# stat841

## Classfication-2009.9.30

### Classification

With the rise of fields such as data-mining, bioinformatics, and machine learning, classification has becomes a fast-developing topic. In the age of information, vast amounts of data are generated constantly, and the goal of classification is to learn from data. Potential application areas include handwritten post codes recognition, medical diagnosis, face recognition, human language processing and so on.

Definition: The problem of Prediction a discrete random variable from another random variable is called Classification.

In classification,, we attempt to approximate a function , by using a training data set, which will then be able to accurately classify new data inputs.

Given , a subset of the -dimensional real vectors and , a finite set of labels, We try to determine a 'classification rule' such that,

We use ordered pairs of training data which are identical independent distributions, where ,, to approximate .

Thus, given a new input, by using the classification rule we can predict a corresponding .

Example Suppose we wish to classify fruits into apples and oranges by considering certain features of the fruit, for instance, color, diameter, and weight.
Let and . The goal is to find a classification rule such that when a new fruit is presented based on its features, , our classification rule can classify it as either an apple or an orange, i.e., be the fruit type of .

### Error rate

The true error rate' of a classifier having classification rule is defined as the probability that does not correctly classify any new data input, i.e., it is defined as . Here, and are the known feature values and the true class of that input, respectively.
The empirical error rate (or training error rate) of a classifier having classification rule is defined as the frequency at which does not correctly classify the data inputs in the training set, i.e., it is defined as

, where is an indicator variable and . Here, and are the known feature values and the true class of the training input, respectively.

### Bayes Classifier

The principle of Bayes Classifier is to calculate the posterior probability of a given object from its prior probability via Bayes formula, and then place the object in the class with the largest posterior probability<ref> http://www.wikicoursenote.com/wiki/Stat841f11#Bayes_Classifier </ref>

Intuitively speaking, to classify  we find  such that  is maximum over all the members of .


Mathematically, for classes and given object , we find which maximizes , and classify into class . In order to calculate the value of , we use Bayes formula

where is referred to as the posterior probability, as the prior probability, as the likelihood, and as the evidence.

For the special case that has only two classes, that is, . Consider the probability that . Given , By Bayes formula, we have

Definition:

The Bayes classification rule is

3 different approaches to classification:

1) Empirical Risk Minimization: Choose a set fo classifier and find that minimizes some estimate of

2) Regression: Find an estimate of the function and define

3) Density Estimation: estimate and (less popular in high-dimension cases)

Bayes Classification Rule Optimality Theorem: The Bayes rule is optimal in true error rate, that is for any other classification rule , we have . Intuitively speaking this theorem is saying we cannot do better than classifying to when the probability of being of type for is more than probability of being any other type.

Definition:

The set is called the decision boundary.

Remark:

1)Bayes classification rule is optimal. Proof:[1]

2)We still need any other method, since we cannot define prior probability in realistic.

Example:
We’re going to predict if a particular student will pass STAT441/841. We have data on past student performance. For each student we know: If student’s GPA > 3.0 (G) If student had a strong math background (M) If student is a hard worker (H) If student passed or failed course

, where 1 refers to pass and 0 refers to fail. Assume that
For a new student comes along with values , we calculate as

Thus, we classify the new student into class 0, namely, we predict him to fail in this course.

Notice: Although the Bayes rule is optimal, we still need other methods, since it is generally impossible for us to know the prior , and class conditional density and ultimately calculate the value of , which makes Bayes rule inconvenient in practice.

Currently, there are four primary classifier based on Bayes Classifier: Naive Bayes classifier[2], tree-augmented naive Bayes (TAN), Bayesian network augmented naive Bayes (BAN) and general Bayesian network (GBN).

### Bayesian vs. Frequentist

Intuitively, to solve a two-class problem, we may have the following two approaches:

1) If , then , otherwise .

2) If , then , otherwise .

One obvious difference between these two methods is that the first one considers probability as changing based on observation while the second one considers probablity as having objective existence. Actually, they represent two different schools in statistics.

During the history of statistics, there are two major classification methods : Bayesian and frequentist. The two methods represent two different ways of thoughts and hold different view to define probability. The followings are the main differences between Bayes and Frequentist.

Frequentist

1. Probability is objective.
2. Data is a repeatable random sample(there is a frequency).
3. Parameters are fixed and unknown constant.
4. Not applicable to single event. For example, a frequentist cannot predict the weather of tomorrow because tomorrow is only one unique event, and cannot be referred to a frequency in a lot of samples.

Bayesian

1. Probability is subjective.
2. Data are fixed.
3. Parameters are unknown and random variables that have a given distribution and other probability statements can be made about them.
4. Can be applied to single events based on degree of confidence or beliefs. For example, Bayesian can predict tomorrow's weather, such as having the probability of of rain.

Example

Suppose there is a man named Jack. In Bayesian method, at first, one can see this man (object), and then judge whether his name is Jack (label). On the other hand, in Frequentist method, one doesn’t see the man (object), but can see the photos (label) of this man to judge whether he is Jack.

## Linear and Quadratic Discriminant Analysis - October 2,2009

### Introduction

#### Notation

Let us first introduce some new notation for the following sections.

Multi-class Classification:

Y takes on more than two values.

Recall that in the discussion of the Bayes Classifier, we introduced Bayes Formula:

We will use new labels for the following equivalent formula:

• is called the class conditional density; also referred to previously as the likelihood function. Essentially, this is the function that allows us to reason about a parameter given a certain outcome.
• is called the prior probability. This is a probability distribution that represents what we know (or believe we know) about a population.
• is the sum with respect to all classes.

#### Approaches

Representing the optimal method, Bayes classifier cannot be used in the most practical situations though, since usually the prior probability is unknown. Fortunately, other methods of classification have been evolved. These methods fall into three general categories.

1 Empirical Risk Minimization:Choose a set fo classifier and find , minimize some estimate of .

2 Regression:Find an estimate of the function and deifne

3 Density estimation, estimate and

Note:
The third approach, in this form, is not popular because density estimation doesn't work very well with dimension greater than 2. However this approach is the simplest and we can assume a parametric model for the densities. Linear Discriminate Analysis and Quadratic Discriminate Analysis are examples of the third approach, density estimation.

### LDA

#### Motivation

The Bayes classifier is optimal. Unfortunately, the prior and conditional density of most data is not known. Some estimation of these should be made if we want to classify some data.

The simplest way to achieve this is to assume that all the class densities are approximately a multivariate normal distribution, find the parameters of each such distribution, and use them to calculate the conditional density and prior for unknown points, thus approximating the Bayesian classifier to choose the most likely class. In addition, if the covariance of each class density is assumed to be the same, the number of unknown parameters is reduced and the model is easy to fit and use, as seen later.

#### History

The name Linear Discriminant Analysis comes from the fact that these simplifications produce a linear model, which is used to discriminate between classes. In many cases, this simple model is sufficient to provide a near optimal classification - for example, the Z-Score credit risk model, designed by Edward Altman in 1968, which is essentially a weighted LDA, revisited in 2000, has shown an 85-90% success rate predicting bankruptcy, and is still in use today.

Purpose

1 feature selection

2 which classification rule best seperate the classes

#### Definition

To perform LDA we make two assumptions.

• The clusters belonging to all classes each follow a multivariate normal distribution.

where is a class conditional density

• Simplification Assumption: Each cluster has the same covariance matrix equal to the covariance of .

We wish to solve for the decision boundary where the error rates for classifying a point are equal, where one side of the boundary gives a lower error rate for one class and the other side gives a lower error rate for the other class.

So we solve for all the pairwise combinations of classes.

using Bayes' Theorem

by canceling denominators

Since both are equal based on the assumptions specific to LDA.

taking the log of both sides.

by expanding out

after canceling out like terms and factoring.

We can see that this is a linear function in with general form .

Actually, this linear log function shows that the decision boundary between class and class , i.e. , is linear in . Given any pair of classes, decision boundaries are always linear. In dimensions, we separate regions by hyperplanes.

In the special case where the number of samples from each class are equal (), the boundary surface or line lies halfway between and

#### Limitation

• LDA implicitly assumes Gaussian distribution of data.
• LDA implicitly assumes that the mean is the discriminating factor, not variance.
• LDA may overfit the data.

### QDA

The concept uses a same idea as LDA of finding a boundary where the error rate for classification between classes are equal, except the assumption that each cluster has the same variance equal to the mean variance of is removed. We can use a hypothesis test with : =.The best method is likelihood ratio test.

Following along from where QDA diverges from LDA.

by cancellation

by taking the log of both sides

by expanding out

this time there are no cancellations, so we can only factor

The final result is a quadratic equation specifying a curved boundary between classes with general form .

It is quadratic because there is no boundaries.

## Linear and Quadratic Discriminant Analysis cont'd - October 5, 2009

Linear discriminant analysis[3] is a statistical method used to find the linear combination of features which best separate two or more classes of objects or events. It is widely applied in classifying diseases, positioning, product management, and marketing research.

Quadratic Discriminant Analysis[4], on the other had, aims to find the quadratic combination of features. It is more general than Linear discriminant analysis. Unlike LDA however, in QDA there is no assumption that the covariance of each of the classes is identical. When the assumption is true, the best possible test for the hypothesis that a given measurement is from a given class is the likelihood ratio test. Suppose the means of each class are known to be and the covariances . Then the likelihood ratio will be given by

Likelihood ratio =

for some threshold t. After some rearrangement, it can be shown that the resulting separating surface between the classes is a quadratic.

### Summarizing LDA and QDA

We can summarize what we have learned on LDA and QDA so far into the following theorem.

Theorem:

Suppose that , if is Gaussian, the Bayes Classifier rule is

where

• Note The decision boundary between classes and is quadratic in .

If the covariance of the Gaussians are the same, this becomes

(linear)
• Note returns the set of k for which attains its largest value.

### In practice

We need to estimate the prior, so in order to do this, we use the sample estimates of in place of the true values, i.e.

File:estimation.png
Estimation of the probability of belonging to either class k or l

In the case where we have a common covariance matrix, we get the ML estimate to be

This is a Maximum Likelihood estimate.

### Computation

Case 1: (Example) '

This means that the data is distributed symmetrically around the center , i.e. the isocontours are all circles.

We have:

We see that the first term in the above equation, , is zero since is the determine and . The second term contains , which is the squared Euclidean distance between and . Therefore we can find the distance between a point and each center and adjust it with the log of the prior, . The class that has the minimum distance will maximise . According to the theorem, we can then classify the point to a specific class . In addition, implies that our data is spherical.

Case 2: (General Case)

We can decompose this as:

(In general when , is the eigenvectors of and is the eigenvectors of . So if is symmetric, we will have . Here is symmetric)

and the inverse of is

(since is orthonormal)

So from the formula for , the second term is

where we have the Euclidean distance between and .

A transformation of all the data points can be done from to where .

It is now possible to do classification with , treating it as in Case 1 above.

Note that when we have multiple classes, they must all have the same transformation, else, ahead of time we would have to assume a data point belongs to one class or the other. All classes therefore need to have the same shape for classification to be applicable using this method. So this method works for LDA.

If the classes have different shapes, in another word, have different covariance , can we use the same method to transform all data points to ?

The answer is NO. Consider that you have two classes with different shapes, then consider transforming them to the same shape. Given a data point, justify which class this point belongs to. The question is, which transformation can you use? For example, if you use the transformation of class A, then you have assumed that this data point belongs to class A.

Kernel QDA In real life, QDA is always better fit the data then LDA because QDA relaxes does not have the assumption made by LDA that the covariance matrix for each class is identical. However, QDA still assumes that the class conditional distribution is Gaussian which does not be the real case in practical. Another method-kernel QDA does not have the Gaussian distribution assumption and it works better.

### The Number of Parameters in LDA and QDA

Both LDA and QDA require us to estimate parameters. The more estimation we have to do, the less robust our classification algorithm will be.

LDA: Since we just need to compare the differences between one given class and remaining classes, totally, there are differences. For each of them, requires parameters. Therefore, there are parameters.

QDA: For each of the differences, requires parameters. Therefore, there are parameters.

A plot of the number of parameters that must be estimated, in terms of (K-1). The x-axis represents the number of dimensions in the data. As is easy to see, QDA is far less robust than LDA for high-dimensional data sets.

LDA:[5]

QDA:[7]

## LDA and QDA in Matlab - October 7, 2009

We have examined the theory behind Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) above; how do we use these algorithms in practice? Matlab offers us a function called classify that allows us to perform LDA and QDA quickly and easily.

In class, we were shown an example of using LDA and QDA on the 2_3 data that is used in the first assignment. The code below reproduces that example, slightly modified, and explains each step.

>> load 2_3;
>> [U, sample] = princomp(X');
>> sample = sample(:,1:2);

First, we do principal component analysis (PCA) on the 2_3 data to reduce the dimensionality of the original data from 64 dimensions to 2. Doing this makes it much easier to visualize the results of the LDA and QDA algorithms.
>> plot (sample(1:200,1), sample(1:200,2), '.');
>> hold on;
>> plot (sample(201:400,1), sample(201:400,2), 'r.');

Recall that in the 2_3 data, the first 200 elements are images of the number two handwritten and the last 200 elements are images of the number three handwritten. This code sets up a plot of the data such that the points that represent a 2 are blue, while the points that represent a 3 are red.
See title and legend for information on adding the title and legend.
Before using classify we can set up a vector that contains the actual labels for our data, to train the classification algorithm. If we don't know the labels for the data, then the element in the group vector should be an empty string or NaN. (See grouping data for more information.)
>> group = ones(400,1);
>> group(201:400) = 2;

We can now classify our data.
>> [class, error, POSTERIOR, logp, coeff] = classify(sample, sample, group, 'linear');

The full details of this line can be examined in the Matlab help file linked above. What we care about are class, which contains the labels that the algorithm thinks that each data point belongs to, and coeff, which contains information about the line that algorithm created to separate the data into each class.
We can see the efficacy of the algorithm by comparing class to group.
>> sum (class==group)
ans =
369

This compares the value in class to the value in group. The answer of 369 tells us that the algorithm correctly determined the class of the point 369 times, out of a possible 400 data points. This gives us an empirical error rate of 0.0775.
We can see the line produced by LDA using coeff.
>> k = coeff(1,2).const;
>> l = coeff(1,2).linear;
>> f = sprintf('0 = %g+%g*x+%g*y', k, l(1), l(2));
>> ezplot(f, [min(sample(:,1)), max(sample(:,1)), min(sample(:,2)), max(sample(:,2))]);

Those familiar with the programming language C will find the sprintf line refreshingly familiar; those with no exposure to C are directed to Matlab's sprintf page. Essentially, this code sets up the equation of the line in the form 0 = a + bx + cy. We then use the ezplot function to plot the line.
The 2-3 data after LDA is performed. The line shows where the two classes are split.
Let's perform the same steps, except this time using QDA. The main difference with QDA is a slightly different call to classify, and a more complicated procedure to plot the line.
>> [class, error, POSTERIOR, logp, coeff] = classify(sample, sample, group, 'quadratic');
>> sum (class==group)
ans =
371
>> k = coeff(1,2).const;
>> l = coeff(1,2).linear;
>> f = sprintf('0 = %g+%g*x+%g*y+%g*x^2+%g*x.*y+%g*y.^2', k, l, q(1,1), q(1,2)+q(2,1), q(2,2));
>> ezplot(f, [min(sample(:,1)), max(sample(:,1)), min(sample(:,2)), max(sample(:,2))]);

The 2-3 data after QDA is performed. The curved line shows where QDA splits the two classes. Note that it is only correct 2 in 2 more data points compared to LDA; we can see a blue point and a red point that lie on the correct side of the curve that do not lie on the correct side of the line.

classify can also be used with other discriminant analysis algorithms. The steps laid out above would only need to be modified slightly for those algorithms.

Recall: An analysis of the function of princomp in matlab.
In our assignment 1, we have learnt that how to perform Principal Component Analysis using SVD method. In fact, the matlab offers us a function called princomp which can perform PCA conveniently. From the matlab help file on princomp, you can find the details about this function. But here we will analyze the code of the function of princomp() in matlab to find something different when comparing with SVD method. The following is the code of princomp and explanations to some emphasized steps.

   function [pc, score, latent, tsquare] = princomp(x);
%   PRINCOMP Principal Component Analysis (centered and scaled data).
%   [PC, SCORE, LATENT, TSQUARE] = PRINCOMP(X) takes a data matrix X and
%   returns the principal components in PC, the so-called Z-scores in SC
%   ORES, the eigenvalues of the covariance matrix of X in LATENT,
%   and Hotelling's T-squared statistic for each data point in TSQUARE.
%   Reference: J. Edward Jackson, A User's Guide to Principal Components
%   John Wiley & Sons, Inc. 1991 pp. 1-25.
%   B. Jones 3-17-94
%   Copyright 1993-2002 The MathWorks, Inc.
%   $Revision: 2.9$  $Date: 2002/01/17 21:31:45$
[m,n] = size(x);       %  get the lengh of the rows and columns of matrix x.
r = min(m-1,n);        %  max possible rank of X
avg = mean(x);         %  the mean of every column of X
centerx = (x - avg(ones(m,1),:));
%  centers X by subtracting off column means
[U,latent,pc] = svd(centerx./sqrt(m-1),0);
%  "economy size" decomposition
score = centerx*pc;
%  the representation of X in the principal component space
if nargout < 3
return;
end
latent = diag(latent).^2;
if (r   latent = [latent(1:r); zeros(n-r,1)];
score(:,r+1:end) = 0;
end
if nargout < 4
return;
end
tmp = sqrt(diag(1./latent(1:r)))*score(:,1:r)';
tsquare = sum(tmp.*tmp)';


From the above code, we should pay attention to the following aspects when comparing with SVD method:

First, Rows of correspond to observations, columns to variables. When using princomp on 2_3 data in assignment 1, note that we take the transpose of .

 >> load 2_3;
>> [U, score] = princomp(X');


Second, princomp centers X by subtracting off column means.

The third, when , princomp uses as coefficients for principal components, rather than .

The following is an example to perform PCA using princomp and SVD respectively to get the same results.

SVD method
 >> load 2_3
>> mn=mean(X,2);
>> X1=X-repmat(mn,1,400);
>> [s d v]=svd(X1');
>> y=X1'*v;

princomp
 >>[U score]=princomp(X');


Then we can see that y=score, v=U.

useful resouces: LDA and QDA in Matlab[8],[9],[10]

## Trick: Using LDA to do QDA - October 7, 2009

There is a trick that allows us to use the linear discriminant analysis (LDA) algorithm to generate as its output a quadratic function that can be used to classify data. This trick is similar to, but more primitive than, the Kernel trick that will be discussed later in the course.

Essentially, the trick involves adding one or more new features (i.e. new dimensions) that just contain our original data projected to that dimension. We then do LDA on our new higher-dimensional data. The answer provided by LDA can then be collapsed onto a lower dimension, giving us a quadratic answer.

### Motivation

Why would we want to use LDA over QDA? In situations where we have fewer data points, LDA turns out to be more robust.

If we look back at the equations for LDA and QDA, we see that in LDA we must estimate , and . In QDA we must estimate all of those, plus another ; the extra estimations make QDA less robust with fewer data points.

### Theoretically

Suppose we can estimate some vector such that

where is a d-dimensional column vector, and (vector in d dimensions).

We also have a non-linear function that we cannot estimate.

Using our trick, we create two new vectors, and such that:

and

We can then estimate a new function, .

Note that we can do this for any and in any dimension; we could extend a matrix to a quadratic dimension by appending another matrix with the original matrix squared, to a cubic dimension with the original matrix cubed, or even with a different function altogether, such as a dimension.

### By Example

Let's use our trick to do a quadratic analysis of the 2_3 data using LDA.

>> load 2_3;
>> [U, sample] = princomp(X');
>> sample = sample(:,1:2);

We start off the same way, by using PCA to reduce the dimensionality of our data to 2.
>> X_star = zeros(400,4);
>> X_star(:,1:2) = sample(:,:);
>> for i=1:400
for j=1:2
X_star(i,j+2) = X_star(i,j)^2;
end
end

This projects our sample into two more dimensions by squaring our initial two dimensional data set.
>> group = ones(400,1);
>> group(201:400) = 2;
>> [class, error, POSTERIOR, logp, coeff] = classify(X_star, X_star, group, 'linear');
>> sum (class==group)
ans =
375

We can now display our results.
>> k = coeff(1,2).const;
>> l = coeff(1,2).linear;
>> f = sprintf('0 = %g+%g*x+%g*y+%g*(x)^2+%g*(y)^2', k, l(1), l(2),l(3),l(4));
>> ezplot(f,[min(sample(:,1)), max(sample(:,1)), min(sample(:,2)), max(sample(:,2))]);

The plot shows the quadratic decision boundary obtained using LDA in the four-dimensional space on the 2_3.mat data. Counting the blue and red points that are on the wrong side of the decision boundary, we can confirm that we have correctly classified 375 data points.
Not only does LDA give us a better result than it did previously, it actually beats QDA, which only correctly classified 371 data points for this data set. Continuing this procedure by adding another two dimensions with (i.e. we set X_star(i,j+2) = X_star(i,j)^4) we can correctly classify 376 points.

## Introduction to Fisher's Discriminant Analysis - October 7, 2009

Fisher's Discriminant Analysis (FDA), also known as Fisher's Linear Discriminant Analysis (LDA) in some sources, is a classical feature extraction technique. It was originally described in 1936 by Sir Ronald Aylmer Fisher, an English statistician and eugenicist who has been described as one of the founders of modern statistical science. His original paper describing FDA can be found here; a Wikipedia article summarizing the algorithm can be found here.

LDA is for classification and FDA is used for feature extraction.

### Contrasting FDA with PCA

The goal of FDA is in contrast to our other main feature extraction technique, principal component analysis (PCA).

• In PCA, we map data to lower dimensions to maximize the variation in those dimensions.
• In FDA, we map data to lower dimensions to best separate data in different classes.
2 clouds of data, and the lines that might be produced by PCA and FDA.

Because we are concerned with identifying which class data belongs to, FDA is often a better feature extraction algorithm for classification.

Another difference between PCA and FDA is that FDA is a supervised algorithm; that is, we know what class data belongs to, and we exploit that knowledge to find a good projection to lower dimensions.

### Intuitive Description of FDA

An intuitive description of FDA can be given by visualizing two clouds of data, as shown above. Ideally, we would like to collapse all of the data points in each cloud onto one point on some projected line, then make those two points as far apart as possible. In doing so, we make it very easy to tell which class a data point belongs to. In practice, it is not possible to collapse all of the points in a cloud to one point, but we attempt to make all of the points in a cloud close to each other while simultaneously far from the points in the other cloud.

### Example in R

PCA and FDA primary dimension for normal multivariate data, using R.
>> X = matrix(nrow=400,ncol=2)
>> X[1:200,] = mvrnorm(n=200,mu=c(1,1),Sigma=matrix(c(1,1.5,1.5,3),2))
>> X[201:400,] = mvrnorm(n=200,mu=c(5,3),Sigma=matrix(c(1,1.5,1.5,3),2))
>> Y = c(rep("red",200),rep("blue",200))

Create 2 multivariate normal random variables with . Create Y, an index indicating which class they belong to.
>> s <- svd(X,nu=1,nv=1)

Calculate the singular value decomposition of X. The most significant direction is in s$v[,1], and is displayed as a black line. >> s2 <- lda(X,grouping=Y)  The lda function, given the group for each item, uses Fischer's Linear Discriminant Analysis (FLDA) to find the most discriminant direction. This can be found in s2$scaling.

Now that we've calculated the PCA and FLDA decompositions, we create a plot to demonstrate the differences between the two algorithms. FLDA is clearly better suited to discriminating between two classes whereas PCA is primarily good for reducing the number of dimensions when data is high-dimensional.

>> plot(X,col=Y,main="PCA vs. FDA example")

Plot the set of points, according to colours given in Y.
>> slope = s$v[2]/s$v[1]
>> intercept = mean(X[,2])-slope*mean(X[,1])
>> abline(a=intercept,b=slope)

Plot the main PCA direction, drawn through the mean of the dataset. Only the direction is significant.
>> slope2 = s2$scaling[2]/s2$scaling[1]
>> intercept2 = mean(X[,2])-slope2*mean(X[,1])
>> abline(a=intercept2,b=slope2,col="red")

Plot the FLDA direction, again through the mean.
>> legend(-2,7,legend=c("PCA","FDA"),col=c("black","red"),lty=1)

Labeling the lines directly on the graph makes it easier to interpret.

### Distance Metric Learning VS FDA

In many fundamental machine learning problems, the Euclidean distances between data points do not represent the desired topology that we are trying to capture. Kernel methods address this problem by mapping the points into new spaces where Euclidean distances may be more useful. An alternative approach is to construct a Mahalanobis distance (quadratic Gaussian metric) over the input space and use it in place of Euclidean distances. This approach can be equivalently interpreted as a linear transformation of the original inputs,followed by Euclidean distance in the projected space. This approach has attracted a lot of recent interest.

Some of the proposed algorithms are iterative and computationally expensive. In the paper,"Distance Metric Learning VS FDA " written by our instructor, they propose a closed-form solution to one algorithm that previously required expensive semidefinite optimization. They provide a new problem setup in which the algorithm performs better or as well as some standard methods, but without the computational complexity. Furthermore, they show a strong relationship between these methods and the Fisher Discriminant Analysis (FDA). They also extend the approach by kernelizing it, allowing for non-linear transformations of the metric.

## Fisher's Discriminant Analysis (FDA) - October 9, 2009

The goal of FDA is to reduce the dimensionality of data in order to have separable data points in a new space. We can consider two kinds of problems:

• 2-class problem
• multi-class problem
File:graph.jpg
PCA vs FDA

### Two-class problem

In the two-class problem, we have the pre-knowledge that data points belong to two classes. Intuitively speaking points of each class form a cloud around the mean of the class, with each class having possibly different size. To be able to separate the two classes we must determine the class whose mean is closest to a given point while also accounting for the different size of each class, which is represented by the covariance of each class.

Assume and , represent the mean and covariance of the 1st class, and and represent the mean and covariance of the 2nd class. We have to find a transformation which satisfies the following goals:

1.To make the means of these two classes as far apart as possible

In other words, the goal is to maximize the distance after projection between class 1 and class 2. This can be done by maximizing the distance between the means of the classes after projection. When projecting the data points to a one-dimensional space, all points will be projected to a single line; the line we seek is the one with the direction that achieves maximum separation of classes upon projetion. If the original points are and the projected points are then the mean of the projected points will be and for class 1 and class 2 respectively. The goal now becomes to maximize the Euclidean distance between projected means, . The steps of this maximization are given below.

2.We want to collapse all data points of each class to a single point, i.e., minimize the covariance within classes

Notice that the variance of the projected classes 1 and 2 are given by and . The second goal is to minimize the sum of these two covariances.

As is demonstrated below, both of these goals can be accomplished simultaneously.

Original points are

Projected points are with is a sclar

#### Between class covariance

In this particular case, we want to project all the data points in one dimensional space.

We want to maximize the Euclidean distance between projected means, which is

which is scalar

The quantity is called between class covariance or .

The goal is to maximize :

#### Within class covariance

Covariance of class 1 is Covariance of class 2 is So covariance of projected points will be and

If we sum this two quantities we have

The quantity is called within class covariance or

The goal is to minimize

#### Objective Function

Instead of maximizing and minimizing we can define the following objective function:

This maximization problem is equivalent to subject to constraint , where is no upper bound and is no lower bound.

We can use the Lagrange multiplier method to solve it:

where is the weight

With we get:

Note that is sum of two positive matrices and so it has an inverse.

Here is the eigenvector of corresponding to the largest eigenvalue .

In facts, this expression can be simplified even more.

with

The quantity and are scalars.
So we can say the quantity is proportional to

#### FDA vs. PCA Example in Matlab

We can compare PCA and FDA through the figure produced by matlab.

The following are the code to produce the figure step by step and the explanation for steps.

 >>X1=mvnrnd([1,1],[1 1.5;1.5 3],300);
>>X2=mvnrnd([5,3],[1 1.5;1.5 3],300);
>>X=[X1;X2];

Create two multivariate normal random variables with .
 >>plot(X(1:300,1),X(1:300,2),'.');
>>hold on
>>p1=plot(X(301:600,1),X(301:600,2),'r.');

Plot the the data of the two classes respectively.
 >>[U Y]=princomp(X);
>>plot([0 U(1,1)*10],[0 U(2,1)*10]);

Using PCA to find the principal component and plot it.
 >>sw=2*[1 1.5;1.5 3];
>>sb=([1; 1]-[5 ;3])*([1; 1]-[5; 3])';
>>g =inv(sw)*sb;
>>[v w]=eigs(g);
>>plot([v(1,1)*5 0],[v(2,1)*5 0],'r')

Using FDA to find the principal component and plot it.

Now we can compare them through the figure.

PCA and FDA primary dimension for normal multivariate data, using matlab

From the graph: when we see using PCA, we have a huge overlap for two classes, so PCA is not good. However, there is no overlap for the two classes and they are seperated pretty. Thus, FDA is better than PCA here.

#### Practical example of 2_3

In this matlab example we explore FDA using our familiar data set 2_3 which consists of 200 handwritten "2" and 200 handwritten "3".

X is a matrix of size 64*400 and each column represents an 8*8 image of "2" or "3". Here X1 gets all "2" and X2 gets all "3".

>>load 2_3
>>X1 = X(:, 1:200);
>>X2 = X(:, 201:400);


Next we calculate within class covariance and between class covariance as before.

>>mu1 = mean(X1, 2);
>>mu2 = mean(X2, 2);
>>sb = (mu1 - mu2) * (mu1 - mu2)';
>>sw = cov(X1') + cov(X2');


We use the first two eigenvectors to project the dato in a two-dimensional space.

>>[v d] = eigs( inv(sw) * sb );
>>w = v(:, 1:2);
>>X_hat = w'*X;


Finally we plot the data and visualize the effect of FDA.

>> scatter(ones(1,200),X_hat(1:200))
>> hold on
>> scatter(ones(1,200),X_hat(201:400),'r')

File:fda2-3.jpg
FDA projection of data 2_3, using Matlab.

Map the data into a linear line, and the two classes are seperated perfectly here.

#### An extension of Fisher's discriminant analysis for stochastic processes

A general notion of Fisher's linear discriminant analysis can extend the classical multivariate concept to situations that allow for function-valued random elements. The development uses a bijective mapping that connects a second order process to the reproducing kernel Hilbert space generated by its within class covariance kernel. This approach provides a seamless transition between Fisher's original development and infinite dimensional settings that lends itself well to computation via smoothing and regularization.

## FDA for Multi-class Problems - October 14, 2009

### FDA method for Multi-class Problems

For the -class problem, we need to find a projection from -dimensional space to a -dimensional space.

(It is more reasonable to have at least 2 directions)

Basically, the within class covariance matrix is easily to obtain:

where and .

However, the between class covariance matrix is not easy to obtain. One of the simplifications is that we may assume that the total covariance of the data is constant, since is easy to compute, we can get using the following relationship:

Actually, there is another generation for . Denote a total mean vector by

Thus the total covariance matrix is

Thus we obtain

Since the total covariance is the sum of the within class covariance and the between class covariance , we can denote the second term as the general between class covariance matrix , thus we obtain

Therefore,

Recall that in the two class case problem, we have

From the general form,

Apparently, they are very similar.

Now, we are trying to find the optimal transformation. Basically, we have

where is a vector, is a transformation matrix, i.e. , and is a column vector.

Thus we obtain

Similarly, we obtain

Now, we use the determinant of the matrix, i.e. the product of the eigenvalues of the matrix, as our measure.

The solution for this question is that the columns of the transformation matrix are exactly the eigenvectors that correspond to largest eigenvalues with respect to

Also, note that we can use

as our measure.

Recall that

Thus we obtain that

Similarly, we can get . Thus we have following criterion function

Similar to the two class case problem, we have:

max subject to

To solve this optimization problem a Lagrange multiplier , which actually is a diagonal matrix, is introduced:

Differentiating with respect to we obtain:

Note that the and are both symmetric matrices, thus set the first derivative to zero, we obtain:

Thus,

where

and .

As a matter of fact, must have nonzero eigenvalues, because .

Therefore, the solution for this question is as same as the previous case. The columns of the transformation matrix are exactly the eigenvectors that correspond to largest eigenvalues with respect to

### Generalization of Fisher's Linear Discriminant

Fisher's linear discriminant (Fisher, 1936) is very popular among users of discriminant analysis.Some of the reasons for this are its simplicity and unnecessity of strict assumptions. However it has optimality properties only if the underlying distributions of the groups are multivariate normal. It is also easy to verify that the discriminant rule obtained can be very harmed by only a small number of outlying observations. Outliers are very hard to detect in multivariate data sets and even when they are detected simply discarding them is not the most effcient way of handling the situation. Therefore the need for robust procedures that can accommodate the outliers and are not strongly affected by them. Then, a generalization of Fisher's linear discriminant algorithm [[12]]is developed to lead easily to a very robust procedure.

## Linear Regression Models - October 14, 2009

Regression analysis is a general statistical technique for modelling and analyzing how a dependent variable changes according to changes in independent variables. In classification, we are interested in how a label, , changes according to changes in .

We will start by considering a very simple regression model, the linear regression model.

General information on linear regression can be found at the University of South Florida and this MIT lecture.

For the purpose of classification, the linear regression model assumes that the regression function is linear in the inputs .

The simple linear regression model has the general form:

where is a vector and is a vector .

Given input data and our goal is to find and such that the linear model fits the data while minimizing sum of squared errors using the Least Squares method.

Note that vectors could be numerical inputs, transformations of the original data, i.e. or , or basis expansions, i.e. or .

Denote as a matrix with each row an input vector (with 1 in the first position), and as a vector of outputs. We then try to minimize the residual sum-of-squares

This is a quadratic function in the parameters. Differentiating with respect to we obtain

Set the first derivative to zero

we obtain the solution

Thus the fitted values at the inputs are

where is called the hat matrix.

• Note For classification purposes, this is not a correct model. Recall the following application of Bayes classifier:

It is clear that to make sense mathematically, must be a value between 0 and 1. If this is estimated with the regression function and is learned as above, then there is nothing that would restrict to taking values between 0 and 1. This is more direct approach to classification since it do not need to estimate and . This model does not classify Y between 0 and 1, so it is not good and sometimes it can lead to a decent classifier.

#### A linear regression example in Matlab

We can see how linear regression works through the following example in Matlab. The following is the code and the explanation for each step.

Again, we use the data in 2_3.m.

 >>load 2_3;
>>[U, sample] = princomp(X');
>>sample = sample(:,1:2);


We carry out Principal Component Analysis (PCA) to reduce the dimensionality from 64 to 2.

 >>y = zeros(400,1);
>>y(201:400) = 1;


We let y represent the set of labels coded as 0 and 1.

 >>x=[sample;ones(1,400)];


Construct x by adding a row of vector 1 to data.

 >>b=inv(x*x')*x*y;


Calculate b, which represents in the linear regression model.

 >>x1=x';
>>for i=1:400
if x1(i,:)*b>0.5
plot(x1(i,1),x1(i,2),'.')
hold on
elseif x1(i,:)*b < 0.5
plot(x1(i,1),x1(i,2),'r.')
end
end


Plot the fitted y values.

File:linearregression.png
the figure shows that the classification of the data points in 2_3.m by the linear regression model

Linear regression model is almost the easiest and most popular way to analyze the relationship of different data sets. However, it has some disadvantages as well as its advantages. We should be clear about them before we apply the model.

Advantages: Linear least squares regression has earned its place as the primary tool for process modeling because of its effectiveness and completeness. Though there are types of data that are better described by functions that are nonlinear in the parameters, many processes in science and engineering are well-described by linear models. This is because either the processes are inherently linear or because, over short ranges, any process can be well-approximated by a linear model. The estimates of the unknown parameters obtained from linear least squares regression are the optimal estimates from a broad class of possible parameter estimates under the usual assumptions used for process modeling. Practically speaking, linear least squares regression makes very efficient use of the data. Good results can be obtained with relatively small data sets. Finally, the theory associated with linear regression is well-understood and allows for construction of different types of easily-interpretable statistical intervals for predictions, calibrations, and optimizations. These statistical intervals can then be used to give clear answers to scientific and engineering questions.

Disadvantages: The main disadvantages of linear least squares are limitations in the shapes that linear models can assume over long ranges, possibly poor extrapolation properties, and sensitivity to outliers. Linear models with nonlinear terms in the predictor variables curve relatively slowly, so for inherently nonlinear processes it becomes increasingly difficult to find a linear model that fits the data well as the range of the data increases. As the explanatory variables become extreme, the output of the linear model will also always more extreme. This means that linear models may not be effective for extrapolating the results of a process for which data cannot be collected in the region of interest. Of course extrapolation is potentially dangerous regardless of the model type. Finally, while the method of least squares often gives optimal estimates of the unknown parameters, it is very sensitive to the presence of unusual data points in the data used to fit a model. One or two outliers can sometimes seriously skew the results of a least squares analysis. This makes model validation, especially with respect to outliers, critical to obtaining sound answers to the questions motivating the construction of the model.

## Logistic Regression- October 16, 2009

The logistic regression model arises from the desire to model the posterior probabilities of the classes via linear functions in , while at the same time ensuring that they sum to one and remain in [0,1].Logistic regression models are usually fit by maximum likelihood, using the conditional likelihood ,using . Since completely specifies the conditional distribution, the multinomial distribution is appropriate. This model is widely used in biostatistical applications for two classes. For instance: people survive or die, have a disease or not, have a risk factor or not.

### logistic function

A logistic function or logistic curve is the most common sigmoid curve.

1.

2.

3.

4.

5. The logistic curve shows early exponential growth for negative t, which slows to linear growth of slope 1/4 near t = 0, then approaches y = 1 with an exponentially decaying gap.

### Intuition behind Logistic Regression

Recall that, for classification purposes, the linear regression model presented in the above section is not correct because it does not force to be between 0 and 1 and sum to 1. Consider the following log odds model (for two classes):

Calculating leads us to the logistic regression model, which as opposed to the linear regression model, allows the modelling of the posterior probabilities of the classes through linear methods and at the same time ensures that they sum to one and are between 0 and 1. It is a type of Generalized Linear Model (GLM).

### The Logistic Regression Model

The logistic regression model for the two class case is defined as

Class 1

Then we have that

Class 0

### Fitting a Logistic Regression

Logistic regression tries to fit a distribution. The fitting of logistic regression models is usually accomplished by maximum likelihood, using Pr(Y|X). The maximum likelihood of maximizes the probability of obtaining the data from the known distribution. Combining and as follows, we can consider the two classes at the same time:

Assuming the data is drawn independently, the likelihood function is

Since it is more convenient to work with the log-likelihood function, take the log of both sides, we get

So,

To maximize the log-likelihood, set its derivative to 0.

There are n+1 nonlinear equations in . The first column is vector 1, then i.e. the expected number of class ones matches the observed number.

To solve this equation, the Newton-Raphson algorithm is used which requires the second derivative in addition to the first derivative. This is demonstrated in the next section.

Logistic regression has several advantages over discriminant analysis:

• it is more robust: the independent variables don't have to be normally distributed, or have equal variance in each group
• It does not assume a linear relationship between the IV and DV
• It may handle nonlinear effects
• You can add explicit interaction and power terms
• The DV need not be normally distributed.
• There is no homogeneity of variance assumption.
• Normally distributed error terms are not assumed.
• It does not require that the independents be interval.
• It does not require that the independents be unbounded.

With all this flexibility, you might wonder why anyone would ever use discriminant analysis or any other method of analysis. Unfortunately, the advantages of logistic regression come at a cost: it requires much more data to achieve stable, meaningful results. With standard regression, and DA, typically 20 data points per predictor is considered the lower bound. For logistic regression, at least 50 data points per predictor is necessary to achieve stable results.

some resources: [15], [16]

#### Extension

• When we are dealing with a problem with more than two classes, we need to generalize our logistic regression to a Multinomial Logit model.
• Limitations of Logistic Regression:
1. We know that there is no assumptions are made about the distributions of the features of the data (i.e. the explanatory variables). However, the features should not be highly correlated with one another because this could cause problems with estimation.
2. Large number of data points (i.e.the sample sizes) are required for logistic regression to provide sufficient numbers in both classes. The more number of features/dimensions of the data, the larger the sample size required.

## Logistic Regression(2) - October 19, 2009

### Logistic Regression Model

Recall that in the last lecture, we learned the logistic regression model.

### Find

Criteria: find a that maximizes the conditional likelihood of Y given X using the training data.

From above, we have the first derivative of the log-likelihood:

Newton-Raphson algorithm:
If we want to find such that

If we want to maximize or minimize , then solve for

The Newton-Raphson algorithm requires the second-derivative or Hessian matrix.

(note: you can check it here, it's a very useful website including a Matrix Reference Manual that you can find information about linear algebra and the properties of real and complex matrices.)

(by cancellation)
(since and )

The same second derivative can be achieved if we reduce the occurrences of beta to 1 by the identity

And solving

Starting with , the Newton-Raphson update is

where the derivatives are evaluated at

The iteration will terminate when is very close to .

The iteration can be described in matrix form.

• Let be the column vector of . ()
• Let be the input matrix.
• Let be the vector with th element .
• Let be an diagonal matrix with th element

then

The Newton-Raphson step is

This equation is sufficient for computation of the logistic regression model. However, we can simplify further to uncover an interesting feature of this equation.

where

This is a adjusted response and it is solved repeatedly when , , and changes. This algorithm is called iteratively reweighted least squares because it solves the weighted least squares problem repeatedly.

Recall that linear regression by least square finds the following minimum:

we have

Similarly, we can say that is the solution of a weighted least square problem:

#### WLS

Actually, the weighted least squares estimator minimizes the weighted sum of squared errors where . Hence the WLS estimator is given by

A weighted linear regression of the iteratively computed response

Therefore, we obtain

note:Here we obtain , which is a vector, because we construct the model like . If we construct the model like , then similar to linear regression, will be a vector.

Choosing seems to be a suitable starting value for the Newton-Raphson iteration procedure in this case. However, this does not guarantee convergence. The procedure will usually converge since the log-likelihood function is concave(or convex), but overshooting can occur. In the rare cases that the log-likelihood decreases, cut step

size by half, then we can always have convergence. In the case that it does not, we can just prove the local convergence of the method, which means the iteration would converge only if the initial point is closed enough to the exact solution. However, in practice, choosing an appropriate initial value is really trivial, namely, it is not often to find a initial too far from the exact solution to make the iteration invalid. <ref>C. T. Kelley, Iterative Methods for Linear and Nonlinear Equations, chapter 5 </ref> Besides, step-size halving will solve this problem. <ref>H. Trevor, R. Tibshirani, J. Friedman, The Elements of Statistical Learning (Springer 2009),121.</ref>

For multiclass cases: the Newton algorithm can also be expressed as an iteratively reweighted least squares algorithm, but with a vector of response and a nondiagonal weight matrix per observation. And we can use coordinate-descent method to maximize the log-likelihood efficiently.

#### Pseudo Code

1. Set , the label associated with each observation .
2. Compute according to the equation for all .
3. Compute the diagonal matrix by setting to for all .
4. .
5. .
6. If the new value is sufficiently close to the old value, stop; otherwise go back to step 3.

### Comparison with Linear Regression

• Similarities
1. They are both to attempt to estimate (For logistic regression, we just mentioned about the case that or now).
2. They are both have linear boundaris.
note:For linear regression, we assume the model is linear. The boundary is (linear)
For logistic regression, the boundary is (linear)
• Differences
1. Linear regression: is linear function of , is not guaranteed to fall between 0 and 1 and to sum up to 1.
2. Logistic regression: is a nonlinear function of , and it is guaranteed to range from 0 to 1 and to sum up to 1.

### Comparison with LDA

1. The linear logistic model only consider the conditional distribution . No assumption is made about .
2. The LDA model specifies the joint distribution of and .
3. Logistic regression maximizes the conditional likelihood of given :
4. LDA maximizes the joint likelihood of and : .
5. If is d-dimensional,the number of adjustable parameter in logistic regression is . The number of parameters grows linearly w.r.t dimension.
6. If is d-dimensional,the number of adjustable parameter in LDA is . The number of parameters grows quardratically w.r.t dimension.
7. LDA estimate parameters more efficiently by using more information about data and samples without class labels can be also used in LDA.
8. As logistic regression relies on fewer assumptions, it seems to be more robust.
9. In practice, Logistic regression and LDA often give the similar results.

#### By example

Now we compare LDA and Logistic regression by an example. Again, we use them on the 2_3 data.

 >>load 2_3;
>>[U, sample] = princomp(X');
>>sample = sample(:,1:2);
>>plot (sample(1:200,1), sample(1:200,2), '.');
>>hold on;
>>plot (sample(201:400,1), sample(201:400,2), 'r.');

First, we do PCA on the data and plot the data points that represent 2 or 3 in different colors. See the previous example for more details.
 >>group = ones(400,1);
>>group(201:400) = 2;

Group the data points.
 >>[B,dev,stats] = mnrfit(sample,group);
>>x=[ones(1,400); sample'];

Now we use mnrfit to use logistic regression to classfy the data. This function can return B which is a matrix of estimates, where each column corresponds to the estimated intercept term and predictor coefficients. In this case, B is a matrix.
 >> B
B =0.1861
-5.5917
-3.0547

This is our . So the posterior probabilities are:
.
The classification rule is:
, if
, if
 >>f = sprintf('0 = %g+%g*x+%g*y', B(1), B(2), B(3));
>>ezplot(f,[min(sample(:,1)), max(sample(:,1)), min(sample(:,2)), max(sample(:,2))])

Plot the decision boundary by logistic regression.
This is a decision boundary by logistic regression.The line shows how the two classes split.
 >>[class, error, POSTERIOR, logp, coeff] = classify(sample, sample, group, 'linear');
>>k = coeff(1,2).const;
>>l = coeff(1,2).linear;
>>f = sprintf('0 = %g+%g*x+%g*y', k, l(1), l(2));
>>h=ezplot(f, [min(sample(:,1)), max(sample(:,1)), min(sample(:,2)), max(sample(:,2))]);

Plot the decision boundary by LDA. See the previous example for more information about LDA in matlab.
From this figure, we can see that the results of Logistic Regression and LDA are very similar.

## 2009.10.21

### Multi-Class Logistic Regression

Our earlier goal with logistic regression was to model the posteriors for a 2 class classification problem with a linear function bounded by the interval [0,1]. In that case our model was,

We can extend this idea to the more general case with K-classes. This model is specified with K - 1 terms where the Kth class in the denominator can be chosen arbitrarily.

The posteriors for each class are given by,

Seeing these equations as a weighted least squares problem makes them easier to derivate.

Note that we still retain the property that the sum of the posteriors is 1. In general the posteriors are no longer complements of each other as in true in the 2 class problem where we could express . Fitting a Logistic model for the K>2 class problem isn't as 'nice' as in the 2 class problem since we don't have the same simplification.

### Multi-class kernel logistic regression

Logistic regression (LR) and kernel logistic regression (KLR) have already proven their value in the statistical and machine learning community. Opposed to an empirically risk minimization approach such as employed by Support Vector Machines (SVMs), LR and KLR yield probabilistic outcomes based on a maximum likelihood argument. It seems that this framework provides a natural extension to multiclass classification tasks, which must be contrasted to the commonly used coding approach.

A paper uses the LS-SVM framework to solve the KLR problem. In that paper,they see that the minimization of the negative penalized log likelihood criterium is equivalent to solving in each iteration a weighted version of least squares support vector machines (wLS-SVMs). In the derivation it turns out that the global regularization term is reflected as usual in each step. In a similar iterative weighting of wLS-SVMs, with different weighting factors is reported to converge to an SVM solution.

Unlike SVMs, KLR by its nature is not sparse and needs all training samples in its final model. Different adaptations to the original algorithm were proposed to obtain sparseness. The second one uses a sequential minimization optimization (SMO) approach and in the last case, the binary KLR problem is reformulated into a geometric programming system which can be efficiently solved by an interior-point algorithm. In the LS-SVM framework, fixed-size LS-SVM has shown its value on large data sets. It approximates the feature map using a spectral decomposition, which leads to a sparse representation of the model when estimating in the primal space. They use this technique as a practical implementation of KLR with estimation in the primal space. To reduce the size of the Hessian, an alternating descent version of Newton’s method is used which has the extra advantage that it can be easily used in a distributed computing environment. The proposed algorithm is compared to existing algorithms using small size to large scale benchmark data sets.

### Perceptron (Foundation of Neural Network)

#### Separating Hyperplane Classifiers

Separating hyperplane trys to separate the data using linear decision boundaries. When the classes overlap, it can be generalized to support vector machine, which constructs nonlinear boundaries by constructing a linear boundary in an enlarged and transformed feature space.

#### Perceptron

Figure 1: Diagram of a linear perceptron.

Recall the use of Least Squares regression as a classifier, shown to be identical to LDA. To classify points with least squares we take the sign of a linear combination of data points and assign a label equivalent to +1 or -1.

Least Squares returns the sign of a linear combination of data points as the class label

In the 1950s Frank Rosenblatt developed an iterative linear classifier while at Cornell University known as the Perceptron. The concept of a perceptron was fundamental to the later development of the Artificial Neural Network models. The perceptron is a simple type of neural network which models the electrical signals of biological neurons. In fact, it was the first neural network to be algorithmically described. <ref>Simon S. Haykin, Neural Networks and Learning Machines, (Prentice Hall 2008). </ref>

As in other linear classification methods like Least Squares, Rosenblatt's classifier determines a hyperplane for the decision boundary. Linear methods all determine slightly different decision boundaries, Rosenblatt's algorithm seeks to minimize the distance between the decision boundary and the misclassified points <ref>H. Trevor, R. Tibshirani, J. Friedman, The Elements of Statistical Learning (Springer 2009),156.</ref>.

Particular to the iterative nature of the solution, the problem has no global mean (not convex). It does not converge to give a unique hyperplane, and the solutions depend on the size of the gap between classes. If the classes are separable then the algorithm is shown to converge to a local mean. The proof of this convergence is known as the perceptron convergence theorem. However, for overlapping classes convergence to a local mean cannot be guaranteed.

If we find a hyperplane that is not unique between 2 classes, there will be infinitely many solutions obtained from the perceptron algorithm.

As seen in Figure 1, after training, the perceptron determines the label of the data by computing the sign of a linear combination of components.

#### A Perceptron Example

The perceptron network can figure out the decision boundray line even if we dont know how to draw the line. We just have to give it some examples first. For example:

1,0,0 +1
1,0,1 +1
1,1,0 +1
0,0,1 -1
0,1,1 -1
1,1,1 -1

Then the perceptron starts out not knowing how to separate the answers so it guesses. For example we input 1,0,0 and it guesses -1. But the right answer is +1. So the perceptron adjusts its line and we try the next example. Eventually the perceptron will have all the answers right.

y=[1;1;1;-1;-1;-1];
x=[1,0,0;1,0,1;,1,1,0;0,0,1;0,1,1;1,1,1]';
b_0=0;
b=[1;1;1];
rho=.5;
for j=1:100;
changed=0;
for i=1:6
d=(b'*x(:,i)+b_0)*y(i);
if d<0
b=b+rho*x(:,i)*y(i);
b_0=b_0+rho*y(i);
changed=1;
end
end
if changed==0
break;
end
end


## The Perceptron (Lecture October 23, 2009)

File:misclass.png
Figure 2: This figure shows a misclassified point and the movement of the decision boundary.

A Perceptron can be modeled as shown in Figure 1 of the previous lecture where is the model intercept and represent the feature data, is a linear combination of some weights of these inputs, and , where indicates the sign of the expression and returns the label of the data point.

The Perceptron algorithm seeks a linear boundary between two classes. A linear decision boundary can be represented by The algorithm begins with an arbitrary hyperplane (initial guess). Its goal is to minimize the distance between the decision boundary and the misclassified data points. This is illustrated in Figure 2. It attempts to find the optimal by iteratively adjusting the decision boundary until all points are on the correct side of the boundary. It terminates when there are no misclassified points.

File:distance2.jpg
Figure 3: This figure illustrates the derivation of the distance between the decision boundary and misclassified points

Derivation: The distance between the decision boundary and misclassified points.

If and both lie on the decision boundary then,

denotes an inner product. Since the inner product is 0 and is a vector lying on the decision boundary, is orthogonal to the decision boundary.

Let be a misclassified point.

Then the projection of the vector on the direction that is orthogonal to the decision boundary is . Now, if is also on the decision boundary, then and so . Looking at Figure 3, it can be seen that the distance between and the decision boundary is the absolute value of

Consider

Notice that if is classified correctly then this product is positive. This is because if it is classified correctly, then either both ( and are positive or they are both negative. However, if is classified incorrectly then one of and is positive and the other is negative. The result is that the above product is negative for a point that is misclassified.

For the algorithm, we need only consider the distance between the misclassified points and the decision boundary.

Consider

which is a summation of positive numbers and where is the set of all misclassified points.
The goal now becomes to

This can be done using a gradient descent approach, which is a numerical method that takes one predetermined step in the direction of the gradient, getting closer to a minimum at each step, until the gradient is zero. A problem with this algorithm is the possibility of getting stuck in a local minimum. To continue, the following derivatives are needed:

Then the gradient descent type algorithm (Perceptron Algorithm) is

where is the magnitude of each step called the "learning rate" or the "convergence rate". The algorithm continues until or until it has iterated a specified number of times. If the algorithm converges, it has found a linear classifier, ie., there are no misclassified points.

#### Problems with the Algorithm and Issues Affecting Convergence

1. The output values of a perceptron can take on only one of two values (+1 or -1); that is, it only can be used for two-class classification.
2. If the data is not separable, then the Perceptron algorithm will not converge since it cannot find a linear classifier that classifies all of the points correctly.
3. Convergence rates depend on the size of the gap between classes. If the gap is large, then the algorithm converges quickly. However, if the gap is small, the algorithm converges slowly. This problem can be eliminated by using basis expansions technique. To be specific, we try to find a hyperplane not in the original space, but in the enlarged space obtained by using some basis functions.
4. If the classes are separable, there exists infinitely many solutions to Perceptron, all of which are hyperplanes.
5. The speed of convergence of the algorithm is also dependent on the value of , the learning rate. A larger value of could yield quicker convergence, but if this value is too large, it may also result in “skipping over” the minimum that the algorithm is trying to find and possibly oscillating forever between the last two points, before and after the min.
6. A perfect separation is not always available even desirable. If observations comes from different classes sharing the same imput, the classification model seems to be overfitting and will generally have poor predictive performance.
7. The perceptron convergence theorem states that if there exists an exact solution (in other words, if the training data set is linearly separable), then the perceptron learning algorithm is guaranteed to ﬁnd an exact solution in a ﬁnite number of steps. Proofs of this theorem can be found for example in Rosenblatt (1962), Block (1962), Nilsson (1965), Minsky and Papert (1969), Hertz et al. (1991), and Bishop (1995a). Note, however, that the number of steps required to achieve convergence could still be substantial, and in practice, until convergence is achieved we will not be able to distinguish between a nonseparable problem and one that is simply slow to converge<ref>

Pattern Recognition and Machine Learning,Christopher M. Bishop,194

</ref>.

#### Comment on gradient descent algorithm

Consider yourself on the peak and you want to get to the land as fast as possible. So which direction should you step? Intuitively it should be the direction in which the height decreases fastest, which is given by the gradient. However, if the mountain has a saddle shape and you initially stand in the middle, then you will finally arrive at the saddle point (local minimum) and get stuck there.

In addition, note that in the final form of our gradient descent algorithm, we get rid of the summation over (all data points). Actually, this is an alternative of the original gradient descent algorithm (sometimes called batch gradient descent) known as Stochastic gradient descent, where we approximate the true gradient by only evaluating on a single training example. This means that gets improved by computation of only one sample. When there is a large data set, say, population database, it's very time-consuming to do summation over millions of samples. By Stochastic gradient descent, we can treat the problem sample by sample and still get decent result in practice.

## Neural Networks (NN) - October 28, 2009

### Introduction

A neural network is a two stage regression for classification model. It can be represented by a network diagram. It is a parallel, distributed information processing structure consisting of processing elements interconnected together with signal channels called connections. Each processing element has a single output connection with branches that "fan out" onto as many connections as desired, each carrying the same signal - the processing element output signal.

<ref> Haykin, Simon (2009). Neural Networks and Learning Machines. Pearson Education, Inc. </ref> A neural network resembles the brain in two respects:

1. Knowledge is acquired by the network from its environment through a learning process.

2. Interneuron connection strengths, known as synaptic weights, are used to store the acquired knowledge.

<ref> Theory of the Backpropagation Neural Network, R. Necht-Nielsen </ref> It is a multistage regression or classification model represented by a network. Figure 1 is an example of a typical neural network but it can have many different forms. It network applies both to regression or classification.

Figure 1: General Structure of a Neural Network.
• A regression problem typically has only one unit in the output layer, but these networks can handle multiple quantitative responses in a seamless fashion.
• In a k-class classification problem, there are usually k target measurements units in the output layer that each represent the probability of class k and each is coded (0,1).

### Activation Function

Activation Function is a term that is frequently used in classification by NN.

In perceptron, we have a "sign" function that takes the sign of a weighted sum of input features.

File:signfuncperceptron.png
The sign function is of the form File:signfunc1.png ; it is not continuous at 0 and we cannot take derivative of it. Thus, we replace it by a smooth function of the form File:signfunc2.png and call it the activation function.
The choice of this function is determined by the properties of the data and the assumed distribution of target variables, but for multiple binary classification problems the logistic function, also known as inverse-logit (sigmoid function), is often used:

Figure: Graph of

There are some important properties for the activation function.

1. Activation function is nonlinear. It can be shown that if the activation function of the hidden units is linear, a three-layer neural network is equivalent to a two layer one.
2. Activation function saturate, which means there are maximum and minimum output value. This property ensures that the weights are bounded and therefore the searching time is limited.
3. Activation function is continuous and smooth.
4. Activation function is monotonic. This property is not necessary, since we know that RBF networks is also a kind of power model.

Note: A key difference between a perceptron and a neural network is that a neural network uses continuous nonlinearities in the units, for the purpose of differentiation, whereas the perceptron often uses a non-differentiable activation function. The neural network function is differentiable with respect to the network parameters so that a gradient descent method can be used in training. Moreover, a perceptron is a linear classifier, whereas a neural network,by introducting the nonlinear transformation ,it greatly enlarges the class of linear models and by combining layers of perceptrons, neural network is able to classify non-linear problems through proper training.

By assigning some weights to the connectors in the neural network (see diagram above) we weigh the input that comes into the perceptron, to get an output that in turn acts as an input to the next layer of perceptrons, and so on for each layer(There are no cross-connections between units in the same layer and no backward connections from layers downstream. Typically, units in layer k provide input only to units in layer k +1). This type of neural network is called Feed-Forward Neural Network. Applications to Feed-Forward Neural Networks include data reduction, speech recognition, sensor signal processing, and ECG abnormality detection, to name a few. <ref>J. Annema, Feed-Forward Neural Networks, (Springer 1995), pp. 9 </ref>

### Back-propagation

Introduction:

For a while, the Neural Network model was just an idea, since there were no algorithms for training the model until 1986, when Geoffrey Hinton <ref> http://www.cs.toronto.edu/~hinton/backprop.html </ref> devised an algorithm called back-propagation [18]. After that, a number of other training algorithms and various configurations of neural networks were implemented. Work procedure: Each neuron receives a signal from previous neurons, and each of their signals is multiplied by a different weight value. Sum up these weighted inputs and passed through the activation function which scales the output to a fixed range of values. The output of the limiter is then broadcast to all of the neurons in the next layer i.e. we apply the input values to the inputs of the first layer, allow the signals to propagate through the network, and read the output values.

When we were talking about perceptrons, we applied a gradient descent algorithm for optimizing weights. Back-propagation uses this idea of gradient descent to train a neural network based on the chain rule in calculus.

Assume that the last output layer has only one unit, so we are working with a regression problem. Later we will see how this can be extended to more output layers and thus turn into a classificaiton problem.

For simplicity, there is only 1 unit at the end and assume for the moment we are doing regression.

Note that we make a distinction between the input weights and hidden weights .

Within each unit we have a function that takes input (linear sum of previous level) and outputs . The are the inputs into the final output of the model

We can find the error of the neural network output by evaluating the squared difference between the true classification and the resulting classification output

First find derivative of the model error with respect to output weights

Now we need to find the derivative of the model error with respect to hidden weights
Consider the following diagram that opens up the hidden layers of the neural network:

i j are reversed!

Notice that the weighted sum on the output of the perceptrons at layer are the inputs into the perceptrons at layer and so on for all hidden layers.

So, using the chain rule

Note that a change in causes changes in all in the next layer on which the error is based, so we need to sum over i in the chain:
Using the activation function

So

We can propagate the error calculated in the output back through the previous layers and adjust weights to minimize error.

Back-Propagation neural network is a good method for following situations:

• The problem is very complex and the number of input or output data points is very large, and have no idea to relate the input to the output.
• The solution varies over time within the bounds of the given input and output data, or the output is not easy to measure.

## Neural Networks (NN) - October 30, 2009

### Back-propagation

The idea is that we first feed an input (we can normalize the data before feeding) from the training set to the Neural Network, then find the error rate at the output and then we propagate the error to previous layers and for each edge of weight we find . Having the error rates at hand we adjust the weight of each edge by taking steps proportional to the negative of the gradient to decrease the error at output. The next step is to apply the next input from the training set and go through the described adjustment procedure. The overview of Back-propagation algorithm:

1. Feed a point in the training set to the network, and find the output of all the nodes.
2. Evaluate for all output units, where is the expected output and is the real output.
3. By propagating to the previous layers evaluate all s for hidden units: where is associated to the previous layer.
4. Using find all the derivatives.
5. Adjust each weight by taking steps proportional to the negative of the gradient:
6. Feed the next point in the training set and repeat the above steps.

• Reduce the cost of computing derivatives by a factor of the number of derivatives to be calculated when minimizing the error.
• Allow higher degrees of nonlinearity and precision to be applied to problems.

#### How to initialize the weights

This still leaves the question of how to initialize the weights . The method of choosing weights mentioned in class was to randomize the weights before the first step. This is not likely to be near the optimal solution in every case, but is simple to implement. To be more specific, random values near zero will be a good choice for the initial weights(usually from [-1,1]). In this case, the model evolves from a nearly linear one to a nonlinear one as we desired. An alternative is to use an orthogonal least squares method to find the initial weights <ref>http://www.mitpressjournals.org/doi/abs/10.1162/neco.1995.7.5.982</ref>. Regression is performed on the weights and output by using a linear approximation of , and finds optimal weights in the linear model. Back propagation is used afterward to find the optimal solution, since the NN is non-linear.

Why all initial weights should be randomized and small?

• Since the error back propagated through the network is proportional to the value of the weights. If all the weights are the same, then the back propagated errors will be the same as well and causing all of the weights will be updated by the same amount. Thus, same initial weights will prevent the network from learning.
• Since the weights updates in the Back Prop algorithm are proportional to the derivative of activation function, it is important to consider how the net input affects its value. The derivative is a maximum when the activation function is equal to 0.5 and approaches its minimum as the activation function approaches 0 or 1, then its associated weights will vary very little. Thus, if we choose small initial weights, we will have the activation function close to the maximal weight change.

#### How to set learning rates

The learning rate is usually a constant.

If we use On-line learning, as a form of stochastic approximation process, should decrease as the iteration increase.

In typical feedforwad NNs with hidden units, the objective function has many local and global optimal values, so the optimal learning rate often changes dramatically during the training process. The larger the learning rate the larger the the weight changes on each epoch, and the quicker the network learns.However, the size of the learning rate can also influence whether the network achieves a stable solution. Choosing too large learning rate may cause the unstability of the system and make the weights and objective function diverge, while the too small learning rate may lead to a very slow convergence rate(very long time in learning phase). However, the advantage of small learning rate is that it can guarantee the convergence. Thus, generally, it is better to choose a relatively small learning rate to ensure the stability. Usually, choose between 0.01 and 0.7.

If the learning rate is appropriate, the algorithm is guaranteed to converge to a local minimum, but not a global minimum which is better. Furthermore, there can exist many local minimum values.

#### How to determine the number of hidden units

Here we will mainly discuss how to estimate the number of hidden units at very beginning. Obviously, we should adjust it to be more precise using CV, LOO or other complexity control methods.

Basically, if the patterns are well separated, few hidden units are fairly enough. If the patterns are drawn from some highly complicated mixture models, more hidden units are really needed.

Actually, the number of hidden units determines the size of the model, and therefore the total number of the weights in the model. Typically speaking, the number of weights should not be larger than the number of training data, say N. Thus, sometimes, N/10 is a good choice. However, in pratice, many well performed models will use more hidden units.

### Dimensionality reduction application

Figure 1: Bottleneck configuration for applying dimensionality reduction.

One possible application of Neural Networks is to perform dimensionality reduction, like other techniques, e.g., PCA, MDS, LLE and Isomap.

Consider the following configuration as shown in figure 1: As we go forward in layers of this Neural Network, the number of nodes is reduced, until we reach a layer with the number of nodes representing the desired dimensionality. However, note that at the very first few layers the number of nodes may not be strictly decreasing, as long as finally it can reach a layer with less nodes. From now on in the Neural Network the previous layers are mirrored. So at the output layer we have the same number of states as we have in the input layer. Now note that if we feed the network with each point and get an output approximately equal to the fed input, that means at the output the same input is reconstructed from the middle layer units. So the output of the middle layer units can represent the input with less dimensions.

To train this Neural Network, we feed the network with a training point and through back propagation we adjust the network weights based on the error between the input layer and the reconstruction at the output layer. Our low dimensional mapping will be the observed output from the middle layer. Data reconstruction consists of putting the low dimensional data through the second half of the network.

### Deep Neural Network

Back-propagation in practice may not work well when there are too many hidden layers, since the may become negligible and the errors vanish. This is a numerical problem, where it is difficult to estimate the errors. So in practice configuring a Neural Network with Back-propagation faces some subtleties. Deep Neural Networks became popular two or three years ago, when introduced by Bradford Nill in his PhD thesis. Deep Neural Network training algorithm deals with the training of a Neural Network with a large number of layers.

The approach of training the deep network is to assume the network has only two layers first and train these two layers. After that we train the next two layers, so on and so forth.

Although we know the input and we expect a particular output, we do not know the correct output of the hidden layers, and this will be the issue that the algorithm mainly deals with. There are two major techniques to resolve this problem: using Boltzman machine to minimize the energy function, which is inspired from the theory in atom physics concerning the most stable condition; or somehow finding out what output of the second layer is most likely to lead us to the expected output at the output layer.

#### Difficulties of training deep architecture <ref>Template:Cite journal</ref>

Given a particular task, a natural way to train a deep network is to frame it as an optimization problem by specifying a supervised cost function on the output layer with respect to the desired target and use a gradient-based optimization algorithm in order to adjust the weights and biases of the network so that its output has low cost on samples in the training set. Unfortunately, deep networks trained in that manner have generally been found to perform worse than neural networks with one or two hidden layers.

We discuss two hypotheses that may explain this difficulty. The first one is that gradient descent can easily get stuck in poor local minima (Auer et al., 1996) or plateaus of the non-convex training criterion. The number and quality of these local minima and plateaus (Fukumizu and Amari, 2000) clearly also influence the chances for random initialization to be in the basin of attraction (via gradient descent) of a poor solution. It may be that with more layers, the number or the width of such poor basins increases. To reduce the difficulty, it has been suggested to train a neural network in a constructive manner in order to divide the hard optimization problem into several greedy but simpler ones, either by adding one neuron (e.g., see Fahlman and Lebiere, 1990) or one layer (e.g., see Lengell´e and Denoeux, 1996) at a time. These two approaches have demonstrated to be very effective for learning particularly complex functions, such as a very non-linear classification problem in 2 dimensions. However, these are exceptionally hard problems, and for learning tasks usually found in practice, this approach commonly overfits.

This observation leads to a second hypothesis. For high capacity and highly flexible deep networks, there actually exists many basins of attraction in its parameter space (i.e., yielding different solutions with gradient descent) that can give low training error but that can have very different generalization errors. So even when gradient descent is able to find a (possibly local) good minimum in terms of training error, there are no guarantees that the associated parameter configuration will provide good generalization. Of course, model selection (e.g., by cross-validation) will partly correct this issue, but if the number of good generalization configurations is very small in comparison to good training configurations, as seems to be the case in practice, then it is likely that the training procedure will not find any of them. But, as we will see in this paper, it appears that the type of unsupervised initialization discussed here can help to select basins of attraction (for the supervised fine-tuning optimization phase) from which learning good solutions is easier both from the point of view of the training set and of a test set.

### Neural Networks in Practice

Now that we know so much about Neural Networks, what are suitable real world applications? Neural Networks have already been successfully applied in many industries.

Since neural networks are good at identifying patterns or trends in data, they are well suited for prediction or forecasting needs, such as customer research, sales forecasting, risk management and so on.

Take a specific marketing case for example. A feedforward neural network was trained using back-propagation to assist the marketing control of airline seat allocations. The neural approach was adaptive to the rule. The system is used to monitor and recommend booking advice for each departure.

### Issues with Neural Network

When Neural Networks was first introduced they were thought to be modeling human brains, hence they were given the fancy name "Neural Network". But now we know that they are just logistic regression layers on top of each other but have nothing to do with the real function principle in the brain.

We do not know why deep networks turn out to work quite well in practice. Some people claim that they mimic the human brains, but this is unfounded. As a result of these kinds of claims it is important to keep the right perspective on what this field of study is trying to accomplish. For example, the goal of machine learning may be to mimic the 'learning' function of the brain, but necessarily the processes the brain uses to learn.

As for the algorithm, since it does not have a convex form, we still face the problem of local minimum, although people have devised other techniques to avoid this dilemma.

In sum, Neural Network lacks a strong learning theory to back up its "success", thus it's hard for people to wisely apply and adjust it. Having said that, it is not an active research area in machine learning. NN still has wide applications in the engineering field such as in control.

### BUSINESS APPLICATIONS OF NEURAL NETWORKS

Neural networks are increasingly being used in real-world business applications and, in some cases, such as fraud detection, they have already become the method of choice. Their use for risk assessment is also growing and they have been employed to visualize complex databases for marketing segmentation. This method covers a wide range of business interests — from finance management, through forecasting, to production. The combination of statistical, neural and fuzzy methods now enables direct quantitative studies to be carried out without the need for rocket-science expertise.

• On the Use of Neural Networks for Analysis Travel Preference Data
• Extracting Rules Concerning Market Segmentation from Artificial Neural Networks
• Characterization and Segmenting the Business-to-Consumer E-Commerce Market Using Neural Networks
• A Neurofuzzy Model for Predicting Business Bankruptcy
• Neural Networks for Analysis of Financial Statements
• Developments in Accurate Consumer Risk Assessment Technology
• Strategies for Exploiting Neural Networks in Retail Finance
• Novel Techniques for Profiling and Fraud Detection in Mobile Telecommunications
• Detecting Payment Card Fraud with Neural Networks
• Money Laundering Detection with a Neural-Network

## Complexity Control October 30, 2009

File:overfitting-model.png
Figure 2. The overfitting model passes through all the points of the training set, but has poor predictive power for new points. In exchange the line model has some error on the training points but has extracted the main characteristic of the training points, and has good predictive power.

There are two issues that we have to avoid in Machine Learning:

1. Overfitting
2. Underfitting

Overfitting occurs when our model is heavily complex with so many degrees of freedom, that we can learn every detail of the training set. Such a model will have very high precision on the training set but will show very poor ability to predict outcomes of new instances, especially outside the domain of the training set.Dangerous for the overfitting:it will easily lead the predictions to the range that is far beyond the training data, and produce wild predictions in multilayer perceptrons even with noise-free data.The best way to avoid overfitting is to use lots of training data.

In a Neural Network if the depth is too much, the network will have many degrees of freedom and will learn every characteristic of the training data set. That means it will show a very precise outcome of the training set but will not be able to generalize the commonality of the training set to predict the outcome of new cases.

Underfitting occurs when the model we picked to describe the data is not complex enough, and has high error rate on the training set. There is always a trade-off. If our model is too simple, underfitting could occur and if it is too complex, overfitting can occur.

Example

1. Consider the example showed in the figure. We have a training set and we want to find a model which fits it the best. We can find a polynomial of high degree which almost passes through all the points in the training set. But, in fact the training set is coming from a line model. Now the problem is although the complex model has less error on the training set it diverges from the line in other ranges which we have no training point. Because of that the high degree polynomail has very poor predictive result on test cases. This is an example of overfitting model.
2. Now consider a training set which comes from a polynomial of degree two model. If we model this training set with a polynomial of degree one, our model will have high error rate on the training set, and is not complex enough to describe the problem.
3. Consider a simple classification example. If our classification rule takes as input only the colour of a fruit and concludes that it is a banana, then it is not a good classifier. The reason is that just because a fruit is a yellow, does not mean that it is a banana. We can add complexity to our model to make it a better classifier by considering more features typical of bananas, such as size and shape. If we continue to make our model more and more complex in order to improve our classifier, we will eventually reach a point where the quality of our classifier no longer improves, ie., we have overfit the data. This occurs when we have considered so many features that we have perfectly described the existing bananas, but if presented with a new banana of slightly different shape than the existing bananas, for example, it cannot be detected. This is the tradeoff; what is the right level of complexity?

## Complexity Control - Nov 2, 2009

Overfitting occurs when the model becomes too complex and underfitting occurs when it is not complex enough, both of which are not desirable. To control complexity, it is necessary to make assumptions for the model before fitting the data. Assumptions that we can make for a model are with polynomials or a neural network. There are other ways as well.

Figure 1: An example of a model with a family of polynomials

We do not want a model to get too complex, so we control it by making an assumption on the model. With complexity control, we want a model or a classifier with a low error rate. The lecture will explain the tradeoff between Bias and variance for model complexity control.

### How do we choose a good classifier?

Our goal is to find a classifier that minimizes the true error rate.

Recall the empirical error rate

is a classifier and we want to minimize the error rate. So we apply to to , and take the average to get the empirical true error rate estimation of probability that .

Figure 2

There is a downward bias to this estimate meaning that it is always less than the true error rate.

If there is a change in our complexity from low to high, our error rate is always decreasing. When we apply our model to the test data, our error rate will start to decrease to a point, but then it will increase since the model hasn't seen it before. This can be explained since training error will decrease when we fit the model better by increasing its complexity, but as we have seen, this complex model will not generalize well, resulting in a larger test error.

We use our test data (from the test sample line shown on Figure 2) to get our empirical error rate. Right complexity is defined as where error rate of the test data is minimum; and this is one idea behind complexity control.

Figure 3

We assume that we have samples that follow some (possibly unknown) distribution. We want to estimate a parameter of the unknown distribution. This parameter may be the mean , the variance or some other quantity.

The unknown parameter is a ﬁxed real number . To estimate it, we use an estimator which is a function of our observations, .

One property we desire of the estimator is that it is correct on average, that is, it is unbiased. . However, there is a more important property for an estimator than just being unbiased: the mean squared error. In statistics, there are problems for which it may be good to use an estimator with a small bias. In some cases, an estimator with a small bias may have lesser mean squared error or be median-unbiased (rather than mean-unbiased, the standard unbiasedness property). The property of median-unbiasedness is invariant under transformations while the property of mean-unbiasedness may be lost under nonlinear transformations. For example, while using an unbiased estimator with large mean square error to estimate the parameter, we highly risk a big error. In contrast, a biased estimator with small mean square error will well improve the precision of our prediction.

Hence, our goal is to minimize .

From figure 3, we can see that the relationship of the three parameters is: . Thus given the Mean Squared Error (MSE), if we have a low bias, then we will have a high variance and vice versa.

A Test error is a good estimation on MSE. We want to have a somewhat balanced bias and variance (not high on bias or variance), although it will have some bias.

Referring to Figure 2, overfitting happens after the point where training data (training sample line) starts to decrease and test data (test sample line) starts to increase. There are 2 main approaches to avoid overfitting:

1. Estimating error rate

Empirical training error is not a good estimation

Empirical test error is a better estimation

Cross-Validation is fast

Computing error bound (analytically) using some probability inequality.

We will not discuss computing the error bound in class; however, a popular method for doing this computation is called VC Dimension (short for Vapnik–Chervonenkis Dimension). Information can be found from Andrew Moore and Steve Gunn.

2. Regularization

Use of shrinkage method

Decrease the chance of overfitting by controlling the weights

### Example of under and overfitting in R

To give further intuition of over and underfitting, consider this example. A simple quadratic data set with some random noise is generated, and then polynomials of varying degrees are fitted. The errors for the training set and a test set are calculated.

Polynomial fits to curved data set.
 >> x <- rnorm(200,0,1)
>> y <- x^2-0.5*x+rnorm(200,0,0.3)
>> xtest <- rnorm(50,1,1)
>> ytest <- xtest^2-0.5*xtest+rnorm(50,0,0.3)
>> p1 <- lm(y~x)
>> p2 <- lm(y ~ poly(x,2))
>> pn <- lm(y ~ poly(x,10))
>> psi <- lm(y~I(sin(x))+I(cos(x)))

x values for the training set are based on a distribution, while the test set has a distribution. y values are determined by , a quadratic function with some random variation. Polynomial least square fits of degree 1, 2, and 10 are calculated, as well as a fit of .
 >> > # calculate the mean squared error of degree 1 poly
>> > sum((y-predict(p1,data.frame(x)))^2)/length(y)
>> [1] 1.576042
>> > sum((ytest-predict(p1,data.frame(x=xtest)))^2)/length(ytest)
>> [1] 7.727615

Training and test mean squared errors for the linear fit. These are both quite high - and since the data is non-linear, the different mean value of the test data increases the error quite a bit.
 >> > # calculate the mean squared error of degree 2 poly
>> > sum((y-predict(p2,data.frame(x)))^2)/length(y)
>> [1] 0.08608467
>> > sum((ytest-predict(p2,data.frame(x=xtest)))^2)/length(ytest)
>> [1] 0.08407432

This fit is far better - and there is not much difference between the training and test error, either.
 >> > # calculate the mean squared error of degree 10 poly
>> > sum((y-predict(pn,data.frame(x)))^2)/length(y)
>> [1] 0.07967558
>> > sum((ytest-predict(pn,data.frame(x=xtest)))^2)/length(ytest)
>> [1] 156.7139

With a high-degree polynomial, the training error continues to decrease, but not by much - and the test set error has risen again. The overfitting makes it a poor predictor. As the degree of the polynomial rises further, the accuracy of the computer becomes an issue - and a good fit is not even consistently produced for the training data.
 >> > # calculate mse of sin/cos fit
>> > sum((y-predict(psi,data.frame(x)))^2)/length(y)
>> [1] 0.1105446
>> > sum((ytest-predict(psi,data.frame(x=xtest)))^2)/length(ytest)
>> [1] 1.320404

Fitting a function of the form sin(x)+cos(x) works pretty well on the training set, but because it is not the real underlying function, it fails on test data which doesn't lie on the same domain.

## Cross-Validation (CV) - Introduction

Figure 1: Illustration of Cross-Validation

Cross-Validation is used to estimate the error rate of a classifier with respect to test data rather than data used in the model. Here is a general introduction to CV:

We have a set of collected data for which we know the proper labels

We divide it into 2 parts, Training data (T) and Validation data (V)

For our calculation, we pretend that we do not know the label of V and we use data in T to train the classifier

We estimate an empirical error rate on V since the model hasn't seen V yet and we know the proper label of all elements in V to know how many were misclassified.

CV has different implementations which can reduce the variance of the calculated error rate, but sometimes with a tradeoff of a higher calculation time.

## Cross-validation

Figure 1: Classical/Standard cross-validation

Cross-validation is the simplest and most widely used method to estimate the true error. It comes from the observation that although training error always decreases with the increasing complexity of the model, the test error starts to increase from a certain point, which is noted as overfitting (see figure 2 above). Since test error estimates MSE (mean square error) best, people came up with the idea to divide the data set into three parts: training set, validation set, and test set. training set is used to build the model, validation set is used to deside the parameters and the optimal model, and the test set is used to estimate the performance of the chosen model. A classical division is 50% for training set, and 25% each for validation set and test set. All of them are randomly selected from the original data set.
Training set: a set of examples used for learning: to fit the parameters of the classifier.
Validation set: a set of examples used to tune the parameters of a classifier.
Test set: a set of examples used only to assess the performance of a fully trained classifier.

Then, we only use the part of our data marked as the "training set" to train our algorithm, while keeping the remaining marked as the "validation set" untouched. As a result, the validation set will be totally unknown to the trained model. The error rate is then estimated by:

, where is the cardinality of the validation set.

When we change the complexity, the error generated by the validation set will have the same behavior as the test set, so we are able to choose the best parameters to get the lowest error.

### K-fold Cross-validation

File:k-fold.png
Figure 2: K-fold cross-validation

Above is the simplest form of complexity control. However, in reality, it may be hard to collect data ??and we usually suffer from the curse of dimensionality??, and a larger data set may be hard to come by. Consequently, we may not be able to afford to sacrifice part of the limited resources. In this case we use another method that addresses this problem, K-fold cross-validation.The advantage of K-Fold Cross validation is that all the examples in the dataset are eventually used for both training and testing. We divide the data set into subsets roughly equal in size. The usual choice is .

Generally, how to choose :

if , leave one out, low bias, high variance. Each subset contains a single element, so the model is trained with all except one point, and then validated using that point.

if , say 2-fold, 5-fold, high bias, low variance. Each subset contains approximately or of the data.

For every th part, we use the other parts to fit the model and test on the th part to estimate the prediction error , where

For example, suppose we want to fit a polynomial model to the data set and split the set into four equal subsets as shown in Figure 2. First we choose the degree to be 1, i.e. a linear model. Next we use the first three sets as training sets and the last as validation set, then the 1st, 2nd, 4th subsets as training set and the 3rd as validation set, so on and so forth until all the subsets have been the validation set once (all observations are used for both training and validation). After we get , we can calculate the average for degree 1 model. Similarly, we can estimate the error for n degree model and generate a simulating curve. Now we are able to choose the right degree which corresponds to the minimum error. Also, we can use this method to find the optimal unit number of hidden layers of neural networks. We can begin with 1 unit number, then 2, 3 and so on and so forth. Then find the unit number of hidden layers with lowest average error.

### Generalized Cross-validation

If the vector of observed values is denoted by , and the vector of fitted values by .

,

where the hat matrix is given by

,

,

Then the GCV approximation is given by

,

Thus, one of the biggest advantages of the GCV is that the trace is more easily computed.

### Leave-one-out Cross-validation

Leave-one-out cross-validation involves using all but one data point in the original training data set to train our model, then using the data point that we initially left out as a means to estimate true error. But repeating this process for every data point in our original data set, we can obtain a good estimation of true error.

In other words, leave-one-out cross-validation is k-fold cross-validation in which we set the subset number to be the cardinality of the whole data set.

In the above example, we can see that k-fold cross-validation can be computationally expensive: for every possible value of the parameter, we must train the model times. This deficiency is even more obvious in leave-one-out cross-validation, where we must train the model times, where is the number of data point in the data set.

Fortunately, when adding data points to the classifier is reversible, calculating the difference between two classifiers is computationally more efficient than calculating the two classifiers separately. So, if the classifier on all the data points is known, we simply undo the changes from a data point times to calculate the leave-one-out cross-validation error rate.

How to decide the number of folds? For a large number of folds, the bias of the true error rate estimator will be small, the variance of it and the computing time will be large. For a small number of folds, everything will be opposite. When the datasets is large, 3-fold cross validation will be enough, but if the datasets is very sparse we prefer to use leave-one-out.

## Regularization for Neural Network — Weight Decay

File:figure 2.png
Figure 1: activation function

Weight decay training is suggested as an implementation for achieving a robust neural network which is insensitive to noise. Since the number of hidden layers in NN is usually decided by certain domain knowledge, it may easily get into the problem of overfitting.

It can be seen from Figure 1 that when the weight is in the vicinity of zero, the operative part of the activation function shows linear behavior. The NN then collapses to an approximately linear model. Note that a linear model is the simplest model, we can avoid overfitting by constraining the weights to be small. This gives us a hint to initialize the random weights to be close to zero.

Formally, we penalize nonlinear weights by adding a penalty term in the error function. Now the regularized error function becomes:

, where is the original error in back-propagation; is the weights of the output layer; is the weights of the hidden layers.

Usually, too large will make the weights and too small. We can use cross validation to estimate .Another approach to choosing the is to train several networks with different amounts of decay and estimates the generalization error for each; then choose the that minimizes the estimated generalization error.

A similar penalty, weight elimination, is given by,

.

As in back-propagation, we take partial derivative with respect to the weights:

Note:
here serves as a trade-off parameter, tuning between the error rate and the linearity. Actually, we may also set by cross-validation. The tuning parameter is important since weights of zero will lead to zero derivatives and the algorithm will not change. On the other hand, starting with weights that are too large means starting with a nonlinear model which can often lead to poor solutions. <ref>Trevor Hastie, Robert Tibshirani, Jerome Friedman, Elements of Statistical Learning (Springer 2009) pp.398</ref>
We can standardize or normalize the inputs and targets, or adjust the penalty term for the standard deviations of all the inputs and targets in order to omit the biases and get good result from weight decay.
is different for different types of weights in the NN. We can have different for input-to-hidden, hidden-to-hidden, and hidden-to-output weights.

## Radial Basis Function (RBF) Networks - November 6, 2009

Figure 1: Radial Basis Function Network

### Introduction

A Radial Basis Function (RBF) network [19] is a type of artificial neural network with an output layer and a single hidden layer, with weights from the hidden layer to the output layer, and can be trained without back propagation since it has a closed-form solution. The neurons in the hidden layer contain basis functions. One choice that has been widely used is that of radial basis functions, which have the property that each basis function depends only on the radial distance (typically Euclidean) from a center , so that .

RBFN were first used in solving multivariate interpolation problems and numerical analysis. Their prospect is similar in neural network applications, where the training and query targets are rather continuous. RBFN are artificial neural networks and it can be applied to Regression, Classification and Time series prediction.

: input layer of d dimension of training patterns
: hidden layer of up to m locally tuned neurons centered over receptive fields
: output layer that provides the response of the network

The output of an RBF network can be expressed as a weighted sum of its radial basis functions as follows:

(Gaussian without a normalization constant)

note:The hidden layer has a variable number of neurons (the optimal number is determined by the training process). As usual the more neurons in the hidden layer, the higher the model complexity. Each neuron consists of a radial basis function centered on a point with the same dimensions as the input data. The radii of the RBF functions may be different. The centers and radii can be determined through clustering or an EM algorithm. When the x vector is given from the input layer, the hidden neuron computes the radial distance from the neuron’s center point and then applies RBF function to this distance. The resulting value is passed to the the output layer and weighed together to form the output.

can be expressed in matrix form as:

where

is the matrix of output variables.
is the matrix of Radial Basis Functions.
is the matrix of weights.

Here, is the number of outputs, is the number of data points, and is the number of hidden units. If , and are column vectors.

Introduction of the Radial Basis Function (RBF) Networks [20]

Radial Basis Function (RBF) Networks [22] [23] [24]

Advantage of RBFN: 1. First, it can model any nonlinear function using a single hidden layer, which removes some design-decisions about numbers of layers. 2.Second, the simple linear transformation in the output layer can be optimized fully using traditional linear modeling techniques

### Estimation of weight matrix W

We minimize the training error, in order to find .

From a previous result in linear algebra we know that

Thus we have a problem similar to linear regression:

#### Solving for W

We find the minimum over by setting equal to zero and using the aforementioned properties of matrix differentiation.

where

is the hat matrix for this model. This gives us a nice results since the solution has a closed form and we do not have to worry about convexity problems in this case.

can be expressed in matrix form as:

where

is the matrix(n by k) of output variables.
is the matrix(n by M+1) of Radial Basis Functions.
is the matrix(M+1 by k) of weights.

where the extra basis function is set to 1.

#### Normalized RBF

In addition to the above unnormalized architecture, the normalized RBF can be represented as:

Actually, is known as a normalized radial basis function. Giving the familiar form,

### Conceptualizing RBF networks

In the past, we have classified data using models that were explicitly linear, quadratic, or otherwise definite. In RBF networks, like in Neural Networks, we can fit an arbitrary model. How can we do this without changing the equations being used?

Recall a trick that was discussed in the October 7 lecture: if we add new features to our original data set, we can project into higher dimensions, use a linear algorithm, and get a quadratic result by collapsing to a lower dimension afterward. In RBF networks, something similar can happen.

Think of , our matrix of radial basis functions, as a feature space of the input. Each hidden unit, then, can be thought to represent a feature; we can see that, if there are more hidden units than input units, we can essentially project to a higher-dimensional space, as we did in our earlier trick. However, this does not mean that an RBF network will actually do this, it is merely a way to convince yourself that RBF networks (and neural networks) can fit arbitrary models. Nevertheless, it is also noticed that just because of such great power, the problem of overfitting appears more important. We have to control its complexity so that it does not fit to an arbitrary training model but to a general one.

### RBF networks for classification -- a probabilistic paradigm

Figure 1: RBF graphical model

An RBF network is akin to fitting a Gaussian mixture model to data. We assume that each class can be modelled by a single function and data is generated by a mixture model. According to Bayes Rule,

While all classifiers that we have seen thus far in the course have been in discriminative form, the RBF network is a generative model that can be represented using a directed graph.

We can replace the class conditional density in the above conditional probability expression by marginalizing over :

• Note We made the assumption that each class can be modelled by a single function and that the data was generated by a mixture model. The Gaussian mixture model has the form:

where are mixing proportions, , and and are the mean and covariance of each Gaussian density respectively. <ref>H. Trevor, R. Tibshirani, J. Friedman, The Elements of Statistical Learning (Springer 2009), pp. 214. </ref> The generative model in Figure 1 shows graphically how each Gaussian in the mixture model is chosen to sample from.

## Radial Basis Function (RBF) Networks - November 9th, 2009

### RBF Network for classification (A probabilistic point of view)

Using RBF Network[25] to do classification, we usually treat it as regression problem. We want to set a threshold to decide what the data’s class membership is. However, to find some insight to the classification problem of what we are doing in terms of RBF Network, we often think of mixture models and make certain assumptions. Before we mainly using deterministic model to describe data, which means a given input always generate the same output, now we are going to consider generative model of data. In this case, some hidden variables are incorporated and joint probability is assigned between the nodes so that we can derive results through the bayes rule.

Figure 26.1: RBF Network Classification Demo

We assume, as we can see in the graph on the right hand side, that we have three random variables, , , and where denotes class , is what we observed here, and is some hidden random variable. There is a process that there are different classes, and each class can trigger a different hidden random variable . To understand this, we can assume that, for instance, this random variable has a Gaussian distribution (it could have any other distribution as well) and that all the ’s have the same distribution (Gaussian), but with different parameters. From each Gaussian distribution triggered by each class, we are going to sample some data points. Therefore, in the end, we are going to get a set of data, which are not strictly Gaussian, but are actually a mixture of Gaussians.

Again, we look at the posterior distribution from Bayes' Rule.

Since we made the assumption that the data has been generated from a mixture model, we can estimate this conditional probability by

,

which is the class conditional distribution (or probability) of the mixture model. Note, here, if we only have a simple model from to , then we won’t have this summation.

We can substitute this class conditional distribution into Bayes' formula. We can see that the posterior of class is the summation over of the probability of given times the probability of given , times the prior distribution of class , and lastly divided by the marginal probability of . That is,

.

Since, the prior probability of class , , does not have an index of , it can be taken out of the summation. This yields,

.

We multiply this by . Then, it becomes,

.

Next, note that , and . Then rearranging the terms, we finally have the posterior:

.

where is the probability of future given data, is the probability of class membership given a future.

Interestingly, this is just the product of the posterior of the two functions that are summed.

#### Interpretation of RBF Network classification

Figure 26.1.2(2): RBF Nerwork

We want to relate the results that we derived above to our RBF Network. In a RBF Network, as we can see on the right hand side, we have a set of data, to , and the hidden basis function, to , and then we have some output, to . Also, we have weights from the hidden layer to output layer. The output is just the linear sum of ’s.

Now consider probability of given to be , and the probability of given to be the weights , then the posterior can be written as,

.

Figure 26.1.2(1): Gaussian mixture

Now, let us look at an example in one dimensional case. Suppose,

, and is from 1 to 2.

We know that is a radial basis function. It's as if we put some Gaussian over data. And for each Gaussian, we consider the center . Then, what computes is the similarity of any data point to the center.

We can see the graph on the left which plots the density of and . Take for instance, if the point gets far from the center , then it will reduce to become nearly zero. Remember that, we can usually find a non-linear regression or classification of input space by doing a linear one in some extended space or some feature space (more details in Aside). Here, the ’s actually produce that feature space.

So, one way to look at this is that this is telling us that given an input, how likely the probability of presence of a particular feature is. Say, for example, we define the features as the centers of these Gaussian distributions. Then, this function somehow computes the possibility given certain data points, of this kind of feature appearing. If the data point is right at the center, then the value of that would be one, i.e. the probability is 1. If the point is far from the center, then the probability ( function value) will be close to zero, that is, it’s less likely. Therefore, we can treat as the probability of a particular feature given data.

When we have those features, then is the linear combination of the features. Hence, any of the weights , which is equal to , tells us how likely this particular will appear given those features. Therefore, the weight shows the probability of class membership given feature.

Hence, we have found a probabilistic point of view to look at RBF Network!

• Note There are some inconsistencies with this probabilistic point of view. There are no restrictions that force to be between 0 and 1. So if least squares is used to solve this, cannot be interpreted as a probability.

Aside

• Feature Space:
One way to produce a feature space is LDA
Suppose, we have n data points to . Each data point has d features. And these n data points consist of the matrix,
Also, we have feature space,
If we want to solve a regression problem for the input data, we don’t perform Least Square on this matrix, we do Least Square on the feature space, i.e. on the matrix. The dimensionality of is M by n. We can add which is not any function of
Now, we still have n data points, but we define these n data points in terms of a new set of features. So, originally, we define our data points by d features, but now, we define them by M features. And what are those M features telling us?
Let us look at the first column of matrix. The first entry is applied to , and so on, until the last entry is applied to . Suppose each of these is defined by
.
Then, each checks the similarity of the data point with its center. Hence, the new set of features are actually representing M centers in our data set, and for each data point, its new features check how this point is similar to the first center; how it is similar to the second center; and how it is similar to the center. And this checking process will apply to all data points. Therefore, feature space gives another representation of our data set.

Methords for selecting center :

• Sub-sampling: Randomly-chosen training points are copied to the radial units. Since they are randomly selected, they will represent the distribution of the training data in a statistical sense.
• K-Means algorithm: Given K radial units, it adjusts the positions of the centers so that: Each training point belongs to a cluster center, and is nearer to this center than to any other center; Each cluster center is the centroid of the training points that belong to it.

The size of the deviation (smoothing factor) determines how spiky the Gaussian functions are. Deviations should typically be chosen so that Gaussians overlap with a few nearby centers.

Methods for choosing deviation are:

• Choose the deviation by oursleves.
• Select the deviation to reflect the number of centers and the volume of space they occupy
• K-Nearest Neighbor algorithm: Each unit's deviation is individually set to the mean distance to its K nearest neighbors.

If the Gaussians are too spiky, the network will not interpolate between known points, and the network loses the ability to generalize. If the Gaussians are very broad, the network loses fine detail.

useful resouces:

2.comparision between BP & RBF:[26]

### Model selection or complexity control for RBF Network - a brief introduction

In order to obtain a better fit for the training data, we often want to increase the complexity of our RBF Network. By its construction, we know that to change the complexity of a RBF Network, the only way is to add or decrease the number of basis functions. A large number of basis function yields a more complex network. In theory, if we add enough basis functions, the RFB Network would work for any training; however, it doesn't mean this RBF Network model can generalize well. Therefore, for the purpose of avoiding overfitting problem (see Notes below), we only want to increase the number of basis function to certain point, i.e. its optimal level.

For the model selection, what we usually do is estimate the training error. After working through the training error, we’ll see that the training error in fact can be decomposed, and one component of training error is called Mean Squared Error (MSE). In the later notes, we will find that our final goal is to get a good estimate of MSE. Moreover, in order to find an optimal model for our data, we select the model with the smallest MSE.

Now, let us introduce some notations that we will use in the analysis:

• -- the prediction model estimated by a RBF network from the training data
• -- the real model (not null), and ideally, we want to be close to
• -- the training error
• -- the testing error
• -- the Mean Squared Error

Notes

File:overfitting.png
Figure 26.2: Overfitting
• Being more complex isn’t always a good thing. Sometime, overfitting causes the model to lose its generality. For example in the graph on left hand side, the data points are sampled from the model , where is a linear function, which is shown by the blue line, and is additive Gaussian noise from . The red curve displayed in the graph shows the over-fitted model. Clearly, this over-fitted model only works for any training data, and is useless for any further prediction when new data points are introduced.
> n<-20;
> x<-seq(1,10,length=n);
> alpha<-2.5;
> beta<-1.75;
> y<-alpha+beta*x+rnorm(n);
> plot(y~x, pch=16, lwd=3, cex=0.5, main='Overfitting');
> abline(alpha, beta, col='blue');
> lines(spline(x, y), col = 2);

• More details on this topic later on.

## Model Selection(Stein's Unbiased Risk Estimate)- November 11th, 2009

### Model Selection

Model selection is a task of selecting a model of optimal complexity for a given data. Learning a radial basis function network from data is a parameter estimation problem. One difficulty with this problem is selecting parameters that show good performance on both training and testing data. In principle, a model is selected to have parameters associated with the best observed performance on training data, although our goal really is to achieve good performance on unseen testing data. Not surprisingly, a model selected on the basis of training data does not necessarily exhibit comparable performance on the testing data. When squared error is used as the performance index, a zero-error model on the training data can always be achieved by using a sufficient number of basis functions.

But, training error and testing error do not demonstrate a linear relationship. In particular, a smaller training error does do not necessarily result in a smaller testing error. In practice, one often observes that, up to a certain point, the model error on testing data tends to decrease as the training error decreases. However, if one attempts to decrease the training error too far by increasing model complexity, the testing error often can take a dramatic increase.

The basic reason behind this phenomenon is that in the process of minimizing training error, after a certain point, the model begins to over-fit the training set. Over-fitting in this context means fitting the model to training data at the expense of losing generality. In the extreme form, a set of training data points can be modeled exactly with radial basis functions. Such a model follows the training data perfectly. However, the model is not representative features of the true underlying data source, and this is why it fails to correctly model new data points.

In general, the training error rate will be less than the testing error on the new data. A model typically adapts to the training data, and hence the training error will be an overly optimistic estimate of the testing error. An obvious way to well estimate testing err is to add a penalty term to the training error to compensate. Actually, SURE is developed based on this.

### Stein's unbiased risk estimate (SURE)

#### Important Notation[27]

Let:

• denote the prediction model, which is estimated from a training sample by the RBF neural network model.
• denote the true model.
• denote the training error,which is the average loss over the training sample.
• denote the test error, which is the expected prediction error on an independent test sample.
• denote the mean squared error, where is the estimated model and is the true model.

The Bias-Variance Decomposition:

Since, , which is equal to zero.

Suppose the observations , where is additive Gaussian noise .We need to estimate from training data set . Let and ， then

The last term can be written as:

, where and both have same mean .

#### Stein's Lemma

If is and if is weakly differentiable,such that, then .

According to Stein's Lemma, the last cross term of , can be written as . The derivation is as follows.

: Let . Then , since , and is a constant. So and is the variance in .

Since is the true model, not the function of the observations , then .

So,

#### Two Different Cases

##### Case 1

Consider the case in which a new data point has been introduced to the estimated model, i.e. ; this new point belong to the validation set ,i.e.. Since is a new point, and are independent. Therefore (or think about , when is a new point, then it has nothing with because the estimation of is from the training data, so ) and in this case can be written as:

.

This expectation means .

Based on the notation we denote above, then we obtain:

This is the justification behind the technique of cross validation. since is constant, to minimize is equal to minimize the test err . In cross vaildation to avoid overfitting or underfitting, a validation data set is independent from the estimated model.

##### Case 2

A more interesting case is the case in which we do not use new data points to assess the performance of the estimated model. and the training data is used for both estimating and assessing a model . In this case the cross term in cannot be ignored because and are not independent. Therefore the cross term can be estimated by Stein's lemma, which was originally proposed to estimated the mean of a Guassian distribution.

Suppose , then by applying Stein's lemma, we obtain proved above.

.

This expectation means .

.

In statistics, this is known as Stein's unbiased risk estimate (SURE) is an unbiased estimator of the mean-squared error of a given estimator, in a deterministic estimation scenario. In other words, it provides an indication of the accuracy of a given estimator. This is important since, in deterministic estimation, the true mean-squared error of an estimator generally depends on the value of the unknown parameter, and thus cannot be determined completely.

### SURE for RBF Network

Based on SURE, the optimum number of basis functions should be assigned to have the minimum generalization err . Based on the Radial Basis Function Network, by setting equal to zero , we get the least squared solution of.Then we have ,where , is the hat matrix for this model.

where depends on the input vector but not on .

By taking the derivative of with respect to , we can easily obtain:

Now, substituing this into ,we get

Here, we can tell that , the sum of the diagonal elements of . Thus, we can obtain the further simplification that , where is the dimension of . Since is a projection of input matrix onto a basis set spanned by , the number of basis functions. If considering intercept, then .

Then,.

### SURE Algorithm

Figure 27.1

We use this method to find the optimum number of basis function by choosing the model with smallest MSE over the set of models considered. Given a set of models indexed by the number of basis functions, .

Then,

where is the number of training samples and the noise,, can be estimated from the training data as

.

By applying SURE algorithm to SPECT Heart data, we get the optimal number of basis functions is .

Pls take a look at figure 27.1 on the right, which shows that is smallest when .

Calculating the SURE value is easy if you have access to .

sure_Err = error - num_data_point * sigma .^ 2 + 2 * sigma .^2 * (num_basis_functions + 1);


If is not known, it can be estimated using the error.

error = (output - expected_output) .^ 2;
sigma = (dot(err, ones(1, num_data_point)) / (num_data_point)) / (num_data_point - 1);
sure_Err = error - num_data_point * sigma .^ 2 + 2 * sigma .^2 * (num_basis_functions + 1);


## SURE for RBF network & Support Vector Machine - November 13th, 2009

### SURE for RBF network

#### Minimizing MSE

By Stein's unbiased risk estimate (SURE) for Radial Basis Function (RBF) Network we get:

(28.1)

• (mean square error)=
• (training error)=
• ( number of hidden units)=

Goal: To minimize MSE

1. If is known, then it is no impact (i.e. a constant), and we can ignore it. Only need to minimize .

2. In reality, we do not know , and the estimate changes when changes. However, we can estimate .

, where is additive Gaussian noise . Suppose we do not know the variance of . Then,

(28.2)

Substitute (28.2) into (28.1), get

(28.3)

Figure 28.1: MSE vs err

Figure 28.1: the training error will decrease and the MSE will increase when increasing the number of hidden units (i.e. the model is more complex).

When the number of hidden units gets larger and larger, the training error will decrease until it approaches to . If training error equals , then no matter how large is, from (28.3) we can see the estimate of MSE will approach as well. However, in fact it does not happen since when training error is close to overfitting happens, and MSE should increase instead of being close to . We can see it from the Figure 28.1.

We can see is the average of . In order to deal with this problem, we can take the average for of each hidden unit. For example: we can first take 1 hidden unit, and take 10 hidden units in the next. Since in reality the value of is a constant adjustment to the data points, and doesn't depend on , using the average value for 1 to 10 hidden units has a firm theoretical basis.

We can also see that unlike the classical Cross Validation (CV) or Leave one out (LOO) techniques, the SURE technique does not need to do the validation to find the optimal model. Hence, SURE technique uses less data than CV or LOO. It is suitable for the case that there is not enough data for validation. However, to implement SURE we need to find , which may not be trivial for models that do not have a closed-form solution.

#### Kmeans Clustering

Description:
Kmeans clustering is a method of cluster analysis which aims to partition n observations into k clusters in which each observation belongs to the cluster with the nearest mean.

• The number of hidden units is equal to the number of clusters, which is
• , we set it equal for all clusters.

The basic details for -means clustering are given:

The initial centers are randomly chosen from the training data.

Then the following two steps are iterated alternately until convergence.

1. For each existing center, we re-identify its cluster (every point in this cluster should be closer to this center than to others).

2. Compute the mean for each cluster and make it as the new center for each cluster.

##### Kmeans Clustering algorithm
• For a given cluster assignment , the total cluster variance is minimized with respect to yielding the means of the currently assigned clusters.
• Given a current set of means, is minimized by assigning each observation to the closet (current) cluster mean. That is, .
• Steps 1 and 2 are iterated until the assignments do not change.
##### Example:

Partition data into 2 clusters (2 hidden values)

   >> X=rand(30,80);
>> [IDX,C,sumD,D]=kmeans(X,2);
>> size(IDX)
>>   30     1
>> size(C)
>>     2    80
>> size(sumD)
>>     2     1
>> c1=sum(IDX==1)
>>    14
>> c2=sum(IDX==2)
>>    16
>> sumD
>>   85.6643
>>   101.0419
>> v1=sumD(1,1)/c1
>>  6.1189
>> v2=sumD(2,1)/c2
>>  6.3151


We create randomly as a training set with 80 data points and 30 dimensions, and then apply “kmeans” method to separate X into 2 clusters. IDX is a vector contains 1 or 2 which indicates 2 clusters, and its size is 30*1. is the center (mean) of each cluster with size 2*80; sumD is sum of the square distance between the data points and center of its cluster. The and indicate the number of data points in cluster 1 and 2. is the variance of the first cluster ; is the variance of the second cluster . Now we can get , , hat matrix and by following equations. Finally, we will get the and predict the test set.

Aside:

Similar in spirit to -means, there is EM algorithm with respect to Gaussian mixture model. Generally speaking, the Gaussian mixture model is referred to as a soft clustering while -means is hard clustering.

Similar to -means, the following two steps are iterated alternately until convergernce.

E-step, each point is assigned a weight for each cluster based on the likelihood of each of the corresponding Gaussians. Observations is assigned 1 for one cluster if they are closer to the center of that cluster, and is assigned 0 for other clusters.

M-step, compute the weighted means and covariances and make them as the new means and covariances for every cluster.

    >>[P,mu,phi,1Pxtr]=mdgEM(X,2,200,0);


### Support Vector Machine

#### Introduction

We have seen that linear discriminant analysis and logistic regression both estimate linear decision boundaries in similar but slightly different ways. Separating hyperplane classifiers provide the basis for the support vector machine (SVM). An SVM constructs linear decision boundaries that explicitly try to separate the data into different classes while maximizing the margin of separation. The techniques that make the extensions to the non-separable case, where the classes overlap, are generalized to what is known as the support vector machine. It produces nonlinear boundaries by constructing a linear boundary in a high-dimensional, transformed version of the feature space. It is also calculated based on only a fraction of the data rather than a calculation on every point in the data, much like the difference between the median and the mean.

The original basis for SVM was published in the 1960s by Vapnik, Chervonenkis et al., however the ideas did not gain any attention until strong results were shown in the early 1990s.

Definition:
Support Vector Machines (SVM) are a set of related supervised learning methods used for classification and regression. A support vector machine constructs a maximum margin hyperplane or set of hyperplanes in a higher or infinite dimensional space. The set of points near the class boundaries, support vectors, define the model which can be used for classification, regression or other tasks.

#### Optimal Seperating Hyperplane

Figure 28.2

Figure 28.2 An example with two classes separated by a hyperplane. The blue line is the least squares solution, which misclassifies one of the training points. Also shown are the black separating hyperplanes found by the perceptron learning algorithm with different random starts.

We can see the data points can be separated by a linear boundary are in two classes in . Suppose a dataset is indeed linearly separable, then there exits infinitely many possible separating hyperplanes including the black lines in the figure as two of them for training data. However, which solution is the best when we introduce the new data.

Aside:
The blue line is the least squares solution to the problem,obtained by regressing the response on (with intercept); the line is given by . This least squares solution does not do a perfect job in separating the points, and makes one error. This is the same boundary found by linear discriminant analysis, in light of its equivalence with linear regression in the two-class case.

Classifiers such as (28.4) that compute a linear combination of the input features and return the sign were called perceptrons in the engineering literature in the late 1950s.

Identifications:

• Hyperplane: separate two classes

• Margin: the distance between the hyperplane and the closest point.

where

Note: since distance is positive, if the data is on side the distance is . If the data is on the side the distance is .

• Data points: we can classify points as if is known.

#### Maximum Margin Classifiers in the Linearly separable case

Choose the line farthest from both classes or choose the line which has the maximum distance from the closest point. (i.e maximize the margin)

where is label and is distance

Figure 28.3 The linear algebra of a hyperplane

Fiqure 28.3 depicts a hyperplane defined by the equation . Since they are in , the hyperplane is a line.

Let us rewrite by using the following properties:

1. is orthogonal to the hyperplane

Two points lying on the hyperplane.

Hence, is orthogonal to , and is the vector normal to the hyperplane.

2. For any point on the hyperplane,

For any point on the hyperplane, multiplying by gives negative value of the intercept of the hyperplane.

3. The signed distance for any point to the hyperplane is .
Since the length of is not known, let it be unit vector.

by property 2

Figure 28.4

We had , and since we now know how to compute

Suppose is not on the hyperplane

for

This is known as the canonical representation of the decision hyperplane.

For only the direction is important, so does not change its direction, the hyperplane will be the same.

which is equivalent as

Reference:
Hastie,T.,Tibshirani,R., Friedman,J.,(2008).The Elements of Statistical Learning:129-130

#### Extension--Multi-class SVM[28]

SVM is only directly applicable for two-class case. We want to generalize this algorithm to multi-class tasks.

Multiclass SVM aims to assign labels to instances by using support vector machines, where the labels are drawn from a finite set of several elements. The dominating approach for doing so is to reduce the single multiclass problem into multiple binary problems. Each of the problems yields a binary classifier, which is assumed to produce an output function that gives relatively large values for examples from the positive class and relatively small values for examples belonging to the negative class. Two common methods to build such binary classifiers are where each classifier distinguishes between (i) one of the labels to the rest (one-versus-all) or (ii) between every pair of classes (one-versus-one). Classification of new instances for one-versus-all case is done by a winner-takes-all strategy, in which the classifier with the highest output function assigns the class (it is important that the output functions be calibrated to produce comparable scores). For the one-versus-one approach, classification is done by a max-wins voting strategy, in which every classifier assigns the instance to one of the two classes, then the vote for the assigned class is increased by one vote, and finally the class with most votes determines the instance classification.

## Optimizing The Support Vector Machine - November 16th, 2009

We currently derive Support Vector Machine for the case where two classes are separable in the given feature space. This margin can be written as , or the distance of each point from the hyperplane, where is the distance and is used as the sign.

### Margin Maximizing Problem for the Support Vector Machine

can be rewritten as . <br\>Note that the term if is on the hyperplane, but if is not on the hyperplane.

This implies such that .

Divide through by C to produce .

compose a hyperplane that can have different values but we care about the direction, dividng through by a constant does not change the direction of the hyperplane. Thus, by assuming scaled values for we eliminate C, so that . Implying that the lower bound on is

Now in order to maximize the margin, we simply need to find .

In other words, our optimization problem is now to find maximum , under the constraint that .

Note that we're dealing with the norm of . There are many different choices of possible norms, in general p-norm. The 1-norm of a vector is simply the sum of the absolute value of each element (also known as the taxicab or Manhattan distance), and is apparently more accurate, but also has a discontinuity in the derivative. 2-norm or the Euclidean norm (the intuitive measure of the length of a vector), is easier to work with - that is . For convenience, we will maximize where the constant 1/2 has been added for simplification and that the maximizing the function is the same as maximizing the square root of that function.

This is an example of a quadratic programming problem and we will minimize a quadratic function subject to linear inequality constraints.

#### Writing Lagrangian Form of Support Vector Machine

The Lagrangian form is introduced to ensure that the optimization conditions are satisfied, as well as finding an optimal solution (the optimal saddle point of the Lagrangian for the classic quadratic optimization). The problem will be solved in dual space by introducing as dual constraints, this is in contrast to solving the problem in primal space as function of the betas. A simple algorithm for iteratively solving the Lagrangian has been found to run well on very large data sets, making SVM more usable. Note that this algorithm is intended to solve Support Vector Machines with some tolerance for errors - not all points are necessarily classified correctly. Several papers by Mangasarian explore different algorithms for solving SVM.

. To find the optimal value, set the derivative equal to zero.

, . Note that is equivalent to the constraints

First,

.
.
.

So this simplifies to . In other words,

,

Similarly, .

This allows us to rewrite the Lagrangian without .

.

Because , and is constant, . So this simplifies further, to

A dual representation of the maximum margin.

Because is the Lagrange multiplier, .

This is a much simpler optimization problem

#### Extension:Global Optimization of Support Vector Machines(Using Genetic Algorithms for Bankruptcy Prediction)

One of the most important research issues in finance is building accurate corporate bankruptcy prediction models since they are essential for the risk management of financial institutions. Thus, researchers have applied various data-driven approaches to enhance prediction performance including statistical and artificial intelligence techniques. Recently, support vector machines(SVMs) are becoming popular because they use a risk function consisting of the empirical error and a regularized term which is derived from the structural risk minimization principle. In addition, they don’t require huge training samples and have little possibility of overfitting. However, in order to use SVM, a user should determine several factors such as the parameters of a kernel function, appropriate feature subset, and proper instance subset by heuristics, which hinders accurate prediction results when using SVM.

There is a paper [[29]]proposing a novel approach to enhance the prediction performance of SVM for the prediction of financial distress. Their suggestion is the simultaneous optimization of the feature selection and the instance selection as well as the parameters of a kernel function for SVM by using genetic algorithms (GAs). They apply their model to a real-world case. Experimental results show that the prediction accuracy of conventional SVM may be improved significantly by using their model.

#### Extension: Finding Optimal Parameter Values

The accuracy of an SVM model dependents on the selection of the model parameters. DTREG provides two methods for finding optimal parameter values. Grid search: tries values of each parameter across the specified search range using geometric steps. Pattern search/compass search/line search:starts at the center of the search range and makes trial steps in each direction for each parameter.

If the fit of the model improves, the search center moves to the new point and the process is repeated. If no improvement is found, the step size is reduced and the search is tried again. The pattern search stops when the search step size is reduced to a specified tolerance.

### Positives and Negatives When Optimizing SVM[30]

• (Pos) Appears to avoid overfitting in high dimensional spaces and generalize well using a small training set (the complexity of SVM is characterized by the number of support vectors rather than the dimensionality of the transformed space -- no formal theory to justify this).
• (Pos) Global optimization method, no local optima (SVM are based on exact optimization, not approximate methods).
• (Neg) Applying trained classifiers can be expensive.

## The Support Vector Machine algorithm - November 18, 2009

### Lagrange Duality

In convex optimization, consider the primal optimization problem:

Define the generalized Lagrangian to be

Then the dual optimization problem is

Now instead of solving the primal problem, we can solve the dual problem without changing the solution as long as it subjects to the Karush-Kuhn-Tucker (KKT) conditions:

We are interested in the dual form because it gives bound on the primal problem and in some cases is easier to solve. For more information about convex optimization, see the book by Boyd: [31]

### Solving the Lagrangian

Continuing from the above derivation, we now have the equation that we need to minimize, as well as two constraints.

The Support Vector Machine problem boils down to:

such that
and

We are looking to minimize , which is our only unknown. Once we know , we can easily find and (see the Support Vector algorithm below for complete details).

If we examine the Lagrangian equation, we can see that is multiplied by itself; that is, the Lagrangian is quadratic with respect to . Our constraints are linear. This is therefore a problem that can be solved through quadratic programming techniques. We will examine how to do this in Matlab shortly.

We can write the Lagrangian equation in matrix form:

such that
and

Where:

• denotes an vector;
• Matrix
• and are vectors containing all 0s or all 1s respectively

Using this matrix notation, we can use Matlab's built in quadratic programming routine, quadprog.

Let's use quadprog to find the solution to .

Matlab's quadprog function minimizes an equation of the following form:

such that: , and

We can now see why we kept the constant in the original derivation of the equation.

The function is called as such: x = quadprog(H,f,A,b,Aeq,beq,lb,ub). The variables correspond to values in the equation above.

We can now try to find the solution to (though, it should be noted, that in we subtract the first term rather than add it; I'm not sure if this difference would change how we call quadprog).

We'll use a simple one-dimensional data set, which is essentially y = -1 or 1 + Gaussian noise. (Note: you could easily put the values straight into the quadprog equation; they are separated for clarity.)

x = [mvnrnd([-1],[0.01],100); mvnrnd([1],[0.01],100)]';
y = [-ones(100,1); ones(100,1)];
S = (y*x)' * (y*x);
f = ones(200,1);
A = -ones(1,200);
b = 0;
Aeq = y';
beq = 0;
lb = 0;
ub = []; % There is no upper bound


This gives us the optimal ... or at least I think it should, but it does not appear to work for me (that is, despite setting the lower boundary of 0, a number of values are still negative. Whether this is just the nature of quadprog or an error on my part is an exercise for the reader).

### Examining K.K.T. conditions

Karush-Kuhn-Tucker conditions (more info) give us a closer look into the Lagrangian equation and the associated conditions.

Suppose we are looking to minimize such that . If and are differentiable, then the necessary conditions for to be a local minimum are:

1. At the optimal point, ; i.e.
2. . (Dual Feasibility)
3. (Complementary Slackness)
4. (Primal Feasibility)

If any of these conditions are violated, then the problem is deemed not feasible.

These are all trivial except for condition 3. Let's examine it further in our support vector machine problem.

### Support Vectors

Support vectors are the training points that determine the optimal separating hyperplane that we seek. Also, they are the most difficult points to classify or the most informative for the classification.

In our case, the function is:

Substituting into KKT condition 3, we get . <br\>In order for this condition to be satisfied either
or

All points will be either 1 or greater than 1 distance away from the hyperplane.

Case 1: a point away from the margin

If .

If point is not on the margin, then the corresponding .

Case 2: a point away from the margin

If <br\>If point is on the margin, then the corresponding .

Points on the margin, with corresponding , are called support vectors.

### Using support vectors

Support vectors are important because they allow the support vector machine algorithm to be insensitive to outliers. If , then the cost function is also 0, and won't contribute to the solution of the SVM problem; only points on the margin — support vectors — contribute. Hence the model given by SVM in entirely defined by the set of support vectors, a subset of the entire training set. This is interesting because in the NN methods(and can be generalize to classical statistical learning) previous to this the configuration of the network needed to be specified. In this case we have a data-driven or 'nonparametric' model in which is the training set and algorithm will determine the support vectors, instead of fitting a set of parameters using CV or other error minimization functions.

References: Wang, L, 2005. Support Vector Machines: Theory and Applications, Springer, 3

#### The support vector machine algorithm

1. Solve the quadratic programming problem: such that and
1. Use Matlab's quadprog to find the optimal
2. Find
3. Find by choosing a support vector (a point with ) and solving

### Example in Matlab

The following code, taken verbatim from the lecture, shows how to use Matlab built-in SVM routines (found in the Bioinformatics toolkit) to do classification through support vector machines.

load 2_3;
[U,Y] = princomp(X');
data = Y(:,1:2);
l = [-ones(1,200) ones(1,200)];
[train,test] = crossvalind('holdOut',400);
% Gives indices of train and test; so, train is a matrix of 0 or 1, 1 where the point should be used as part of the training set
svmStruct = svmtrain(data(train,:), l(train), 'showPlot', true);

The plot produced by training on some of the 2_3 data's first two features.
yh = svmclassify(svmStruct, data(test,:), 'showPlot', true);

The plot produced by testing some of the 2_3 data.

### SVM in Gene Selection

DNA micro-arrays now permit scientists to screen thousands of genes simultaneously and determine whether those genes are active, hyperactive or silent in normal or cancerous tissue. Because these new micro-array devices generate bewildering amounts of raw data, new analytical methods must be developed to sort out whether cancer tissues have distinctive signatures of gene expression over normal tissues or other types of cancer tissues.

#### Extention:Support Vector Machines for Pattern Recognition

[32] This paper talks about linear Support Vector Machines for separable and non-separable data by working through a non-trivial example in detail, and also it describes a mechanical analog and when SVM solutions are unique and when they are global. From this paper we can know support vector training can be practically implemented, and the kernel mapping technique which is used to construct SVM solutions which are nonlinear in the data.

Results of some experiments which were inspired by these arguments are also presented. The writer gives numerous examples and proofs of most of the key theorems, he hopes the people can find old material is cast in a fresh light since the paper includes some new material.

### Limitation of SVM algorithm [33]

• The biggest limitation of SVM lies in the choice of the kernel (the best choice of kernel for a given problem is still a research problem).
• A second limitation is speed and size (mostly in training - for large training sets, it typically selects a small number of support vectors, thereby minimizing the computational requirements during testing).

## Non-linear hypersurfaces and Non-Separable classes - November 20, 2009

### Kernel Trick

We talked about the curse of dimensionality at the beginning of this course, however, we now turn to the power of high dimensions in order to find a linearly separable hyperplane between two classes of data points. To understand this, imagine a two dimensional prison where a two dimensional person is constrained. Suppose magically we give the person a third dimension, then he can escape from the prison. In other words, the prison and the person are linearly separable now with respect to the third dimension. The intuition behind the "kernel trick" is basically to map data to a higher dimension so that they are linearly separable by a hyperplane.

Imagine the point is a person. They're stuck.
Escape through the third dimension!
It's not possible to put a hyperplane through these points.
After a simple transformation, a perfect classification plane can be found.

The original optimal hyperplane algorithm proposed by Vladimir Vapnik in 1963 was a linear classifier. However, in 1992, Bernhard Boser, Isabelle Guyon and Vapnik suggested a way to create non-linear classifiers by applying the kernel trick to maximum-margin hyperplanes. The algorithm is very similar, except that every dot product is replaced by a non-linear kernel function as below. This allows the algorithm to fit the maximum-margin hyperplane in a transformed feature space. We have seen SVM as a linear classification problem that finds the maximum margin hyperplane in the given input space. However, for many real world problems a more complex decision boundary is required. The following simple method was devised in order to solve the same linear classification problem but in a higher dimensional space, a 'feature space', under which the maximum margin hyperplane is better suited.

Let be a mapping,

We wish to find a such that our data will be suited for separation by a hyperplane. Given this function, we are lead to solve the previous constrained quadratic optimization on the transformed dataset,

such that and

The solution to this optimization problem is now well known; however a workable must be determined. Possibly the largest drawback in this method is that we must compute the inner product of two vectors in the high dimensional space. As the number of dimensions in the initial data set increases, the inner product becomes computationally intensive or impossible.

However, we have a very useful result that says that there exists a class of functions, , which satisfy the above requirements and that for any function ,

Where K is the kernel function in the input space satisfying Mercer's condition (to guarantee that it indeed corresponds to certain mapping function ). As a result, if the objective function depends on inner products but not on coordinates, we can always use the kernel function to implicitly calculate in the feature space without storing the huge data. Not only does this solve the computation problems but it no longer requires us to explicitly determine a specific mapping function in order to use this method. In fact, it is now possible to use an infinite dimensional feature space in SVM without even knowing the function .

#### Three popular kernel choices in the SVM

The SVM only relies on the inner-product between vectors If every data point is mapped into high-dimensional space via some transformation , the inner-product becomes: is called the kernel function. For SVM, we only need specify the kernel , without need to know the corresponding non-linear mapping, .

There are many types of kernels that can be used in Support Vector Machines models. These include linear, polynomial, radial basis function (RBF) and sigmoid functions.

Linear: ,

Polynomial: ,

Gaussian kernel: ,

Two-layer perceptron: ,

Sigmoid: .

Here, , , and are all kernel parameters.

The RBF is by far the most popular choice of kernel types used in Support Vector Machines. This is mainly because of their localized and finite responses across the entire range of the real x-axis.The art of flexible modeling using basis expansions consists of picking an appropriate family of basis functions, and then controlling the complexity of the representation by selection, regularization, or both. Some of the families of basis functions have elements that are defined locally; for example, -splines are defined locally in . If more flexibility is desired in a particular region, then that region needs to be represented by more basis functions(which in the case of -splines translates to more knots).Kernel methods achieve flexibility by fitting simple models in a region local to the target point . Localization is achieved via a weighting kernl and individual observations receive weights . RBF combine these ideas, by treating the kernel functions as basis functions.

Once we have chosen the Kernel function, we don't need to figure out what is, just use to replace

Since the transformation chosen is dependent on the shape of the data, the only automated way to choose an appropriate kernel is by trial and error. Otherwise it is chosen manually.

### Mercer's Theorem in detail

Let be a mapping to a high dimensional Hibert Space

The transformed coordinates can be defined as,

By Hilbert - Schmidt theory we can represent an inner product in Hilbert space as,

where K is symmetric, then Mercer's theorem gives necessary and sufficient conditions on K for it to satisfy the above relation.

Let C be a compact subset of and K a function , if

then,

converges absolutely and uniformly to a symmetric function

References: Vapnik, V., 1998. Statistical Learning Theory. John Wiley & Sons, {423}

Mercer, J., 1909. Functions of positive and negative type and their connection with the theory of integral equations. Philos. Trans. Roy. Soc. London, A 209:415{446}

### Kernel Functions

There are various kernel functions, for example:

• Linear kernel:
• Polynomial kernel:
• Gaussian kernel:

If is a matrix in the original space, and is a matrix in the Hilbert space (good explanation video: part 1 part 2), then is an matrix. The inner product is also illustrated as correlation, which measures the similarity between data points. This gives us some insight in how to choose the kernel. The choice depends on certain prior knowledge of the problem and on how we believe the similarity of our data should be measured. In practice, the Gaussian (RBF) kernel usually works best. Besides the most common kernel functions mentioned above, many novel kernels are also suggested for different problem domains like text classification, gene classification and so on.

These kernel functions can be applied to many algorithms to derive the "kernel version". For example, kernel PCA, kernel LDA, etc.

### SVM: non-separable case

We have seen how SVMs are able to find an optimally separating hyperplane of two separable classes of data, in which case the margin contains no data points. However, in the real world, data of different classes are usually mixed together at the boundary and it's hard to find a perfect boundary to totally separate them. To address this problem, we slacken the classification rule to allow data cross the margin. Mathematically the problem becomes,

Now each data point can have some error . However, we only want data to cross the boundary when they have to and make the minimum sacrifice; thus, a penalty term is added correspondingly in the objective function to constrain the number of points that cross the margin. The optimization problem now becomes:

File:non-separable.JPG
Figure non-separable case

<br\>Note that is not necessarily smaller than one, which means data can not only enter the margin but can also cross the separating hyperplane.

<br\>Note that is feasible in the separable case, as all . In general, for higher , the sets are more separable.

SVMs are currently among the best performers for many benchmark datasets and have been extended to a number of tasks such as regression. It seems the kernel trick is the most attracting site of SVMs. This idea has now been applied to many other learning models where the inner-product is concerned, and they are called ‘kernel’ methods. Tuning SVMs remains to be the main research focus: how to an optimal kernel? Kernel should match the smooth structure of the data.

## Support Vector Machine algorithm for non-separable cases - November 23, 2009

With the program formulation above, we can form the lagrangian, apply KKT conditions, and come up with a new function to optimize. As we will see, the equation that we will attempt to optimize in the SVM algorithm for non-separable data sets is the same as the optimization for the separable case, with slightly different conditions.

### Forming the Lagrangian

In this case we have have two constraints in the Lagrangian and therefore we optimize with respect to two dual variables and ,

### Applying KKT conditions[34]

1. at an optimal solution , for each primal variable
<br\> since the sign does not make a difference
. This is the only new condition added here
2. , dual feasibility
3. , complementary slackness: and
4. , primal feasibility.

### Putting it all together

With our KKT conditions and the Lagrangian equation, we can now use quadratic programming to find . <br\> Similar to what we did for the separable case after apply KKT conditions, replace the primal variables in terms of dual variables into the Lagrangian equations and simplify.

In matrix form, we want to solve the following optimization:

,

Solving this gives us , which we can use to find as before:

However, we cannot find in the same way as before, even if we choose a point with , because we do not know the value of in the equation

From our discussion on the KKT conditions, we know that and .

So, if then and consequently .

Therefore, we can solve for if we choose a point where:

Note

• When , we are considering a point that is on the margin.
• If then and we're dealing with a point that has crossed the margin.
• In this case, the local minimization is also the global minimization. Since is positive semidefinite, then is convex.

#### The SVM algorithm for non-separable data sets

The algorithm, then, for non-separable data sets is:

1. Use quadprog (or another quadratic programming technique) to solve the above optimization and find
2. Find by solving
3. Find by choosing a point where and then solving

#### Potential drawbacks

Potential drawbacks of the SVM are the following two aspects:

1.Uncalibrated Class membership probabilities[35]

2.The SVM is only directly applicable for two-class tasks. Therefore, algorithms that reduce the multi-class task to several binary problems have to be applied, see the Multi-class SVM section.

3.How to select the kernel function parameters - for Gaussian kernels the width parameter , and the value of in the -insensitive loss function have not entirely solved yet.

some resouces:

1. introduction of SVM[36]

2. SVM in computational biology[37]

## Finishing up SVM - November 25, 2009

### Does SVM find a global minimum?

When we discussed KKT conditions, we listed the necessary conditions for to be a local minimum. However, it would be ideal if we could show that SVM finds a global minimum (unlike, say, neural networks that find a local minimum).

Recall that our conditions, for the non-separable case, are and . These are both convex.

Our lagrangian equation is . Since this is quadratic, it might be convex, but it also may not be; it depends on the matrix . If is a positive semi-definite matrix, then the lagrangian equation is convex.

Recall that is the product of , where . Similar to the notion that squaring any number will give us a positive number in the end, a matrix that is the product of a matrix transposed times itself will result in a positive semi-definite matrix.

So, we know that is positive semi-definite. The lagrangian equation is convex, and therefore, the SVM algorithm finds a global minimum.

## Naive Bayes, Decision Trees, K Nearest Neighbours, Boosting, and Bagging - November 25, 2009

Now that we've covered a number of more advanced classification algorithms, we can look at some of the simpler classification algorithms that are usually discussed at the beginning of a discussion on classification.

### Naive Bayes Classifiers

Recall that one of the major drawbacks of the Bayes classifier was the difficulty in estimating a joint density in a multidimensional space. Naive Bayes classifiers are one possible solution to the problem. They are especially popular for problems with high-dimension feature problems.

A naive Bayes classifier applies a strong independence assumption to the class density . It assumes that inputs within each class are conditionally independent. In other words, it assumes that the value of one feature in a class is unrelated to that of any other feature.

Each of the d marginal densities can be estimated separately using one-dimensional density estimates. If one of the components is discrete then its density can be estimated using a histogram. We can thus mix discrete and continuous variables in a naive Bayes classifier.

Naive Bayes classifiers often perform extremely well in practice despite these 'naive' and seemingly optimistic assumptions. This is because while individual class density estimates could be biased, the bias does not carry through to the posterior probabilities.

It is also possible to train naive Bayes classifiers using maximum likelihood estimation.

### Decision Trees

Decision trees[38] are highly intuitive learning methods that can be thought of as partitioning the feature space into a number of rectangles. Trees can be used for classification, regression, or both. Trees map features of a decision problem onto a conclusion, or label.

We fit a tree model by minimizing some measure of impurity. For a single covariate we choose a point t on the real line that splits the real line into two sets R1 = , R2 = in a way that minimizes impurity.

We denote by the proportion of observations in that .

Algorithm, Overfitting, Examples:[39],[40],[41]

#### Common Node Impurity Measures

Some common node impurity measures are:

• Misclassification error:

• Gini Index:

• Cross-entropy:

### K-Nearest Neighbours Classification

-nearest neighbours is a very simple algorithm that classifies points based on a majority vote of the nearest points in the feature space, with the object being assigned to the class most common among its nearest neighbors. is a positive integer, typically small which is chosen by cross validation. If , then the object is simply assigned to the class of its nearest neighbor.

1. Ties are broken at random.

2. If we assume the features are real, we can use the Euclidean distance in feature space.

3. Since the features are measured in different units, we can standardize the features to have mean zero and variance 1.

#### Property[42]

K-mearest neighbor algorithm has some strong results. As the number of data points goes infinity, the algorithm is guaranteed to yield an error rate no worse than twice the Bayes error rate (the minimum achievable error rate given the distribution of the data). K-nearest neighbor is guaranteed to approach the Bayes error rate, for some value of k (where k increases as a function of the number of data points).

### Boosting

Boosting algorithms are a class of machine learning meta-algorithms that can improve weak classifiers. If we have a weak classifier which slightly does better than random classification, then by assigning larger weights to points which are misclassified and trying to minimize the new cost function, we probably can get a new classifier which classifies with less error. This procedure can be repeated for a finite number of times and then a new classifier which is a weighed aggregation of the generated classifiers will be used as the boosted classifier. The better each generated classifier is the more its weight is in the final classifier.

Paper about Booting: Boosting is a general method for improving the accuracy of any given learning algorithm. This paper introduces the boosting algorithm AdaBoost, and explains the underlying theory of boosting, including an explanation of why boosting often does not suffer from overfitting as well as boosting’s relationship to support-vector machines. Finally, this paper gives some examples of applications of boosting recently.

Let's first look at the original boosting algorithm:

1. Set all the weights of all points equal where we have points.
2. For
1. Find that minimizes the weighted error
where
2. Let
3. Update the weights:
3. The final classifier is

When applying boosting to different classifiers, the first step in 2 may be different since we can define the most proper misclassification error according to the problem. However, the major idea is to give higher weight to misclassified examples, which does not change across classifiers.

Boosting works very well in practice, and there are a lot of research and published works on why it works this well. One possible explanation is that it actually maximizes the margin of classifiers.

We can see that in AdaBoost if training points are accurately classified, then their weights of being used in the next classifier is kept unchanged, while if points are not accurately classified, their weights of being used again is raised. At a result easier examples get classified in the very first few classifiers and hard examples are learned later with increasing emphasis. Finally, all the classifiers are combined through a majority vote, which is also weighted by their accuracy, taking consideration of both the easy and hard points. Thus the AdaBoost focuses on the more informative or difficult points.

#### AnyBoost

Many boosting algorithms belong to a class called AnyBoost which are gradient descent algorithms for choosing linear combinations of elements of an inner product space in order to minimize some cost functional.

We are primarily interested in voted combinations of classifiers

We want to find H such that the cost functional is minimized for a suitable cost function

are weak base classifiers from some class and are classifier weights. The margin of an example is defined by .

The base hypotheses h and their linear combinations H can be considered to be elements of an inner product function space .

We define the inner product as but the AnyBoost algorithm is valid for any cost function and inner product. We have a function as a linear combination of base classifiers and wish to add a base classifier h to H so that cost decreases for arbitrarily small . The direction we seek is found by maximizing

AnyBoost algorithm:

1. For
1. Find that maximizes the inner product
2. If then
1. Return
3. Choose step size
2. The final classifier is

Other voting methods, including AdaBoost, can be viewed as special cases of this algorithm.

### Bagging

Bagging, or bootstrap aggregating, is another meta-technique used to reduce the variance of classifiers with high variability. It exploits the fact that a bootstrap mean is approximately equal to the posterior average. It is most effective for highly nonlinear classifiers such as decision trees. In particular because of the highly unstable nature of these classifiers, they stand most likely to benefit from bagging.

The idea is to train classifiers to using B bootstrap samples from the data set. The final classification is obtained using an average or 'plurality vote' of the B classifiers as follows:

Many classifiers, such as trees, already have underlying functions that estimate the class probabilities at . An alternative strategy is to average these class probabilities instead of the final classifiers. This approach can produce bagged estimates with lower variance and usually better performance.

References: Breiman L, Bagging Predictors, Machine Learning, 24, 123–140 (1996)

### Example

#### Random Forests

A classifier consisting of a collection of tree–structured classifiers where are independently and identically distributed random vectors. The nature and dimensionality of depends on its use in the tree construction. Bagging is such an example. Currently, random forest use randomly selected inputs or combinations of inputs at each node to grow the tree.

How to compare without a test set? Randomly partition the data into 10% and 90% sets. Use the 90% as training data, to grow tree model using cross validation (1-se rule) and also grow a random forest. Then predict the 10% test data. Repeat the procedure 100 times and average the result.R code is as follows.

>misv.tree<-rep(0,100);

>sizev.tree<-rep(0,100);

>misv.forest<-rep(0,100);

>for (j in 1:100)

{
list<-sample(seq(1:683),70,replace=F)
train<-data.frame(bc[- list,]);
test<-data.frame(bc[list,])
tr0<-rpart(factor(Y)~.,data=train, control=rpart.control( minsplit=10, minbucket=5, cp=0.0,xval=10))
x<-printcp(tr0)
bs<-x[1,2]+1;
min<-x[1,4];
cpv<-x[1,1];
stde<-x[1,5]
for (i in 1:length(x[,1]))
{
if(x[i,4]<min )
{
min<-x[i,4]
bs<-x[i,2]+1
cpv<-x[i,1]
stde<-x[i,5]
}
}
limit<-min+stde  ;
index<-0  ;
for(i in 1:length(x[,1]))
{
if(index<1){
if(x[i,4]>limit)
{
bs<-x[i+1,2]+1
cpv<-x[i+1,1]
}
else index<-2 }
}
tr<-prune(tr0,cp=cpv)  # prune tree
fity<-predict(tr,newdata=test,type='class')
table<-table(test[,1],fity)
mis<-table[1,2]+table[2,1]
misv.tree[j]<-mis
sizev.tree[j]<-bs
forest<-randomForest(factor(Y)~.,data=train,mtry=4,ntree=100) # random forest
fity<-predict(forest,newdata=test,type='class')
table<-table(test[,1],fity)
mis<-table[1,2]+table[2,1]
misv.forest[j]<-mis


}