Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/52238Full metadata record
| ???org.dspace.app.webui.jsptag.ItemTag.dcfield??? | Value | Language |
|---|---|---|
| dc.contributor.advisor | 陳光禎(Kwang-Cheng Chen) | |
| dc.contributor.author | Ming-Chun Wu | en |
| dc.contributor.author | 巫名峻 | zh_TW |
| dc.date.accessioned | 2021-06-15T16:10:04Z | - |
| dc.date.available | 2015-08-20 | |
| dc.date.copyright | 2015-08-20 | |
| dc.date.issued | 2015 | |
| dc.date.submitted | 2015-08-18 | |
| dc.identifier.citation | [1] A. Tajer, V. V. Veeravalli, and H. V. Poor, “Outlying sequence detection in large data sets: A data-driven approach,” IEEE Signal Processing Magazine, vol. 31, no. 5, pp.44–56, Sept 2014.
[2] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, “Network intrusion detection,” IEEE Network, vol. 8, no. 3, pp. 26–41, May 1994. [3] A. Ghasemi and E. S. Sousa, “Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs,” IEEE Communications Magazine, vol. 46, no. 4, pp. 32–39, April 2008. [4] H. Garces and D. Sbarbaro, “Outliers detection in environmental monitoring databases,” Engineering Applications of Artificial Intelligence, vol. 24, no. 2, pp. 341 – 349, 2011. [5] C. W. Dunnett, “A multiple comparison procedure for comparing several treatments with a control,” Journal of the American Statistical Association, vol. 50, no. 272, pp. 1096–1121, 1955. [6] H. Zou, T. Hastie, and R. Tibshirani, “Sparse principal component analysis,” Journal of Computational and Graphical Statistics, vol. 15, no. 2, pp. 265–286, 2006. [7] E. J. Candès, X. Li, Y. Ma, and J. Wright, “Robust principal component analysis?” Journal of ACM, vol. 58, no. 3, pp. 1–37, Jun. 2011. [8] C. Ding and X. He, “K-means clustering via principal component analysis,” in Proceedings of the Twenty-first International Conference on Machine Learning, ser. ICML ’04, 2004, pp. 225–232. [9] D. D. Lee and H. S. Seung, “Algorithms for non-negative matrix factorization,” pp.556–562, 2001. [10] Y.-C. Chan, O. Hawas, D. Hawker, P. Vowles, D. D. Cohen, E. Stelcer, R. Simpson, G. Golding, and E. Christensen, “Using multiple type composition data and wind data in pmf analysis to apportion and locate sources of air pollutants,” Atmospheric Environment, vol. 45, no. 2, pp. 439–449, 2011. [11] Y. Hochberg, “A sharper bonferroni procedure for multiple tests of significance,” Biometrika, vol. 75, no. 4, pp. 800–802, 1988. [12] S. Holm, “A simple sequentially rejective multiple test procedure,” Scandinavian Journal of Statistics, vol. 6, no. 2, pp. 65–70, 1979. [13] Y. Benjamini and Y. Hochberg, “Controlling the false discovery rate: A practical and powerful approach to multiple testing,” Journal of the Royal Statistical Society. Series B (Methodological), vol. 57, no. 1, pp. 289–300, 1995. [14] W. James and C. Stein, “Estimation with quadratic loss,” Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 361-379, 1961. [15] C. M. Stein, “Estimation of the mean of a multivariate normal distribution,” The Annals of Statistics, vol. 9, no. 6, pp. 1135–1151, Nov 1981. [16] B. Efron, Large-Scale Inference. Cambridge University Press., 2013. [17] C. N. Morris, “Parametric empirical bayes inference: Theory and applications,” Journal of the American Statistical Association, vol. 78, no. 381, pp. 47–55, 1983. [18] B. Efron and C. Morris, “Data analysis using stein’s estimator and its generalizations,” Journal of the American Statistical Association, vol. 70, no. 350, pp. 311–319, 1975. [19] G. Casella, “An introduction to empirical bayes data analysis,” The American Statistician, vol. 39, no. 2, pp. 83–87, 1985. [20] X. Xie, S. C. Kou, and L. D. Brown, “Sure estimates for a heteroscedastic hierarchical model,” Journal of the American Statistical Association, vol. 107, no. 500, pp. 1465–1479, 2012. [21] J. D. Storey and R. Tibshirani, “Statistical significance for genomewide studies,” Proceedings of the National Academy of Sciences, vol. 100, no. 16, pp. 9440–9445, 2003. [22] B. Efron, “Large-scale simultaneous hypothesis testing: The choice of a null hypothesis,” Journal of the American Statistical Association, vol. 99, no. 465, pp. 96–104, Mar 2004. [23] J. D. Storey, “A direct approach to false discovery rates,” Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 64, no. 3, pp. 479–498, 2002. [24] ——, “The positive false discovery rate: a bayesian interpretation and the q-value,” The Annals of Statistics, vol. 31, no. 6, pp. 2013–2035, Dec 2003. [25] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1993. [26] G. Casella and R. L. Berger, Statistical Inference, 2nd ed. Thomson Learning, 2002. [27] G. Strang, Linear Algebra and Its Applications. Brooks Cole, February 1988. [28] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge University Press, 2004. [29] Y. Zhang, N. Meratnia, and P. Havinga, “Outlier detection techniques for wireless sensor networks: A survey,” IEEE Communications Surveys Tutorials, vol. 12, no. 2, pp. 159–170, 2010. [30] M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, “Outlier detection for temporal data: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2250–2267, Sept 2014. [31] R. O. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Transactions on Antennas and Propagation, vol. 34, no. 3, pp. 276–280, Mar 1986. [32] R. Roy and T. Kailath, “Esprit-estimation of signal parameters via rotational invariance techniques,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 37, no. 7, pp. 984–995, Jul 1989. [33] X. Wang and H. V. Poor, “Blind multiuser detection: a subspace approach,” IEEE Transactions on Information Theory, vol. 44, no. 2, pp. 677–690, Mar 1998. [34] W.-C. Wu and K.-C. Chen, “Identification of active users in synchronous cdma multiuser detection,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 9, pp. 1723–1735, Dec 1998. [35] M. Wax and T. Kailath, “Detection of signals by information theoretic criteria,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 33, no. 2, pp. 387–392, Apr 1985. [36] G. Schwarz, “Estimating the dimension of a model,” The Annals of Statistics, vol. 6, no. 2, pp. 461–464, Mar 1978. [37] F. J. Anscombe, “The transformation of poisson, binomial and negative-binomial data,” Biometrika, vol. 35, no. 3-4, pp. 246–254, 1948. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/52238 | - |
| dc.description.abstract | 在許多應用裡奇異辨識是經常出現的課題,且依然是熱門且未解決
的問題。從資料分析的角度來看,奇異辨識在現今的實際情境上主要 有兩個挑戰,其一是資料壓縮的問題,如何從巨量原始資料萃出高訊 息的資料,其二是如何利用有效統計推論從未知結構的大尺度資料中 發掘訊息。傳統的統計方法面對現代大尺度資料分析的問題有無法掩 飾的缺點,一般來說表現隨著尺度增加而衰退,使其在資料取樣不足 時往往不能達到令人滿意的表現。這篇論文使用了感測器網路當例子 闡釋了奇異辨識的一般性推論程序,這論文提出了系統性的架構用以 建立有效的奇異檢測, 提出的辨識方法以縮小估計式如Jame-Stein 估計 式為基礎,且在大尺度資料的情境下具有優勢,除此之外這本論文提 出了以充水性演算法為基礎的程序解最佳劃問題,用以求出漸進最佳 的縮小估計式,並可以用到更廣泛的資料分析應用。 | zh_TW |
| dc.description.abstract | Outlier detection is a frequently encountered technology challenge for many diverse applications, and remains an open problem in general. There are two major difficulties of developing outlier detectors with collected data. One is the inevitable data reduction, the other is the effective inference when discovering information from unknown structured large-scale data. It is even more interesting and challenging with limited observation, since conventional
data analysis requires many samples to achieve a satisfactory performance. In this thesis, a sensor network example is used to illustrate a general inference procedure for outlier identification. A systematic framework is proposed to develop effective and efficient outlier identifiers using shrinkage methodology, like James-Stein estimator, as the post-processor. This thesis show the superiority of our approach, particularly for the large-scale situations. This thesis further supply a water-filling type algorithm to obtain the asymptotic optimal method for a general class of shrinkage estimators, for wide applications of data analysis. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T16:10:04Z (GMT). No. of bitstreams: 1 ntu-104-R02942050-1.pdf: 2073235 bytes, checksum: 62b507b69a8aa7e8ac48b8d23d753aac (MD5) Previous issue date: 2015 | en |
| dc.description.tableofcontents | 1 Introduction 1
1.1 Background of Outlier Detection . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Challenges of Large-Scale Data Analysis . . . . . . . . . . . . . . . . . 3 1.3 Background of Large-Scale Inference . . . . . . . . . . . . . . . . . . . 5 2 Preliminaries 7 2.1 Point Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Linear Algebra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3 Theory of Shrinkage Estimators 15 3.1 The James-Stein Estimator . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.2 Parametric Empirical Bayesian Estimators . . . . . . . . . . . . . . . . . 18 3.3 The SURE Shrinkage Estimators . . . . . . . . . . . . . . . . . . . . . . 20 4 The Water-Filling Type Algorithm 22 4.1 The Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.2 Derivation of The Water-Filling Type Algorithm . . . . . . . . . . . . . . 25 4.3 Convergence and Complexity Issues . . . . . . . . . . . . . . . . . . . . 30 5 Application: Sensor Data 32 5.1 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 5.2 The MUSIC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.3 Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 5.4 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 5.4.1 Simulation Settings . . . . . . . . . . . . . . . . . . . . . . . . . 43 5.4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . 44 6 Conclusion and Future Work 51 Bibliography 52 | |
| dc.language.iso | zh-TW | |
| dc.subject | James-Stein 估計式 | zh_TW |
| dc.subject | 經驗貝式統計 | zh_TW |
| dc.subject | 大尺度統計 | zh_TW |
| dc.subject | 奇異檢測 | zh_TW |
| dc.subject | 縮小估計式 | zh_TW |
| dc.subject | James-Stein estimator | en |
| dc.subject | large-scale inference | en |
| dc.subject | shrinkage estimator | en |
| dc.subject | empirical Bayesian | en |
| dc.subject | Outlier detection | en |
| dc.title | 奇異識別與大尺度統計 | zh_TW |
| dc.title | Outlier Identification and Large-Scale Inference | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 103-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 蘇育德,陳曉華,李志鵬,李育杰 | |
| dc.subject.keyword | 奇異檢測,James-Stein 估計式,經驗貝式統計,縮小估計式,大尺度統計, | zh_TW |
| dc.subject.keyword | Outlier detection,James-Stein estimator,empirical Bayesian,shrinkage estimator,large-scale inference, | en |
| dc.relation.page | 55 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2015-08-19 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
| Appears in Collections: | 電信工程學研究所 | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| ntu-104-1.pdf Restricted Access | 2.02 MB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
