Search results for "Bayesian probability"

showing 10 items of 217 documents

Bayesian joint modeling of bivariate longitudinal and competing risks data: An application to study patient-ventilator asynchronies in critical care …

2017

Mechanical ventilation is a common procedure of life support in intensive care. Patient-ventilator asynchronies (PVAs) occur when the timing of the ventilator cycle is not simultaneous with the timing of the patient respiratory cycle. The association between severity markers and the events death or alive discharge has been acknowledged before, however, little is known about the addition of PVAs data to the analyses. We used an index of asynchronies (AI) to measure PVAs and the SOFA (sequential organ failure assessment) score to assess overall severity. To investigate the added value of including the AI, we propose a Bayesian joint model of bivariate longitudinal and competing risks data. Th…

RiskStatistics and ProbabilityMixed modelmedicine.medical_specialtyBiometryCritical Caremedicine.medical_treatmentBayesian probabilityBivariate analysisCompeting risks01 natural sciences010104 statistics & probability03 medical and health sciences0302 clinical medicineIntensive careStatisticsmedicineHumansLongitudinal Studies0101 mathematicsMechanical ventilationModels Statisticalbusiness.industryRespirationBayes TheoremGeneral MedicineRespiration Artificial030228 respiratory systemLife supportEmergency medicineSOFA scoreStatistics Probability and UncertaintybusinessBiometrical Journal
researchProduct

“Anti-Bayesian” flat and hierarchical clustering using symmetric quantiloids

2017

A myriad of works has been published for achieving data clustering based on the Bayesian paradigm, where the clustering sometimes resorts to Naive-Bayes decisions. Within the domain of clustering, the Bayesian principle corresponds to assigning the unlabelled samples to the cluster whose mean (or centroid) is the closest. Recently, Oommen and his co-authors have proposed a novel, counter-intuitive and pioneering PR scheme that is radically opposed to the Bayesian principle. The rational for this paradigm, referred to as the “Anti-Bayesian” (AB) paradigm, involves classification based on the non-central quantiles of the distributions. The first-reported work to achieve clustering using the A…

Scheme (programming language)Information Systems and ManagementTheoretical computer scienceComputer scienceBayesian principleBayesian probabilityVDP::Matematikk og Naturvitenskap: 400::Matematikk: 410::Statistikk: 412Multivariate normal distribution0102 computer and information sciences02 engineering and technology01 natural sciencesDomain (mathematical analysis)ClusteringTheoretical Computer ScienceArtificial Intelligence0103 physical sciencesCluster (physics)0202 electrical engineering electronic engineering information engineering010306 general physicsCluster analysiscomputer.programming_languageCentroidComputer Science ApplicationsHierarchical clustering010201 computation theory & mathematicsControl and Systems EngineeringAnti-Bayesian classification020201 artificial intelligence & image processingcomputerSoftwareQuantiloidsQuantile
researchProduct

Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning

2012

Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…

Scheme (programming language)Mathematical optimizationDiscretizationLearning automataComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422estimator algorithmsBayesian probabilityBayesian reasoninglearning automataEstimatorVDP::Technology: 500::Information and communication technology: 550discretized learningBayesian inferenceAction (physics)Reinforcement learningArtificial intelligencepursuit schemesbusinesscomputercomputer.programming_language
researchProduct

Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters

2010

Published version of an article from Lecture Notes in Computer Science. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_21 The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Dynamically changing (non-stationary) bandit problems are particularly challenging because each change of the reward distributions may progressively degrade the performance of any fixed strategy. Alt…

Scheme (programming language)Mathematical optimizationOptimization problemComputer scienceBayesian probabilityVDP::Technology: 500::Information and communication technology: 550Kalman filterBayesian inferenceMulti-armed banditVDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425computerThompson samplingOptimal decisioncomputer.programming_language
researchProduct

Thompson Sampling Guided Stochastic Searching on the Line for Adversarial Learning

2015

The multi-armed bandit problem has been studied for decades. In brief, a gambler repeatedly pulls one out of N slot machine arms, randomly receiving a reward or a penalty from each pull. The aim of the gambler is to maximize the expected number of rewards received, when the probabilities of receiving rewards are unknown. Thus, the gambler must, as quickly as possible, identify the arm with the largest probability of producing rewards, compactly capturing the exploration-exploitation dilemma in reinforcement learning. In this paper we introduce a particular challenging variant of the multi-armed bandit problem, inspired by the so-called N-Door Puzzle. In this variant, the gambler is only tol…

Scheme (programming language)business.industryComputer scienceBayesian probabilityBayesian inferenceMulti-armed banditLine (geometry)Reinforcement learningArtificial intelligenceRepresentation (mathematics)businessThompson samplingcomputercomputer.programming_language
researchProduct

Bayesian Analysis of a Future Beta Decay Experiment's Sensitivity to Neutrino Mass Scale and Ordering

2021

Bayesian modeling techniques enable sensitivity analyses that incorporate detailed expectations regarding future experiments. A model-based approach also allows one to evaluate inferences and predicted outcomes, by calibrating (or measuring) the consequences incurred when certain results are reported. We present procedures for calibrating predictions of an experiment's sensitivity to both continuous and discrete parameters. Using these procedures and a new Bayesian model of the $\beta$-decay spectrum, we assess a high-precision $\beta$-decay experiment's sensitivity to the neutrino mass scale and ordering, for one assumed design scenario. We find that such an experiment could measure the el…

Semileptonic decaydata analysis methodParticle physicsBayesian probabilityFOS: Physical sciences[PHYS.NEXP]Physics [physics]/Nuclear Experiment [nucl-ex]Bayesian inferenceBayesian01 natural sciencesMeasure (mathematics)statistics: Bayesianmass: scaleHigh Energy Physics - Phenomenology (hep-ph)0103 physical sciencesCalibrationneutrino: massSensitivity (control systems)Nuclear Experiment (nucl-ex)010306 general physicsNuclear ExperimentPhysics010308 nuclear & particles physicsElectroweak InteractionProbability and statisticssemileptonic decaycalibrationsensitivityneutrino: nuclear reactorHigh Energy Physics - Phenomenologymass: calibration[PHYS.HPHE]Physics [physics]/High Energy Physics - Phenomenology [hep-ph]Physics - Data Analysis Statistics and ProbabilityspectralHigh Energy Physics::ExperimentNeutrinoData Analysis Statistics and Probability (physics.data-an)[PHYS.PHYS.PHYS-DATA-AN]Physics [physics]/Physics [physics]/Data Analysis Statistics and Probability [physics.data-an]Symmetries
researchProduct

Analysis of the Overdispersed Clock in the Short-Term Evolution of Hepatitis C Virus: Using the E1/E2 Gene Sequences to Infer Infection Dates in a Si…

2006

Abstract The assumption of a molecular clock for dating events from sequence information is often frustrated by the presence of heterogeneity among evolutionary rates due, among other factors, to positively selected sites. In this work, our goal is to explore methods to estimate infection dates from sequence analysis. One such method, based on site stripping for clock detection, was proposed to unravel the clocklike molecular evolution in sequences showing high variability of evolutionary rates and in the presence of positive selection. Other alternatives imply accommodating heterogeneity in evolutionary rates at various levels, without eliminating any information from the data. Here we pre…

Sequence analysisrate heterogeneityBayesian probabilityHepacivirusBiologyArticleDisease OutbreaksEvolution Moleculardating infection eventsViral Envelope ProteinsMolecular evolutionStatisticsGeneticsHumansMolecular clockMolecular BiologyPhylogenyEcology Evolution Behavior and SystematicsSequence (medicine)GeneticsMolecular Epidemiologymolecular clockpositively selected sitesBayes TheoremRegression analysisHepatitis CTerm (time)RNA ViralPairwise comparisonMolecular Biology and Evolution
researchProduct

Design of an Adaptive Bayesian System for Sensor Data Fusion

2014

Many artificial intelligent systems exploit a wide set of sensor devices to monitor the environment. When the sensors employed are low-cost, off-the-shelf devices, such as Wireless Sensor Networks (WSN), the data gathered through the sensory infrastructure may be affected by noise, and thus only partially correlated to the phenomenon of interest. One way of overcoming these limitations might be to adopt a high-level method to perform multi-sensor data fusion. Bayesian Networks (BNs) represent a suitable tool for performing refined artificial reasoning on heterogeneous sensory data, and for dealing with the intrinsic uncertainty of such data. However, the configuration of the sensory infrast…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient IntelligencePervasive SystemsComputer scienceDistributed computingSensor nodeBayesian probabilityBayesian networkInferenceNoise (video)Sensor fusionWireless sensor network
researchProduct

Bayesian System for Differential Cryptanalysis of DES

2014

AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the development of a new class of cryptanalysis methods.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNeural cryptographyTheoretical computer scienceDifferential cryptanalysisbusiness.industryBayesian probabilityBayesian networkCryptographyData_CODINGANDINFORMATIONTHEORYEncryptionDESlaw.inventionBayesian Networks;lawCryptographyBayesian NetworksPoint (geometry)Cryptanalysisbusinessdifferential cryptanalysiMathematicsdifferential cryptanalysisIERI Procedia
researchProduct

A distributed Bayesian approach to fault detection in sensor networks

2012

Sensor networks are widely used in industrial and academic applications as the pervasive sensing module of an intelligent system. Sensor nodes may occasionally produce incorrect measurements due to battery depletion, dust on the sensor, manumissions and other causes. The aim of this paper is to develop a distributed Bayesian fault detection algorithm that classifies measurements coming from the network as corrupted or not. The computational complexity is polynomial so the algorithm scales well with the size of the network. We tested the approach on a synthetic dataset and obtained significant results in terms of correctly labeled measurements.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniPolynomialBrooks–Iyengar algorithmComputer scienceBayesian probabilityReal-time computingFault DetectionSoft sensorWireless sensor networkFault detection and isolation2012 IEEE Global Communications Conference (GLOBECOM)
researchProduct