1 Giuseppe Romeo Voronoi based Source Detection. 2 Voronoi cell The Voronoi tessellation is constructed as follows: for each data point  i (also called.

Slides:



Advertisements
Similar presentations
Sampling Design, Spatial Allocation, and Proposed Analyses Don Stevens Department of Statistics Oregon State University.
Advertisements

Alpha Shapes. Used for Shape Modelling Creates shapes out of point sets Gives a hierarchy of shapes. Has been used for detecting pockets in proteins.
Fast Algorithms For Hierarchical Range Histogram Constructions
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Gino Tosti – INFN Perugia1DC2 Closeout Meeting - GSFC May 31 –June 2, 2006 Source Detection with the Perugia Wavelet code (PGWave) Gamma-ray Large Area.
Rule-based Cross-matching of Very Large Catalogs Patrick Ogle and the NED Team IPAC, California Institute of Technology.
A New Approach to Cluster Finding and Hit Reconstruction in Cathode Pad Chambers and its Development for the Forward Muon Spectrometer of ALICE A.Zinchenko,
Ruslana Mys Delaunay Triangulation Delaunay Triangulation (DT)  Introduction  Delaunay-Voronoi based method  Algorithms to compute the convex hull 
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
3/5/15CMPS 3130/6130 Computational Geometry1 CMPS 3130/6130 Computational Geometry Spring 2015 Delaunay Triangulations II Carola Wenk Based on: Computational.
3D spherical gridding based on equidistant, constant volume cells for FV/FD methods A new method using natural neighbor Voronoi cells distributed by spiral.
Spatial Information Systems (SIS)
Voronoi Diagram Presenter: GI1 11號 蔡逸凡
GLAST Science Support CenterAugust 9, 2004 Likelihood Analysis of LAT Data James Chiang (GLAST SSC – SLAC)
Discrete geometry Lecture 2 1 © Alexander & Michael Bronstein
1cs542g-term Notes. 2 Meshing goals  Robust: doesn’t fail on reasonable geometry  Efficient: as few triangles as possible Easy to refine later.
Delaunay Triangulation Computational Geometry, WS 2006/07 Lecture 11 Prof. Dr. Thomas Ottmann Algorithmen & Datenstrukturen, Institut für Informatik Fakultät.
Geometric Data Structures Dr. M. Gavrilova. Lecture Plan Voronoi diagrams Trees and grid variants.
Delaunay Triangulation on the GPU Dan Maljovec. CPU Delaunay Triangulation Randomized Incremental Algorithm 1.Construct Bounding triangle 2.Choose point.
8. Statistical tests 8.1 Hypotheses K. Desch – Statistical methods of data analysis SS10 Frequent problem: Decision making based on statistical information.
7 June 06 1 UW Point Source Detection and Localization: Compare with DC2 truth Toby Burnett University of Washington.
Lecture 10 : Delaunay Triangulation Computational Geometry Prof. Dr. Th. Ottmann 1 Overview Motivation. Triangulation of Planar Point Sets. Definition.
February 2004GLAST - DC1 Closeout Meeting GRB Detection & spectral analysis in DC1 Data Nicola Omodei Francesco Longo, Monica Brigida INFN Pisa.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
Delaunay circumcircle Empty Circle (Sphere) Property:
GLAST Science Support Center February 12, 2004 DC1 Closeout Detecting Gamma-Ray Bursts in the DC1 Data David Band (GSSC)
UNC Chapel Hill M. C. Lin Overview of Last Lecture About Final Course Project –presentation, demo, write-up More geometric data structures –Binary Space.
Computing the Delaunay Triangulation By Nacha Chavez Math 870 Computational Geometry; Ch.9; de Berg, van Kreveld, Overmars, Schwarzkopf By Nacha Chavez.
Source detection at Saclay Look for a fast method to find sources over the whole sky Provide list of positions, allowing to run maximum likelihood locally.
C&A 10April06 1 Point Source Detection and Localization Using the UW HealPixel database Toby Burnett University of Washington.
THB Source Catalog Meeting 12/21/05 1 Healpixels and Wavelets Toby Burnett and Bruce Lesnick University of Washington.
Delaunay Triangulations Presented by Glenn Eguchi Computational Geometry October 11, 2001.
Voronoi diagrams and applications Prof. Ramin Zabih
Voronoi Diagrams 1.Given a set of points S in the plane, which are the Voronoi sites. 2.Each site s has a Voronoi cell, also called a Dirichlet cell, V(s)
GSCII Project Gauging the quality of the GSCII DB with QA_2plates: First results R. Pannunzio, R. Morbidelli, A Spagna, M. G.Lattanzi.
Using potential field extrapolations of active region magnetic fields, observed by SOHO/MDI, as a representation of a real active region, we apply hydrostatic.
Adam Zok Science Undergraduate Laboratory Internship Program August 14, 2008.
Udine Nicola Omodei 1 GRB Trigger Algorithms From DC1 to DC2 Nicola Omodei Riccardo Giannitrapani Francesco Longo Monica Brigida.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
A statistical test for point source searches - Aart Heijboer - AWG - Cern june 2002 A statistical test for point source searches Aart Heijboer contents:
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Source catalog generation Aim: Build the LAT source catalog (1, 3, 5 years) Jean Ballet, CEA SaclayGSFC, 29 June 2005 Four main functions: Find unknown.
Kansas State University Department of Computing and Information Sciences Friday, July 13, 2001 Mantena V. Raju Department of Computing and Information.
L8 - Delaunay triangulation L8 – Delaunay triangulation NGEN06(TEK230) – Algorithms in Geographical Information Systems.
Delaunay Triangulation on the GPU
UNC Chapel Hill M. C. Lin Delaunay Triangulations Reading: Chapter 9 of the Textbook Driving Applications –Height Interpolation –Constrained Triangulation.
2005 Unbinned Point Source Analysis Update Jim Braun IceCube Fall 2006 Collaboration Meeting.
Source catalog generation for DC2 Aim (in order of priority): 1.Improve on source detection algorithm and error box. 2.Provide a list of source identifications.
Extragalactic Survey with MAXI and First MAXI/GSC Catalog Extragalactic Survey with MAXI and First MAXI/GSC Catalog Yoshihiro Ueda Kazuo Hiroi, Naoki Isobe,
3/3/15CMPS 3130/6130 Computational Geometry1 CMPS 3130/6130 Computational Geometry Spring 2015 Delaunay Triangulations I Carola Wenk Based on: Computational.
June 27-29, DC2 Software Workshop - 1 Tom Stephens GSSC Database Programmer GSSC Data Servers for DC2.
Event Shapes, A. Everett, U. WisconsinZEUS Meeting, March 6, Some Slides for Michele There is no subtitle.
2011, 10th AprilIII Fermi symposium , 10th AprilIII Fermi symposium2.
Spatial Searches in the ODM. slide 2 Common Spatial Questions Points in region queries 1.Find all objects in this region 2.Find all “good” objects (not.
Clustering In Mobile Networks Presented By: Assaf Mizrachi Shimrit Artzi Tutor: Dr. Michael Segal.
Coverage and Deployment 1. Coverage Problems Coverage: is a measure of the Quality of Service (QoS) of a sensor network How well can the network observe.
Photon Event Maps Source Detection Transient Detection Jeff Scargle
Jean Ballet, CEA Saclay GSFC, 31 May 2006 All-sky source search
Application of HEALpix Pixelization to Gamma-ray Data
First day: Planets, Sun and Moon
Source Detection by Count Excess
Wavelet Analysis for Sources Detection
Nearest-Neighbor Classifiers
Source catalogue generation
Predicting ligand binding sites on protein surface
Fun with DC1: GRB Triggers, Localizations, Etc.
Pattern Recognition and Image Analysis
Computer Vision Chapter 4
Lecture 6: Counting triangles Dynamic graphs & sampling
Presentation transcript:

1 Giuseppe Romeo Voronoi based Source Detection

2 Voronoi cell The Voronoi tessellation is constructed as follows: for each data point  i (also called node), let D i be the area consisting of all locations in the space which are closer to  i than to any other point of N. This definition is applicable to Voronoi tessellations in any metric space. The area D i is the Voronoi cell.

3 Spherical Tessellation Spherical Voronoi tessellation is achieved by first performing a Delaunay triangulation, which is so defined: for a set P of points in the R 2, the triangulation DT(P) of P is such that no point in P is inside the circumcircle of any triangle in DT(P)

4 Spherical Tessellation Tessellation of random point on a sphere

5 Computational load For n data points,  Non optimized code, time spent for tessellation goes as O(n 2 log n)  Using optimized code, with “divide and conquer” algorithm, the time spent goes as O(n log n)!

6 Source Finding, assumptions  Each Voronoi cell contains only one event (photon)  The cell area distribution follows a Poisson statistics: Where with and

7 Area Distribution, No Sources randomly generated data points, no sources included

8 DC2 data  The whole sky was subdivided in 9 regions  galactic coordinates where used instead of RA & DEC. This allowed the region with the galactic plane not to drive the whole sky for the threshold area identification used for the Voronoi cut.

9 Area Distribution, with Sources Data from DC2, with 0 =< L =< 120, and 20 =< B =< 90 ( data points):

10 Voronoi Source Detection, the method 1. Remove any photon whose Voronoi cell area is larger than +3*  (This usually removes any photon that is at the boundary of the region under consideration) 2. Find the “Threshold” cell area  t, and remove any photon whose cell area is larger than  t. 3. From  t find a binning size to bin data in L. 4. Find local maxima in L, and B which give the location of a potential source and their errors.

11 DC2 data

12 DC2 data

13 DC2 data

14 DC2 data

15 Results  The Voronoi based sources detection finds 2550 potential sources. Other methods must be used to remove the large number of false positive (more to come)  Comparing with DC2 source catalog, 341 sources were identified (~91%)  ~10 hours were needed to process all data/all sky

16 PSF study Goal: Goal: check source detection method by comparing the predicted PSF with the distribution of counts. Description of the method Description of the method: _For each detected source calculate the distribution of counts (background subtracted). _Compare the distribution of counts with the predicted PSF in the position of the source. _Calculate cumulative predicted PSF and the cumulative distribution of counts.

17 PSF study (cont.) Predicted PSF: Obtain the predicted PSF using gtpsf. This generates a fits file with the differential PSF for different energy bins. Generate “one” PSF weighted by the number of counts in each energy bin. Calculate the cumulative distribution.

18 PSF study (cont.) Distribution of counts: _ Bin the data (radial distribution). _ Calculate the differential distribution of counts. _ Calculate the cumulative distribution of counts.

19 PSF-study (examples) RA =  DEC= 

20 PSF-study (examples-cont.) RA =  DEC= 

21 PSF-study (examples-cont.) RA =  DEC= 