Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/52238
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield???ValueLanguage
dc.contributor.advisor陳光禎(Kwang-Cheng Chen)
dc.contributor.authorMing-Chun Wuen
dc.contributor.author巫名峻zh_TW
dc.date.accessioned2021-06-15T16:10:04Z-
dc.date.available2015-08-20
dc.date.copyright2015-08-20
dc.date.issued2015
dc.date.submitted2015-08-18
dc.identifier.citation[1] A. Tajer, V. V. Veeravalli, and H. V. Poor, “Outlying sequence detection in large data sets: A data-driven approach,” IEEE Signal Processing Magazine, vol. 31, no. 5, pp.44–56, Sept 2014.
[2] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, “Network intrusion detection,” IEEE Network, vol. 8, no. 3, pp. 26–41, May 1994.
[3] A. Ghasemi and E. S. Sousa, “Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs,” IEEE Communications Magazine, vol. 46, no. 4, pp. 32–39, April 2008.
[4] H. Garces and D. Sbarbaro, “Outliers detection in environmental monitoring databases,” Engineering Applications of Artificial Intelligence, vol. 24, no. 2, pp.
341 – 349, 2011.
[5] C. W. Dunnett, “A multiple comparison procedure for comparing several treatments with a control,” Journal of the American Statistical Association, vol. 50, no. 272, pp. 1096–1121, 1955.
[6] H. Zou, T. Hastie, and R. Tibshirani, “Sparse principal component analysis,” Journal of Computational and Graphical Statistics, vol. 15, no. 2, pp. 265–286, 2006.
[7] E. J. Candès, X. Li, Y. Ma, and J. Wright, “Robust principal component analysis?” Journal of ACM, vol. 58, no. 3, pp. 1–37, Jun. 2011.
[8] C. Ding and X. He, “K-means clustering via principal component analysis,” in Proceedings of the Twenty-first International Conference on Machine Learning, ser. ICML ’04, 2004, pp. 225–232.
[9] D. D. Lee and H. S. Seung, “Algorithms for non-negative matrix factorization,” pp.556–562, 2001.
[10] Y.-C. Chan, O. Hawas, D. Hawker, P. Vowles, D. D. Cohen, E. Stelcer, R. Simpson, G. Golding, and E. Christensen, “Using multiple type composition data and wind data in pmf analysis to apportion and locate sources of air pollutants,” Atmospheric Environment, vol. 45, no. 2, pp. 439–449, 2011.
[11] Y. Hochberg, “A sharper bonferroni procedure for multiple tests of significance,” Biometrika, vol. 75, no. 4, pp. 800–802, 1988.
[12] S. Holm, “A simple sequentially rejective multiple test procedure,” Scandinavian Journal of Statistics, vol. 6, no. 2, pp. 65–70, 1979.
[13] Y. Benjamini and Y. Hochberg, “Controlling the false discovery rate: A practical and powerful approach to multiple testing,” Journal of the Royal Statistical Society. Series B (Methodological), vol. 57, no. 1, pp. 289–300, 1995.
[14] W. James and C. Stein, “Estimation with quadratic loss,” Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 361-379, 1961.
[15] C. M. Stein, “Estimation of the mean of a multivariate normal distribution,” The Annals of Statistics, vol. 9, no. 6, pp. 1135–1151, Nov 1981.
[16] B. Efron, Large-Scale Inference. Cambridge University Press., 2013.
[17] C. N. Morris, “Parametric empirical bayes inference: Theory and applications,” Journal of the American Statistical Association, vol. 78, no. 381, pp. 47–55, 1983.
[18] B. Efron and C. Morris, “Data analysis using stein’s estimator and its generalizations,” Journal of the American Statistical Association, vol. 70, no. 350, pp. 311–319, 1975.
[19] G. Casella, “An introduction to empirical bayes data analysis,” The American Statistician, vol. 39, no. 2, pp. 83–87, 1985.
[20] X. Xie, S. C. Kou, and L. D. Brown, “Sure estimates for a heteroscedastic hierarchical model,” Journal of the American Statistical Association, vol. 107, no. 500, pp. 1465–1479, 2012.
[21] J. D. Storey and R. Tibshirani, “Statistical significance for genomewide studies,” Proceedings of the National Academy of Sciences, vol. 100, no. 16, pp. 9440–9445, 2003.
[22] B. Efron, “Large-scale simultaneous hypothesis testing: The choice of a null hypothesis,” Journal of the American Statistical Association, vol. 99, no. 465, pp. 96–104, Mar 2004.
[23] J. D. Storey, “A direct approach to false discovery rates,” Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 64, no. 3, pp. 479–498, 2002.
[24] ——, “The positive false discovery rate: a bayesian interpretation and the q-value,” The Annals of Statistics, vol. 31, no. 6, pp. 2013–2035, Dec 2003.
[25] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1993.
[26] G. Casella and R. L. Berger, Statistical Inference, 2nd ed. Thomson Learning, 2002.
[27] G. Strang, Linear Algebra and Its Applications. Brooks Cole, February 1988.
[28] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge University Press, 2004.
[29] Y. Zhang, N. Meratnia, and P. Havinga, “Outlier detection techniques for wireless sensor networks: A survey,” IEEE Communications Surveys Tutorials, vol. 12, no. 2, pp. 159–170, 2010.
[30] M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, “Outlier detection for temporal data: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2250–2267, Sept 2014.
[31] R. O. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Transactions on Antennas and Propagation, vol. 34, no. 3, pp. 276–280, Mar 1986.
[32] R. Roy and T. Kailath, “Esprit-estimation of signal parameters via rotational invariance techniques,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 37, no. 7, pp. 984–995, Jul 1989.
[33] X. Wang and H. V. Poor, “Blind multiuser detection: a subspace approach,” IEEE Transactions on Information Theory, vol. 44, no. 2, pp. 677–690, Mar 1998.
[34] W.-C. Wu and K.-C. Chen, “Identification of active users in synchronous cdma multiuser detection,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 9, pp. 1723–1735, Dec 1998.
[35] M. Wax and T. Kailath, “Detection of signals by information theoretic criteria,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 33, no. 2, pp. 387–392, Apr 1985.
[36] G. Schwarz, “Estimating the dimension of a model,” The Annals of Statistics, vol. 6, no. 2, pp. 461–464, Mar 1978.
[37] F. J. Anscombe, “The transformation of poisson, binomial and negative-binomial data,” Biometrika, vol. 35, no. 3-4, pp. 246–254, 1948.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/52238-
dc.description.abstract在許多應用裡奇異辨識是經常出現的課題,且依然是熱門且未解決
的問題。從資料分析的角度來看,奇異辨識在現今的實際情境上主要
有兩個挑戰,其一是資料壓縮的問題,如何從巨量原始資料萃出高訊
息的資料,其二是如何利用有效統計推論從未知結構的大尺度資料中
發掘訊息。傳統的統計方法面對現代大尺度資料分析的問題有無法掩
飾的缺點,一般來說表現隨著尺度增加而衰退,使其在資料取樣不足
時往往不能達到令人滿意的表現。這篇論文使用了感測器網路當例子
闡釋了奇異辨識的一般性推論程序,這論文提出了系統性的架構用以
建立有效的奇異檢測, 提出的辨識方法以縮小估計式如Jame-Stein 估計
式為基礎,且在大尺度資料的情境下具有優勢,除此之外這本論文提
出了以充水性演算法為基礎的程序解最佳劃問題,用以求出漸進最佳
的縮小估計式,並可以用到更廣泛的資料分析應用。
zh_TW
dc.description.abstractOutlier detection is a frequently encountered technology challenge for many diverse applications, and remains an open problem in general. There are two major difficulties of developing outlier detectors with collected data. One is the inevitable data reduction, the other is the effective inference when discovering information from unknown structured large-scale data. It is even more interesting and challenging with limited observation, since conventional
data analysis requires many samples to achieve a satisfactory performance. In this thesis, a sensor network example is used to illustrate a general inference
procedure for outlier identification. A systematic framework is proposed to develop effective and efficient outlier identifiers using shrinkage methodology, like James-Stein estimator, as the post-processor. This thesis show the superiority of our approach, particularly for the large-scale situations. This thesis further supply a water-filling type algorithm to obtain the asymptotic optimal method for a general class of shrinkage estimators, for wide applications
of data analysis.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T16:10:04Z (GMT). No. of bitstreams: 1
ntu-104-R02942050-1.pdf: 2073235 bytes, checksum: 62b507b69a8aa7e8ac48b8d23d753aac (MD5)
Previous issue date: 2015
en
dc.description.tableofcontents1 Introduction 1
1.1 Background of Outlier Detection . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Challenges of Large-Scale Data Analysis . . . . . . . . . . . . . . . . . 3
1.3 Background of Large-Scale Inference . . . . . . . . . . . . . . . . . . . 5
2 Preliminaries 7
2.1 Point Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 Linear Algebra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3 Theory of Shrinkage Estimators 15
3.1 The James-Stein Estimator . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 Parametric Empirical Bayesian Estimators . . . . . . . . . . . . . . . . . 18
3.3 The SURE Shrinkage Estimators . . . . . . . . . . . . . . . . . . . . . . 20
4 The Water-Filling Type Algorithm 22
4.1 The Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.2 Derivation of The Water-Filling Type Algorithm . . . . . . . . . . . . . . 25
4.3 Convergence and Complexity Issues . . . . . . . . . . . . . . . . . . . . 30
5 Application: Sensor Data 32
5.1 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.2 The MUSIC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
5.3 Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.4 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
5.4.1 Simulation Settings . . . . . . . . . . . . . . . . . . . . . . . . . 43
5.4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . 44
6 Conclusion and Future Work 51
Bibliography 52
dc.language.isozh-TW
dc.subjectJames-Stein 估計式zh_TW
dc.subject經驗貝式統計zh_TW
dc.subject大尺度統計zh_TW
dc.subject奇異檢測zh_TW
dc.subject縮小估計式zh_TW
dc.subjectJames-Stein estimatoren
dc.subjectlarge-scale inferenceen
dc.subjectshrinkage estimatoren
dc.subjectempirical Bayesianen
dc.subjectOutlier detectionen
dc.title奇異識別與大尺度統計zh_TW
dc.titleOutlier Identification and Large-Scale Inferenceen
dc.typeThesis
dc.date.schoolyear103-2
dc.description.degree碩士
dc.contributor.oralexamcommittee蘇育德,陳曉華,李志鵬,李育杰
dc.subject.keyword奇異檢測,James-Stein 估計式,經驗貝式統計,縮小估計式,大尺度統計,zh_TW
dc.subject.keywordOutlier detection,James-Stein estimator,empirical Bayesian,shrinkage estimator,large-scale inference,en
dc.relation.page55
dc.rights.note有償授權
dc.date.accepted2015-08-19
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電信工程學研究所zh_TW
Appears in Collections:電信工程學研究所

Files in This Item:
File SizeFormat 
ntu-104-1.pdf
  Restricted Access
2.02 MBAdobe PDF
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved