LLNL-PRES-671957 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.

Slides:



Advertisements
Similar presentations
Advanced topics.
Advertisements

An Overview of Machine Learning
Data Visualization STAT 890, STAT 442, CM 462
ETHEM ALPAYDIN © The MIT Press, Lecture Slides for.
Introduction to Machine Learning Anjeli Singh Computer Science and Software Engineering April 28 th 2008.
ML ALGORITHMS. Algorithm Types Classification (supervised) Given -> A set of classified examples “instances” Produce -> A way of classifying new examples.
Statistical Learning: Pattern Classification, Prediction, and Control Peter Bartlett August 2002, UC Berkeley CIS.
Data Mining – Intro.
INTRODUCTION TO Machine Learning 3rd Edition
CSE 515 Statistical Methods in Computer Science Instructor: Pedro Domingos.
Introduction to Data Mining Engineering Group in ACL.
Information Retrieval in Practice
OLAM and Data Mining: Concepts and Techniques. Introduction Data explosion problem: –Automated data collection tools and mature database technology lead.
CS598CXZ Course Summary ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
MACHINE LEARNING 張銘軒 譚恆力 1. OUTLINE OVERVIEW HOW DOSE THE MACHINE “ LEARN ” ? ADVANTAGE OF MACHINE LEARNING ALGORITHM TYPES  SUPERVISED.
Anomaly detection with Bayesian networks Website: John Sandiford.
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
Chapter 1 Introduction to Data Mining
Master Thesis Defense Jan Fiedler 04/17/98
Bayesian networks Classification, segmentation, time series prediction and more. Website: Twitter:
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
1 Machine Learning 1.Where does machine learning fit in computer science? 2.What is machine learning? 3.Where can machine learning be applied? 4.Should.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Copyright © 2012, SAS Institute Inc. All rights reserved. ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY,
Machine Learning Extract from various presentations: University of Nebraska, Scott, Freund, Domingo, Hong,
Learning from Positive and Unlabeled Examples Investigator: Bing Liu, Computer Science Prime Grant Support: National Science Foundation Problem Statement.
Lecture 2: Statistical learning primer for biologists
1 Unsupervised Learning and Clustering Shyh-Kang Jeng Department of Electrical Engineering/ Graduate Institute of Communication/ Graduate Institute of.
Unsupervised Mining of Statistical Temporal Structures in Video Liu ze yuan May 15,2011.
Neural Networks Presented by M. Abbasi Course lecturer: Dr.Tohidkhah.
GA 1 CASC Discovery of Access Patterns to Scientific Simulation Data Ghaleb Abdulla LLNL Center for Applied Scientific Computing.
Data Mining and Decision Support
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Guided By Ms. Shikha Pachouly Assistant Professor Computer Engineering Department 2/29/2016.
Text Information Management ChengXiang Zhai, Tao Tao, Xuehua Shen, Hui Fang, Azadeh Shakery, Jing Jiang.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Introduction to Azure Machine Learning and Data Mining algorithms Oleksandr Krakovetskyi CEO, DevRain Solutions PhD, Microsoft Regional
Data Summit 2016 H104: Building Hadoop Applications Abhik Roy Database Technologies - Experian LinkedIn Profile:
Machine learning & object recognition Cordelia Schmid Jakob Verbeek.
András Benczúr Head, “Big Data – Momentum” Research Group Big Data Analytics Institute for Computer.
Introduction to Machine Learning, its potential usage in network area,
Brief Intro to Machine Learning CS539
CSE 4705 Artificial Intelligence
Big data classification using neural network
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Machine Learning with Spark MLlib
Machine Learning for Computer Security
Siemens Enables Digitalization: Data Analytics & Artificial Intelligence Dr. Mike Roshchin, CT RDA BAM.
Introduction Machine Learning 14/02/2017.
Eick: Introduction Machine Learning

CSE 4705 Artificial Intelligence
Restricted Boltzmann Machines for Classification
Data Mining 101 with Scikit-Learn
Multimodal Learning with Deep Boltzmann Machines
Introductory Seminar on Research: Fall 2017
CH. 1: Introduction 1.1 What is Machine Learning Example:
Data Mining: Concepts and Techniques Course Outline
Unsupervised Learning and Autoencoders
What is Pattern Recognition?
Basic Intro Tutorial on Machine Learning and Data Mining
Data Warehousing and Data Mining
Department of Electrical Engineering
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Christoph F. Eick: A Gentle Introduction to Machine Learning
Machine Learning for Space Systems: Are We Ready?
Machine learning: What is it?
Patterson: Chap 1 A Review of Machine Learning
Presentation transcript:

LLNL-PRES This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA Lawrence Livermore National Security, LLC Application of Machine Learning Patterns and Behaviors in Complex Systems SSCI James M. Brase Deputy Associate Director, Computation Lawrence Livermore National Laboratory

LLNL-PRES Machine learning is applied to a broad set of applications at LLNL Document analysis – Is this document relevant to topic Y? Topics are defined as distributions of terms, phrases, phrase graphs …. Cybersecurity – How many network connections do we expect node A to make in the next minute? Materials science – Discovery of patterns in component material attributes and critical reaction parameters to produce custom- designed properties Adaptive mesh simulation- Will this simulation parameter set cause the mesh to tangle? Image and multimedia analysis – Can we label the objects in this image? Can we find other, similar videos?

Lawrence Livermore National Laboratory LLNL-PRES Machine learning – statistical inference of patterns in data Training data Feature vectors Labels Training set Supervised learning – Mapping feature vectors to labels Discrete labels – classifiers Continuous labels – regression Function mapping Logistic regression Random forests Neural networks Unsupervised learning – Finding structure in data Association rules Clustering Density estimation Autoencoders New data Feature vector Training…. Applying….

Lawrence Livermore National Laboratory LLNL-PRES Learning language models for estimating document relevance New documents Keyphrase extractor Weak filtering Entity extractor Collocation filter New document graph Training graph models Graph classifier Relevant graphs vs backround graphs Relevance score Forced migration reference documents

Lawrence Livermore National Laboratory LLNL-PRES Document relevance for the NYT corpus Relevance to forced migration reference document set

Lawrence Livermore National Laboratory LLNL-PRES Cybersecurity uses machine learning and graph analysis to model network behavior Applications Inferring node and group roles Prediction of activity distributions Cueing analysts to anomalous behaviors Functional network discovery and characterization Collect packets, flow and process data from the full physical network Build a dynamic graph representation of activity Machine learning on the dynamic graph Node and group classification algorithms Temporal activity models – dynamic Bayesian networks Anomaly detection algorithms Stream processing for feature and signature extraction

Lawrence Livermore National Laboratory LLNL-PRES Ryan Rossi, Brian Gallagher, Jennifer Neville, Keith Henderson. Modeling Dynamic Behavior in Large Evolving Graphs. ACM International Conference on Web Search and Data Mining (WSDM), Learning Markov models for behavior forecasting Host role learning Anomaly Detection in host role distribution Dynamic IP-IP graph Reduced prediction error using host roles Host roles are local characteristics of the IP-IP graph structure e.g. “center of star”, end node, …

Lawrence Livermore National Laboratory LLNL-PRES Some R&D directions in machine learning Training data Feature vectors Labels Training set Training…. Features have traditionally been hand engineered. Is there a principled approach to finding a good set of features?  Deep learning We usually deal with N>>D. In emerging app’s we can have N<<D. (e.g. genomics,...). Can we regularize (constrain the solutions) with mechanistic models? N D

Lawrence Livermore National Laboratory LLNL-PRES Deep learning provides an unsupervised approach to learning feature sets from data

Lawrence Livermore National Laboratory LLNL-PRES Deep machine learning research is extending pattern recognition and discovery beyond human capabilities Learning patterns in 100M random images from Flickr Airplanes neuron “Fireworks” neuron Images w. text neuron Discovering complex patterns in massive multisource intelligence data sets guided by science-based models – not exact keywords Image recognition performance now surpasses human accuracy Partnership with Stanford and UC Berkeley on algorithms, NVIDIA on large GPU implementations, and IBM on neurosynaptic architectures 100B synapse deep learning networks

Lawrence Livermore National Laboratory LLNL-PRES Data movement is the limiting factor for analytics – supplementing the memory hierarchy Partnership with Intel and Cray to develop a 150 TF/s data analytics computer Technical focus on NVRAM layers in memory hierarchy supporting 24 core node – prototyping analytics in new environment Initial applications will focus on  Prototyping exascale simulation analysis architectures  Bioinformatics algorithms  Graph analytics Over 5GB DRAM & 36GB NVRAM per core