then an outlier may pull the hyperplane into the data which would incorrectly classify the known data points. This is the reason why we use the closest point instead of the expected value.

Setting

What is di
  • We assume that the data is linearly separable
  • Our classifier will be of the form βTx+β0
  • We will assume that our labels are yi{1,1}


The goal is to classify the point xi based on the sign{di} where di is the signed distance between xi and the hyperplane.


Now we are going to check how far this point is from the hyperplane, and the parts on one side of the hyperplane will have a negative value and the parts on the other side will have a positive value. Points are classified by the sign of the data point. So xi would be classified using di

Side Note: A memory from the past of Dr. Ali Ghodsi

When the aforementioned Professor was a small child, grade 2. He was often careless with the accuracy of certain curly brackets, when writing what one can only assume was math proofs. One day, his teacher grew impatient and demanded that a page of perfect curly brackets be produced by the young Dr. (He may or may not have been a doctor at the time) And now, whenever Dr. Ghodsi writes a tidy curly bracket, he is reminded of this and it always brings a smile to his face.

From memories of the past.

(the number 20 was involved in the story, either the number of pages or the number of lines)

Case 1: Linearly Separable (Hard Margin)

In this case, the classifier will be βT+β0 and  y{1,1} The classify point xi based on sign  {di}, where  di is the digned distance between xi and the hyperplain.


Objective Function

Look at it being perpendicular

Observation 1: β is orthogonal to hyper-plane. Because, for any two arbitrary points x1,x2 on the plane we have:

βTx1+β0=0

βTx2+β0=0

So βT(x1x2)=0. Thus, βT(x1x2), which implies that β is a normal vector to the hyper-plane.


Observation 2: If x0 is a point on the hyper-plane, then there exists a  β0 such that, βTx0+β0=0. So βTx0=β0. This along with observation 1 imply there exists a  β0 such that, βTx=β0 for all x on the hyperplane.


Observation 3: Let  di be the signed distance of point xi from the plane. The  di is the projection of (xix0) on the direction of β. In other words, diβT(xx0).(normalize β)

di=βT(xix0)|β|=βTxiβTx0|β|=βTxi+β0|β|


Observation 4: Let margin be the distance between the hyper-plane and the closest point. Since di is the signed distance between the hyperplane and point xi, we can define the positive distance of point xi from the hyper-plane as (yidi).

Margin=min{yidi}=min{yi(βTxi+β0)|β|}

Our goal is to maximize the margin. This is also known as the Max/Min problem in Optimization. When defining the hyperplane, what is important is the direction of β. Value of β0 does not change the direction of the hyper-plane, it is only the distance from the origin. Note that if we assume that the points do not lie on the hyper-plane, then the margin is positive:

yi(βTxi+β0)0yi(βTxi+β0)C for some positive C yi(βTCxi+β0C)1 Divide by Cyi(βTxi+β0)1 By setting β=βC,β0=β0Cyi(βTxi+β0)1 By setting ββ,β0β0


So with a bit of abuse of notation we can assume that

yi(βTxi+β0)1

Therefore, the problem translates to:

min{1|β|}

So, it is possible to re-interpret the problem as:

max12|β|2 s.t. yi(βTxi+β0)1

|β| could be any norm, but for simplicity we use L2 norm. We use 12|β|2 instead of |β| to make the function differentiable. To solve the above optimization problem we can use Lagrange multipliers as follows

Support Vectors

Support vectors are the training points that determine the optimal separating hyperplane that we seek. Also, they are the most difficult points to classify and at the same time the most informative for classification.


Writing Lagrangian Form of Support Vector Machine

The Lagrangian form using Lagrange multipliers and constraints that are discussed below is introduced to ensure that the optimization conditions are satisfied, as well as finding an optimal solution (the optimal saddle point of the Lagrangian for the classic quadratic optimization). The problem will be solved in dual space by introducing αi as dual constraints, this is in contrast to solving the problem in primal space as function of the betas. A simple algorithm for iteratively solving the Lagrangian has been found to run well on very large data sets, making SVM more usable. Note that this algorithm is intended to solve Support Vector Machines with some tolerance for errors - not all points are necessarily classified correctly. Several papers by Mangasarian explore different algorithms for solving SVM.

Dual form of the optimization problem:

L(β,β0,α)=12|β|2i=1nαi[yi(βTxi+β0)1]=12|β|2βTi=1nαiyixii=1nαiyiβ0i=1nαi

To find the optimal value, we set the derivatives equal to zero: Lβ=0 and Lβ0=0.

Lβ=βi=1nαiyixi=0β=i=1nαiyixiLβ0=i=1nαiyi=0i=1nαiyi=0

To get the dual form of the optimization problem we replace the above two equations in definition of L(β,β0,α). We get: L(β,β0,α)=12βTββTi=1nαiyixii=1nαiyiβ0i=1nαi=12βTi=1nαiyixiβTi=1nαiyixi0+i=1nαi=12βTi=1nαiyixi+i=1nαi=12i=1nαiyixiTi=1nαiyixi+i=1nαi=i=1nαi12i=1nj=1nαiαjyiyjxiTxj

The above function is a dual objective function, so we should minimize it:

minαi=1nαi12i=1nj=1nαiαjyiyjxiTxjs.t.αi0i=1nαiyi=0

The dual function is a quadratic function of several variables subject to linear constraints. This optimization problem is called Quadratic Programming and is much easier than the primal function. It is possible to to write to dual form using matrices:

minααT112αTSαs.t.α0αTy=0S=([y1,,yn]X)T([y1,,yn]X)


Since S=([y1,,yn]X)T([y1,,yn]X), S is a positive semi-definite matrix. This means that the dual function is convex.[5]. This means that the dual function does not have any local minimum that is not global. So it is relatively easy to find the global minimum.

Discussion on the Dual of the Lagrangian

As mentioned in the previous section, solving the dual form of the Lagrangian requires quadratic programming. Quadratic programming can be used to minimize a quadratic function subject to a set of constraints. In general, for a problem with N variables, the quadratic programming solution has a computational complexity of  O(N3) <ref name="CMBishop" />. The original problem formulation only has (d+1) variables that need to be found (i.e. the values of  β and  β0), where d is the dimensionality of the data points. However, the dual form of the Lagrangian has n variables that need to be found (i.e. all the  α values), where n is the number of data points. It is likely that n is larger than (d+1) (i.e. the number of data points is larger than the dimensionality of the data plus 1), which makes the dual form of the Lagrangian seem computationally inefficient <ref name="CMBishop" />. However, the dual of the Lagrangian allows the inner product  xiTxj to be expressed using a kernel formulation which allows the data to be transformed into higher feature spaces and thus allowing seemingly non-linearly separable data points to be separated, which is a highly useful feature described in more detail in the next class <ref name="CMBishop" />.

Support Vector Machine Continued (Lecture: Nov.1, 2011)

Previous lecture we considered the case when data is linearly separable. The goal of the Support Vector Machine classifier is to find the hyper-plane that maximizes the margin from each of the two classes. We derived the following optimization problem based on the SVM methodology:

minβ,β012|β|2

Subject to the constraint:

yi(βTxi+β0)1


This is the primal form of the optimization problem. Then we derived the dual of this problem:

maxαiαi12ijαiαjyiyjxiTxj

Subject to constraints:

αi0

iαiyi=0


The is quadratic programming problem. QP problems have been thoroughly studied and that can be efficiently solved. This particular problem has a convex objective function as well as convex constraints. This makes solving the problem easier and ensures the computed solution is the global maximum. These properties are of significant important for classifiers and thus are one of the most important strengths of the SVM classifier.

We are able to find β when α is found:

β=iαiyixi

But in order to find the hyper-plane uniquely we need also to find β0.

When finding the dual objective function, there are set of conditions called KKT that should be satisfied.

KKT Conditions

KKT stands for Karush-Kuhn-Tucker (initially named after Kuhn and Tucker's work in the 1950's, however, it was later discovered that Karush had stated the conditions back in the late 1930's) <ref name="CMBishop" />

Suppose we want to find minxf(x) subject to the constraint gi(x)0,x :

L(x,αi)=f(x)iαigi(x)

If x is the optimal point , the necessary conditions for x to be the local minimum :

1) Lx(x)=0 that is f(x)Σiαig(x)=0

2) αi0, dual feasibility

3) αigi(x)=0, complementary slackness

4) gi(x)0, primal feasibility


If any of the above four conditions are not satisfied, then the primal function is not feasible.

Looking more closely at condition 3:

αigi(x)=0


αi[yi(βTxi+β0)1]=0

We see that this is at the optimal point.

It is obvious that we can have either αi0 or yi(βTxi+β0)1.


If αi>0, this gives yi(βTxi+β0)=1; then the point  xi is on the margin of the hyper-plane and this point is called a support vector.

If yi(βTxi+β0)1, we have αi =0, in this case, the point  xi is away from the margin of the hyper-plane.


Note here that  αi is positive if and only if  xi is on the margin. Thus  xi that correspond to positive  αi are called support vectors. For all other points not on the margin  αi is 0. This essentially means that only the support vectors will affect the hyperplane found using SVM, thus SVM is a relatively robust classifier (i.e. it is not affected by outlying points).


To compute  β0, we need to choose any αi>0, this will satisfy:

yi(βTxi+β0)=1.

We can compute β=iαiyixi, substitute  β in yi(βTxi+β0)=1 and solve for  β0.


[xy] [x2y22xy]

k(x,y)=ϕT(x)ϕ(y)

[x1y1] [x12y122x1y1]

[x2y2] [x22y222x2y2]


[x12y122x1y1]T[x22y222x2y2]=K([x1y1],[x2y2])


iαi12ijαiαjyiyjxiTxj

where xiTxj=ϕT(x)ϕ(y)=k(xi,xj)


[k(x1,x1)k(x1,x2)k(x1,xn)k(xn,x1)k(xn,x2)k(xn,xn)]


Whatever we derived so far was based on the assumption that the data is linearly separable but that might not be the case always and it might be impossible to find a hyper-plane that completely separates two class of data . This case is called hard margin hyper-plane.

Kernel Trick

In most of the real world cases the data points are not linearly separable. How can the above methods be generalized to the case where the decision function is not a linear function of the data? Boser, Guyon and Vapnik, 1992, showed that a rather old trick (Aizerman, 1964) can be used to accomplish this in an astonishingly straightforward way. First notice that the only way in which the data appears in the dual-form optimization problem is in the form of dot products: xiT.xj . Now suppose we first use a non-linear operator Φ(x) to map the data points to some other higher dimensional space (possibly infinite dimensional) H (called Hilbert space or feature space), where they can be classified linearly. Figure below illustrates this concept:


File:kernell trick.jpg
Mapping of not-linearly separable data points in a two-dimensional space to a three-dimensional space where they can be linearly separable by means of a kernel function.


In other words, a linear learning machine can be employed in the higher dimensional feature space to solve the original non-linear problem. Then of course the training algorithm would only depend on the data through dot products in H, i.e. on functions of the form <ΦT(xi).Φ(xj)>. Note that the actual mapping Φ(x) does not need to be known, only the inner product of the mapping is needed for modifying the support vector machine such that it can separate non-linearly separable data. Avoiding the actual mapping to the higher dimensional space is preferable, because higher dimensional spaces may have problems due to the curse of dimensionality.

So the hypothesis in this case would be

f(x)=βTΦ(x)+β0

which is linear in terms of the new space that Φ(x) maps the data to, but non-linear in the original space. Now we can extend all the presented optimization problems for the linear case, for the transformed data in the feature space. If we define the kernel function as

K(xi,xj)=<Φ(xi),Φ(xj)>

where  Φ is a mapping from input space to an (inner product) feature space. Then the corresponding dual form is


L(α)=i=1nαi12i=1nj=1nαiαjyiyjK(xi,xj)

subject to i=1nαiyi=0αi0,i=1,,n


The cost function L(α) is convex and quadratic in terms of the unknown parameters. This problem is solved through quadratic programming. The KKT conditions for this equation lead to the following final decision rule:

L(x,α,β0)=i=1NsvyiαiK(xi,x)+β0


where  Nsv and  αi denote number of support vectors and the non-zero Lagrange multipliers corresponding to the support vectors respectively.

Several typical choices of kernels are linear, polynomial, Multi-Layer Perceptron (MLP) and Gaussian or Radial Basis Function (RBF) kernel. Their expressions are as following:

Linear kernel: K(xi,xj)=xiTxj

Polynomial kernel: K(xi,xj)=(1+xiTxj)p

MLP kernel: K(xi,xj)=tanh(k1xiTxj+k2)

Gaussian (RBF) kernel:  K(xi,xj)=exp([(xixj)]22σ2)

Radial Basis:  K(xi,xj)=exp(γxixj2),γ>0

Sigmoid:  K(xi,xj)=tanh(γxiTxj+r).

where,  γ,  r, and  d are all kernel parameters.


Kernel functions satisfying Mercer's conditions not only enables implicit mapping of data from input space to feature space but also ensure the convexity of the cost function which leads to the unique optimum. Mercer condition states that a continuous symmetric function K(x,y) must be positive semi-definite to be a kernel function which can be written as inner product between the data pairs. Note that we would only need to use K in the training algorithm, and would never need to explicitly even know what  Φ is.


In the case of Gaussian or RBF kernel for example, H is infinite dimensional, so it would not be very easy to work with Φ explicitly. However, if one replaces <(xi).(xj)> by K(xi,xj) everywhere in the training algorithm, the algorithm will happily produce a support vector machine which lives in an infinite dimensional space, and furthermore do so in roughly the same amount of time it would take to train on the un-mapped data. All the considerations of the previous sections hold, since we are still doing a linear separation, but in a different space.


The choice of which kernel would be best for a particular application has to be determined through trial and error. Normally, the Gaussian or RBF kernel are best suited for classification tasks including SVM.


The video below shows a graphical illustration of how a polynomial kernel works to a get better sense of kernel concept:

Mapping data points to a higher dimensional space using a polynomial kernel

Kernel Properties

Kernel functions must be continuous, symmetric, and most preferably should have a positive (semi-) definite Gram matrix. Kernels which are said to satisfy the Mercer's theorem are positive semi-definite, meaning their kernel matrices have no non-negative Eigen values. The use of a positive definite kernel insures that the optimization problem will be convex and solution will be unique. <ref> Reference:http://crsouza.blogspot.com/2010/03/kernel-functions-for-machine-learning.html#kernel_properties </ref>

Case 2: Linearly Non-Separable Data (Soft Margin)

The original SVM was specifically made for separable data. But, this is a very strong requirement, so it was suggested by Vladimir Vapnik and Corinna Cortes later on to remove this requirement. This is called Soft Margin Support Vector Machine. One of the advantages of SVM is that it is relatively easy to generalize it to the case that the data is not linearly separable.

In the case when 2 data sets are not linearly separable, it is impossible to have a hyperplane that completely separates 2 classes of data. In this case the idea is to minimize the number of points that cross the margin and are miss-classified .So we are going to minimize that are going to violate the constraint:

yi(βTxi+β0)1

Hence we allow some of the points to cross the margin (or equivalently violate our constraint) but on the other hand we penalize our objective function (so that the violations of the original constraint remains low):

min(1/2|β|2+γiζi)

And now our constraint is as follows:

yi(βTxi+β0)1ζi

ζi0

We have to check that all KKT conditions are satisfied:

L(β,β0,ζi,αi,λi)=1/2|β|2+γiζiiαi(yi(βTxi+β0)1+ζi)iλiζi

1)Lβ=βiαiyixiβ=iαiyixi

2)Lβ0=iαiyi=0


3)Lζi=γαiλi

Now we have to write this into a Lagrangian form.

Support Vector Machine Continued (Lecture: Nov. 3, 2011)

Case 2: Linearly Non-Separable Data (Soft Margin [6]) Continued

Recall from last time that soft margins are used instead of hard margins when we are using SVM to classify data points that are not linearly separable.

Soft Margin SVM derivation of dual

The soft-margin SVM optimization problem is defined as:

min(12|β|2+γiζi) subject to the constraints yi(βTxi+β0)1ζi, here we have ζi0.

In other words, we have relaxed the constraint for each xi so that it can violate the margin by an amount ζi. As such, we want to make sure that all ζi values are as small as possible. So, we penalize them in the objective function by a factor of some chosen γ.

Now we can define our Lagrangian:

L(β,β0,ζi,αi,λi)=12|β|2+γiζiiαi[yi(βTxi+β0)1+ζi]iλiζi

Our K.K.T. conditions are as follows:

1)Lβ=βiαiyixi=0β=iαiyixiLβ0=iαiyi=0Lζi=γαiλi=02)αi0,λi03)αi[yi(βTxi+β0)1+ζi]=0,λiζi=04)yi(βTxi+β0)1ζi

So, simplifying the Lagrangian the same way we did with the hard margin case, we get the following:

L=12i,jαiαjyiyjxiTxj+γiζii,jαiαjyiyjxiTxjβ0iαiyi+iαiiαiζiiλiζi=12i,jαiαjyiyjxiTxj+iαi0+(iγζiiαiζiiλiζi)=12i,jαiαjyiyjxiTxj+iαi+i(γαiλi)ζi=12i,jαiαjyiyjxiTxj+iαi

subject to αi0,iαiyi=0,λi0. Notice that the Lagrangian is the exact same as the hard margin case. The only difference with the soft margin case is the additional constraint λi0. However, γ doesn't actually appear directly in the objective function. But, we can discern the following:

γi=0αi=γ

γi>0αi<γ

Thus, we can derive that the only difference with the soft margin case is the constraint 0αiγ. This problem can be solved with quadratic programming.

Soft Margin SVM formulation summary

In summary, the primal form of the soft-margin SVM is given by:

minβ,ζ12|β|2+γiζis.t. yi(βTxi+β0)1ζi,i=1,...,M

The corresponding dual form which we derived above is:

maxαiαi12i,jαiαjyiyjxiTxjs.t. iαiyi=00αiγ,i=1,...,M

Note, the soft-margin dual objective is identical to hard margin dual objective! The only difference is now αi variables cannot be unbounded and are restricted to be a maximum of γ. This restriction allows the optimization problem to become feasible when the data is non-seperable. In the hard-margin case, when αi is unbounded there may be no finite maximum for the objective and we would not be able to converge to a solution.

Also note, γ is a model parameter and must be chosen to a fixed constant. It controls the size of margin versus violations. In a data set with a lot of noise (or non-seperability) you may want to choose a smaller γ to ensure a large margin. In practice, γ is chosen by cross-validation---which tests the model on a held out sample to determine which γ gives the best result. However, it may be troublesome to work with γ since γ(0,). So often a variant formulation, known as ν-SVM is used which uses a better scaled parameter ν(0,1) instead of γ to balance margin versus separability.

Finally note that as γ, the soft-margin SVM converges to hard-margin, as we do not allow any violation.

Soft Margin SVM problem interpretation

Like in the case of hard-margin the dual formulation for soft-margin given above allows us to interpret the role of certain points as support vectors.

We consider three cases:

Case 1: αi=γ

From KKT condition 1 (third part), γαiλi=0 implies λi=0.

From KKT condition 3 (second part) λiζi=0 this now suggests ζi>0.

Thus this is a point that violates the margin, and we say xi is inside the margin.

Case 2: αi=0

From KKT condition 1 (third part), γαiλi=0 implies λi>0.

From KKT condition 3 (second part) λiζi=0 this now implies ζi=0.

Finally, from KKT condition 3 (first part), yi(βTxi+β0)>1ζi, and since ζi=0, the point is classified correctly and we say xi is outside the margin. In particular, xi does not play a role in determining the classifier and if we ignored it, we would get the same result.

Case 3: 0<αi<γ

From KKT condition 1 (third part), γαiλi=0 implies λi>0.

From KKT condition 3 (second part) λiζi=0 this now implies ζi=0.

Finally, from KKT condition 3 (first part), yi(βTxi+β0)=1ζi, and since ζi=0, the point is on the margin and we call it a support vector.

These three scenarios are depicted in Fig..

Soft Margin SVM with kernel

Like hard-margin SVM, we can use the kernel trick to find a non-linear classifier using the dual formulation.

In particular, we define a non-linear mapping for xi as Φ(xi), then in dual objective we compute ΦT(xi)Φ(xj) instead of xiTxj. Using a kernel function K(xi,xj)=ΦT(xi)Φ(xj) from the list provided in the previous lecture notes, we then do not need to explicitly map Φ(xi).

The dual problem we solve is:

maxαiαi12i,jαiαjyiyjK(xi,xj)s.t. iαiyi=00αiγ,i=1,...,M

where K(xi,xi) is an appropriate kernel function specification.

Soft Margin SVM implementation

The SVM optimization problem is a quadratic program and we can use any quadratic solver to accomplish this. For example, matlab's optimization toolbox provides quadprog. Alternatively, CVX (by Stephen Boyd) is an excellent optimization toolbox that integrates with matlab and allows one to enter convex optimization problems as though they are written on paper (and it is free).

We prefer to solve the dual since it is an easier problem (and also allows to use a Kernel). Using CVX this would be coded as

K = X*X';           % Linear kernel
H = (y*y') .* K;
cvx_begin 
    variable  alpha(M,1);
    maximize  (sum(alpha) - 0.5*alpha'*H*alpha)
    subject to
         y'*alpha == 0; 
         alpha >= 0;
         alpha <= gamma
cvx_end

which provides us with optimal α.

Now we can obtain β0 by using any point on the margin (i.e. 0<αi<γ), and solving

yi(jyjαjK(xj,xi)+β0)=1

Note, K(xi,xj)=xiTxj can also be the linear kernel.

Finally, we can classify a new data point x, according to

h(x)={+1,  if jyjαjK(xj,x)+β0>01,  if jyjαjK(xj,x)+β0<0


Multiclass Support Vector Machines

A number of approaches exist for applying SVMs to classification tasks with more than two classes. The most straightforward approach given  k classes, is to use  k separate SVMs trained using the one-versus-the-rest approach, which basically trains the  ith SVM such that the  ith class is the "first class" (where  i=1,2,...k) and the remaining  k1 classes are the "second class" for the  ith SVM <ref name="CMBishop" />. Problems arise with this method as a point may be classified as different classes by each of the SVMs, because the class boundaries found by all SVMs may not be consistent such that each point belongs only to one class. Furthermore, the ratio of data points between the two classes in the one-versus-the-rest approach is not well balanced (the  k1 classes are likely to have a lot more points than the  ith class) <ref name="CMBishop" />.

Variations of the one-versus-the-rest approach exist to address its problems:

  • The class labels of each SVM can be changed from +1 and -1 to +1 (for the  ith class) and  1k1 (for the remaining  k1 classes) in an attempt to counterbalance the unbalanced number of data points for each class <ref>Y. Lee, Y. Lin, and G. Wahba, "Multicategory Support Vector Machines," Technical Report, 2001</ref>.
  • The  k SVMs can be trained at the same time using one objective function <ref>J. Weston and C. Watkins, "Multi-class Support Vector Machines," Proceedings ESANN, 1999</ref>.

Advantages of Support Vector Machines

  • SVMs provide a good out-of-sample generalization. This means that, by choosing an appropriate generalization grade,

SVMs can be robust, even when the training sample has some bias. This is mainly due to selection of optimal hyperplane.

  • SVMs deliver a unique solution, since the optimality problem is convex. This is an advantage compared

to Neural Networks, which have multiple solutions associated with local minima and for this reason may not be robust over different samples.

  • State-of-the-art accuracy on many problems.
  • SVM can handle any data types by changing the kernel.

Disadvantages of Support Vector Machines

  • Difficulties in choice of the kernel (Which we will study about in future).
  • limitation in speed and size, both in training and testing
  • Discrete data presents another problem, although with suitable rescaling excellent results have nevertheless been obtained.
  • The optimal design for multiclass SVM classifiers is a further area for research.
  • A problem with SVMs is the high algorithmic complexity and extensive memory requirements of the required quadratic programming in large-scale tasks.

The Naive Bayes Classifier

The naive Bayes classifier is a very simple (and often effective) classifier based on Bayes rule. For further reading check [7]

Bayes assumption is that all the features are conditionally independent given the class label. Even though this is usually false (since features are usually dependent), the resulting model is easy to fit and works surprisingly well.

Each feature or variable xij is independent for j=1,...,d, where xiRd.

Thus the Bayes classifier is h(x)=argmaxkπkfk(x)

where f^k(x)=f^k(x1x2...xd)=j=1df^kj(xj).

We can see this a direct application of Bayes rule P(Y=k|X=x)=P(X=x|Y=y)P(Y=y)P(X=x)=fk(x)πkkfkπk,

with fk(x)=f(x1)f(x2)...f(xd) and  xRd.

Note, earlier we assume class-conditional densitites which were multivariate normal with a dense covariance matrix. In this case we are forcing the covariance matrix to be a diagonal. This simplification, while not realistic, can provide a more robust model.

K-Nearest-Neighbors(k-NN)

Classifying x by assigning it the label most frequently represented among k nearest samples and use a voting scheme.

Given a data point x, find the k nearest data points to x and classify x using the majority vote of these k neighbors (k is a positive integer, typically small.) If k=1, then the object is simply assigned to the class of its nearest neighbor.


  1. Ties can be broken randomly.
  2. k can be chosen by cross-validation
  3. k-nearest neighbor algorithm is sensitive to the local structure of the data<ref>

http://www.saylor.org/site/wp-content/uploads/2011/02/Wikipedia-k-Nearest-Neighbor-Algorithm.pdf</ref>.

  1. Nearest neighbor rules in effect compute the decision boundary in an implicit manner.
Requirements of k-NN:

<ref>http://courses.cs.tamu.edu/rgutier/cs790_w02/l8.pdf</ref>

  1. An integer k
  2. A set of labeled examples (training data)
  3. A metric to measure “closeness”
Advantages:
  1. Able to obtain optimal solution in large sample.
  2. Simple implementation
  3. There are some noise reduction techniques that work only for k-NN to improve the efficiency and accuracy of the classifier.
Disadvantages:
  1. If the training set is too large, it may have poor run-time performance.
  2. k-NN is very sensitive to irrelevant features since all features contribute to the similarity and thus to classification.<ref>

http://www.google.ca/url?sa=t&rct=j&q=k%20nearest%20neighbors%20disadvantages&source=web&cd=1&ved=0CCIQFjAA&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.100.1131%26rep%3Drep1%26type%3Dpdf&ei=3feyToHMG8Xj0QGOoMDKBA&usg=AFQjCNFF1XsYgZy1W2YLQMNTq_7s07mfqg&sig2=qflY4MffEHwP9n-WpnWMdg</ref>

  1. small training data can lead to high misclassification rate.
Extensions and Applications

In order to improve the obtained results, we can do following:

  1. Preprocessing: smoothing the training data (remove any outliers and isolated points)
  2. Adapt metric to data

Besides classification, k-nearest-neighbours is useful for other tasks as well. For example, the k-NN has been used in Regression or Product Recommendation system<ref> http://www.cs.ucc.ie/~dgb/courses/tai/notes/handout4.pdf</ref>.

SVM is commonly used in Bioinformatics. Common uses include classification of DNA sequences and promoter recognition and identifying disease-related microRNAs. Promoters are short sequences of DNA that act as a signal for gene expression. In one paper, Robertas Damaševičius tries using a power series kernel function and 11 classification rules for data projection to classifty these sequences, to aid active gene location.<ref>Damaševičius, Robertas. "Analysis of Binary Feature Mapping Rules for Promoter Recognition in Imbalanced DNA Sequence Datasets using Support Vector Machine". Proceedings from 4th International IEEE Conference "Intelligent Systems". 2008.</ref> MicroRNAs are non-coding RNAs that target mRNAs for cleavage in protein synthesis. There is growing evidence suggesting that mRNAs "play important roles in human disease development, progression, prognosis, diagnosis and evaluation of treatment response". Therefore, there is increasing research in the role of mRNAs underlying human diseases. SVM has been proposed as a method of classifying positive mRNA disease-associations from negative ones.<ref>Jiang, Qinghua; Wang, Guohua; Zhang, Tianjiao; Wang, Yadong. "Predicting Human microRNA-disease Associations Based on Support Vector Machine". Proceedings from IEEE International Conference on Bioinformatics and Biomedicine. 2010.</ref>

References

<references />