Towards Coastal Threat Evaluation Decision Support Presentation by Jacques du Toit Operational Research University of Stellenbosch 3 December 2010.

Slides:



Advertisements
Similar presentations
Ziming Zhang, Yucheng Zhao and Yiwen Wan.  Introduction&Motivation  Problem Statement  Paper Summeries  Discussion and Conclusions.
Advertisements

Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
VLDB  Motivation  TraClass: Trajectory Feature Generation  Trajectory Partitioning  Region-Based Clustering  Trajectory-Based.
An Overview of Machine Learning
Vision Based Control Motion Matt Baker Kevin VanDyke.
On-Line Probabilistic Classification with Particle Filters Pedro Højen-Sørensen, Nando de Freitas, and Torgen Fog, Proceedings of the IEEE International.
Data Visualization STAT 890, STAT 442, CM 462
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Supervised learning Given training examples of inputs and corresponding outputs, produce the “correct” outputs for new inputs Two main scenarios: –Classification:
Supervised and Unsupervised learning and application to Neuroscience Cours CA6b-4.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
Dieter Pfoser, LBS Workshop1 Issues in the Management of Moving Point Objects Dieter Pfoser Nykredit Center for Database Research Aalborg University, Denmark.
Lecture #1COMP 527 Pattern Recognition1 Pattern Recognition Why? To provide machines with perception & cognition capabilities so that they could interact.
Modeling Gene Interactions in Disease CS 686 Bioinformatics.
Video Mining Learning Patterns of Behaviour via an Intelligent Image Analysis System.
Biomedical Image Analysis and Machine Learning BMI 731 Winter 2005 Kun Huang Department of Biomedical Informatics Ohio State University.
SOMTIME: AN ARTIFICIAL NEURAL NETWORK FOR TOPOLOGICAL AND TEMPORAL CORRELATION FOR SPATIOTEMPORAL PATTERN LEARNING.
Introduction to machine learning
Introduction to Data Mining Engineering Group in ACL.
CSC 478 Programming Data Mining Applications Course Summary Bamshad Mobasher DePaul University Bamshad Mobasher DePaul University.
Exercise Session 10 – Image Categorization
Learning to classify the visual dynamics of a scene Nicoletta Noceti Università degli Studi di Genova Corso di Dottorato.
Tracking Pedestrians Using Local Spatio- Temporal Motion Patterns in Extremely Crowded Scenes Louis Kratz and Ko Nishino IEEE TRANSACTIONS ON PATTERN ANALYSIS.
ECSE 6610 Pattern Recognition Professor Qiang Ji Spring, 2011.
Anomaly detection with Bayesian networks Website: John Sandiford.
COMP3503 Intro to Inductive Modeling
3D Motion Capture Assisted Video human motion recognition based on the Layered HMM Myunghoon Suk & Ashok Ramadass Advisor : Dr. B. Prabhakaran Multimedia.
Trends in Computer Vision Automatic Video Surveillance.
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
Machine Learning in Spoken Language Processing Lecture 21 Spoken Language Processing Prof. Andrew Rosenberg.
COMMON EVALUATION FINAL PROJECT Vira Oleksyuk ECE 8110: Introduction to machine Learning and Pattern Recognition.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
Image Classification 영상분류
CVPR Workshop on RTV4HCI 7/2/2004, Washington D.C. Gesture Recognition Using 3D Appearance and Motion Features Guangqi Ye, Jason J. Corso, Gregory D. Hager.
Overview of Part I, CMSC5707 Advanced Topics in Artificial Intelligence KH Wong (6 weeks) Audio signal processing – Signals in time & frequency domains.
Signal Processing Emphasis Group Robert Moorhead Roger King Joe Picone Nick Younan Jim Fowler Lori Bruce Jenny Du.
Using Inactivity to Detect Unusual behavior Presenter : Siang Wang Advisor : Dr. Yen - Ting Chen Date : Motion and video Computing, WMVC.
Pattern Recognition April 19, 2007 Suggested Reading: Horn Chapter 14.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Kansas State University Department of Computing and Information Sciences CIS 730: Introduction to Artificial Intelligence Friday, 14 November 2003 William.
 Present by 陳群元.  Introduction  Previous work  Predicting motion patterns  Spatio-temporal transition distribution  Discerning pedestrians  Experimental.
Data Mining and Decision Support
CSC 478 Programming Data Mining Applications Course Summary Bamshad Mobasher DePaul University Bamshad Mobasher DePaul University.
Target Tracking In a Scene By Saurabh Mahajan Supervisor Dr. R. Srivastava B.E. Project.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Tracking Groups of People for Video Surveillance Xinzhen(Elaine) Wang Advisor: Dr.Longin Latecki.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Neural Network Approximation of High- dimensional Functions Peter Andras School of Computing and Mathematics Keele University
Speech Enhancement based on
A PPLICATIONS OF TOPIC MODELS Daphna Weinshall B Slides credit: Joseph Sivic, Li Fei-Fei, Brian Russel and others.
Machine learning & object recognition Cordelia Schmid Jakob Verbeek.
DATA MINING and VISUALIZATION Instructor: Dr. Matthew Iklé, Adams State University Remote Instructor: Dr. Hong Liu, Embry-Riddle Aeronautical University.
Who am I? Work in Probabilistic Machine Learning Like to teach 
Machine Learning for Computer Security
Deep Learning Amin Sobhani.
Introduction Machine Learning 14/02/2017.
Introductory Seminar on Research: Fall 2017
Unsupervised Learning and Autoencoders
What is Pattern Recognition?
Finding Clusters within a Class to Improve Classification Accuracy
Introduction to Pattern Recognition
Supervised vs. unsupervised Learning
Earthen Mounds Recognition Using LiDAR Images
Speech recognition, machine learning
CAMCOS Report Day December 9th, 2015 San Jose State University
Speech recognition, machine learning
Machine Learning in Business John C. Hull
Automated traffic congestion estimation via public video feeds
What is Artificial Intelligence?
Presentation transcript:

Towards Coastal Threat Evaluation Decision Support Presentation by Jacques du Toit Operational Research University of Stellenbosch 3 December 2010

2/28 Overview The Problem Machine Learning/Pattern Recognition Classification Clustering Learning Behavioural Patterns Application Data Methods Summary

3/28 Background: The Problem Maritime Threats Smuggling Trafficking Poaching/Illegal Fishing Threat Evaluation Detection Prediction Why? Limited resources Vast area

4/28 Background: EEZ Exclusive Economic Zone

5/28 Background: Awarenet Maritime area surveillance system Sense, detect & track Recognise/identify Assess threat Complex System Integration of external data Data Processing Class estimation Behavioural analysis Intent estimation/threat level [1]

6/28 MLPR: Introduction Standard classifier Feature Selection Feature Extraction

7/28 MLPR: Introduction Feature extraction: PCA

8/28 MLPR: Classification Iris Data

9/28 MLPR: Regression Chirps

10/28 MLPR: Learning Training a classifier But does such a system 'learn'?

11/28 MLPR: Supervised/Unsupervised Supervised: Classifier trained on labelled examples Predict class of unseen instance Unsupervised No labels System must 'discover' structure

12/28 Learning Behavioural Patterns (LBP) Computer Vision Video surveillance  Event Recognition  Detection/classification of highway lanes Design of virtual spaces Behaviour Analysis Ecological modelling Pedestrian movement

13/28 LBP: Data Considerations Spatio-temporal analysis Noise

14/28 LBP: Towards Coastal TE Why this approach? Vessels movement not random Persistent sensors Volumes of data Requirements Online Anomaly/novelty detection Flexible/robust Measure of uncertainty

15/28 LBP: Towards Coastal TE

16/28 Data AIS Data Position Time Speed Course

17/28 Data Area Considered

18/28 Data Update frequency

19/28 Data Observations per class

20/28 Data Fundamental Assumption

21/28 Preprocessing Approximate Spatial data Least Squares B-Spline curves Resampling Linear method Duplicate times

22/28 Data The behaviour of anchored vessels

23/28 Features Flow vectors Sinuosity and curvature Bounding box Coefficients (parametric methods)

24/28 HMM Successfully applied in speech recognition Probabilistic approach Bashir et al [2] Hidden states modelled as GMM's Temporal causality Subtrajectories represented by PCA coefficients

25/28 SOM Neural network Unsupervised learning method Online method Johnson & Hogg [3] Construct pdf of point vectors  Vector quantization Owens & Hunter [4] Pre-process data

26/28 Summary MLPR Exploratory analysis Real-time Performance evaluation – real data High level language

27/28 Questions

28/28 References [1] CSIR, Awarenet: Persistent, ubiquitous surveillance technologies for enhanced national security, [Online], 2007, [Cited June 7th, 2010], Available from [2]Bashir FI, Khokhar AA & Schonfeld D, 2007, Object trajectory-based activity classification and recognition using hidden markov models, IEEE Transactions on Image Processing, 16(7), pp. 1912–1919. [3]Johnson N & Hogg D, 1996, Learning the distribution of object trajectories for event recognition, Image and Vision Computing, 14(8), pp. 609–615. [4]Owens, J. & Hunter, A, 2000, Application of the self-organising map to trajectory classification, Proceedings of third IEEE International Workshop on Visual Surveillance, pp