text stringlengths 30 4k | source stringlengths 60 201 |
|---|---|
1. Any birational map φ : S ��� S� is dominated by a nonsingular
S, S� which are compositions of
surface S with birational morphisms q, q� : S
blow-up maps, i.e.
→
(4)
S
q
� �
S
��������
q�
� �
� S�
φ
Proof. First resolve the indeterminacy of φ using S and then note that q� is a
�
birational morphism, i.e. a... | https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/1f4f36355341a0e235b980608b418882_lect4.pdf |
g − 2 = E (E + K).
·
·
Theorem 3 (Castelnuovo). Let S be a projective surface and E ⊂ S a curve
∼ P1 with E2 =
s.t. it is a blowup and E is
=
the exceptional curve (classically called an “exceptional curve of the first kind”).
Then ∃ a morphism S →
−1.
S�
Proof. We will find S� as the image of a particular morphism ... | https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/1f4f36355341a0e235b980608b418882_lect4.pdf |
.
Now, consider the exact sequence
(5)
O → OS (H + (i − 1)E) → OS (H + iE) → OE (k − i) ∼
= OS (H + iE)
|E →
0
for 1 ≤ i ≤ k + 1. We know that H 1(E, OE (k − i)) = 0, so we get
(6)
0 →H 0(S, OS (H + (i − 1)E)) → H 0(S, OS (H + iE)) → H 0(E, OE (k − i)) →
H 1(S, OS (H + (i − 1)E)) → H 1(S, OS (H + iE)) → 0
Thus, t... | https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/1f4f36355341a0e235b980608b418882_lect4.pdf |
is enough to show that M |E is generated by
global sections on E. Now, M E = OE (k − k) = OE is generated by the global
section 1. Therefore, lifting it to a section of H 0(S, M ) and using Nakayama’s
lemma, we see that M is generated by global sections at every point of E as well.
f � Pn for some N . Let S� be the... | https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/1f4f36355341a0e235b980608b418882_lect4.pdf |
→
→
⇒
(7)
Rif∗(F)∧
y
n
∼ lim H i(Xn, Fn)
→ ←−
where Xn = X ×y Spec OY /my is the thickened scheme-theoretic preimage of
y. We’ll apply it with i = 0, F = OS, f : S
S0. f∗OS = OS0 since S0 is
ˆ
Op ←−
normal. Moreover,
is
2-dimensional ∼
→
= lim H 0(En, OEn ). Now, it is enough to show that
ˆ
Op
= k[[x, y]... | https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/1f4f36355341a0e235b980608b418882_lect4.pdf |
2 = k ⊕ kx ⊕ ky.
Now inducting, we find that H 0(OEn ) is isomorphic to k[x, y]/(x, y)n . Lift
elements x, y to H 0(OEn+1 ), we find that H 0(OP1 (n) is a vector space with
basis xn, xn−1y, . . . , yn (contained in the symmetric power of (x, y)). So we
∼
get H 0(OEn+1 ) ∼ k[x, y]/(x, y)n+1 . The truncations are compa... | https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/1f4f36355341a0e235b980608b418882_lect4.pdf |
Kinematics of Rigid Bodies
1
2.003J/1.053J Dynamics and Control I, Spring 2007
Professor Thomas Peacock
2/28/2007
Lecture 7
2-D Motion of Rigid Bodies - Kinematics
Kinematics of Rigid Bodies
Williams 3-3 (No method of instant centers)
”Kinematics” - Description and analysis of the motions of objects without con
s... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
ating. Figure by MIT OCW.
Therefore:
Cite as: Thomas Peacock and Nicolas Hadjiconstantinou, course materials for 2.003J/1.053J Dynamics and
Control I, Spring 2007. MIT OpenCourseWare (http://ocw.mit.edu), Massachusetts Institute of Technology.
Downloaded on [DD Month YYYY].
Kinematics of Rigid Bodies
3
dR
dt
... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
Diagram of Rod CD. Figure by MIT OCW.
Angular velocity is ωCD = dθ eˆz
dt
ωCD is independent of choice of point C. Bar has intrinsic rotation.
The motion of a rigid body is expressed as a combination of translation of a
point fixed on the body and rotation about an axis passing through this point
→ need (x, y, θ).
... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
Compute the velocity of any point P on a rigid body.
Now:
ω =
Rp = RG + r
dθ
eˆzdt
dRG
dt
p
d
v = R =
p
dt
vp = vG + ω × r
Use vp = vG + ω × r. This relationship will be used often in finding the velocity
of the body needed for the angular momentum principle.
dr
dt
+
vP = vG + ω × r
We can express the mo... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
of the bar is ωAB = θ˙eˆz.
vB = vA + ω × rAB
vA = x˙ eˆx
Cite as: Thomas Peacock and Nicolas Hadjiconstantinou, course materials for 2.003J/1.053J Dynamics and
Control I, Spring 2007. MIT OpenCourseWare (http://ocw.mit.edu), Massachusetts Institute of Technology.
Downloaded on [DD Month YYYY].
Kinematics of Rigi... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
complete set of coordinates may not be independent; however, due to geo
metric constraints.
Cite as: Thomas Peacock and Nicolas Hadjiconstantinou, course materials for 2.003J/1.053J Dynamics and
Control I, Spring 2007. MIT OpenCourseWare (http://ocw.mit.edu), Massachusetts Institute of Technology.
Downloaded on [DD... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
07. MIT OpenCourseWare (http://ocw.mit.edu), Massachusetts Institute of Technology.
Downloaded on [DD Month YYYY].
Kinematics of Rigid Bodies
10
Figure 13: Hoop rolls along x-direction where distanced travelled equals rθ.
Figure by MIT OCW.
This statement means the displacement xc is equal to the part of the hoo... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1f67510b4e0e8758705be60bc6957982_lec07.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
6.006 Introduction to Algorithms
Spring 2008
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
Lecture 4
Balanced Binary Search Trees
6.006 Spring 2008
Lecture 4: Balanced Binary Search Trees
Lecture Overview
• The importance ... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/1f940ab45156183a323edd0011317452_lec4.pdf |
PathLecture 4
Balanced Binary Search Trees
6.006 Spring 2008
AVL Trees:
Definition
AVL trees are self-balancing binary search trees. These trees are named after their two
inventors G.M. Adel’son-Vel’skii and E.M. Landis 1
An AVL tree is one that requires heights of left and right children of every node to differ
... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/1f940ab45156183a323edd0011317452_lec4.pdf |
2Nh−2
⇒ Nh > 2h/2
= h <
⇒
1
2
lg h
Alternatively:
Nh > Fn
In fact,Nh = Fn+2 − 1
(nth Fibonacci number)
(simple induction)
φh
Fh = √
5
1 +
2
√
5
where φ =
(rounded to nearest integer)
≈ 1.618
(golden ratio)
= ⇒ maxh ≈
logφ(n) ≈ 1.440 lg(n)
AVL Insert:
1. insert as in simple BST
2. work your way up ... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/1f940ab45156183a323edd0011317452_lec4.pdf |
1. In general, process may need several rotations before an Insert is completed.
Comment 2. Delete(-min) harder but possible.
6
654120115029263211φφφ6541201150292621φφφ123Insert(23)x = 29: left-left case654120115026233211φφφ65412011501φφDoneInsert(55)29φ322623129φφ65412011502φφ22623129φφx=65: left-right case551554120... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/1f940ab45156183a323edd0011317452_lec4.pdf |
several
operations =
fast on average.
⇒
7
Lecture 4
Balanced Binary Search Trees
6.006 Spring 2008
Splay Trees
Upon access (search or insert), move node to root by sequence of rotations and/or double-
rotations (just like AVL trees). Height can be linear but still O(lg n) per operation “on
average” (amortized)
... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/1f940ab45156183a323edd0011317452_lec4.pdf |
Massachusetts Institute of Technology
Department of Electrical Engineering and Computer Science
6.438 Algorithms for Inference
Fall 2014
8
Inferences on trees: sum-product algorithm
Recall the two fundamental inference problems in graphical models:
1. marginalization, i.e. computing the marginal distribution p... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
can be applied to obtain the MAP estimate.
N operations.
X
|
|
8.1 Elimination algorithm on trees
Recall that a graph G is a tree if any two nodes are connected by exactly one path.
1 edges and no cycles.
This definition implies that all tree graphs have exactly N
Throughout this lecture, we will use the recurrin... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
Figure 3: A star-shaped graph and the resulting graph after eliminating variable x1.
2
x1x2x3x4x5x1x3x4x5x1x3x5x1x3x1x1x6x2x3x4x5x6x2x3x4x5Figure 4: The sequence of graph structures and messages obtained from the elimina
tion algorithm on the graph from Figure 1 using an optimal ordering (4, 5, 3, 2, 1).
Fortunat... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
we will assume a redundant representation with unary potentials φi(xi) for each
variable xi. In other words, we assume the factorization
px(x) =
1
Z
φi(xi)
ψij (xi, xj ).
i∈V
(i,j)∈E
(1)
The messages produced in the course of the algorithm are:
m4(x2) =
φ4(x4)ψ24(x2, x4)
m5(x2) =
m3(x1) =
m2(x1) =
x4
x5
x3
x2 ... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
|
1 edges in the graph, the total
2), i.e. linear in the graph size and quadratic in the alphabet
|
X
−
X
|
|
|
8.2 Sum-product algorithm on trees
Returning to Figure 1, suppose we want to compute the marginal for another variable
x3. If we use the elimination ordering (5, 4, 2, 1, 3), the resulting messages are: ... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
messages such that the prerequisites are available at
each step. One way to do this is through the following two-step procedure.
, as shown in Figure 6. (Note: the
N (i)
\ {
∈
}
\
j
1Note that this analysis does not include the time for computing the products in each of the
messages. A naive implementation would,... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
This view will become clearer when we
discuss hidden Markov models.
8.3 Parallel sum-product
The sum-product algorithm as described in Section 8.2 is inherently sequential: the
messages must be computed in sequence to ensure that the prerequisites are avail
able at each step. However, the algorithm was described i... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
) can be viewed as a fixed point update
for (6). You will prove in a homework exercise that this procedure will converge to
the correct messages (6) in d iterations, where d is the diameter of the tree (i.e. the
length of the longest path).
Note that this parallel procedure entails significant overhead: each iteratio... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
of neighbors) of node i.
N computations. This must be done for each of the N
a
−
X
X
X
i
|
|
|
|
|
However, in parallel sum-product, we can share computation between the different
messages by computing them simultaneously as follows:
1. Compute
⎛
i(xi) = ⎝
µ t
(cid:89)
⎞
k→i(xi)⎠ φi(xi)
m t
k∈N (i)
2. For all... | https://ocw.mit.edu/courses/6-438-algorithms-for-inference-fall-2014/1faaccb44f78c4f4e99c6814842082a0_MIT6_438F14_Lec8.pdf |
Corn Sheller
This project is a low-cost device for removing corn kernels from the cob. It is made from a piece
of sheet metal which is formed and then joined together. This device was developed by Marco
Villagarcia, an engineer from Cusco, Peru, based on an injection molded plastic corn sheller from
Malawi. It is ma... | https://ocw.mit.edu/courses/ec-720j-d-lab-ii-design-spring-2010/1fab1f92881a2a0aa9ee50b0154a1960_MITEC_720JS10_bldit_csm.pdf |
an
arbor press or vice can be used to generate sufficient force to bend the
metal. Mark the position of the ridges on your part and then use the die to
bend the ridges.
Forming the Cone
You can form the cone by bending it over an anvil or a piece of pipe, by
hand or with a hammer or you can bend the whole things by... | https://ocw.mit.edu/courses/ec-720j-d-lab-ii-design-spring-2010/1fab1f92881a2a0aa9ee50b0154a1960_MITEC_720JS10_bldit_csm.pdf |
two pieces are joined through a melting
and re-solidification process. Spot-welding allows rapid welding of
thin materials that do not require a complete weld seam. Two copper
electrodes hold the sheets together and then deliver enough current
through the sheets in a concentrated area that the sheets melt together ... | https://ocw.mit.edu/courses/ec-720j-d-lab-ii-design-spring-2010/1fab1f92881a2a0aa9ee50b0154a1960_MITEC_720JS10_bldit_csm.pdf |
Introduction to Engineering
Introduction to Engineering
Systems, ESD.00
Networks III/Stakeholders
Lecture 9
Lecturers:
Professor Joseph Sussman
Dr. Afreen Siddiqi
TA: Regina Clewlow
f
Outline
Outline
Introduction to networks (Lecture 8)
Infrastructure networks ((Lecture 8))
Institutional networks (Lecture 8)... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1fc7ee99f40b5f81cfa1765ed1304033_MITESD_00S11_lec09.pdf |
z What are its characteristics?
References
References
[1]M.E.J. Newman, “The structure and function of complex networks”, SIAM
[1]M E J Newman The structure and function of complex networks SIAM
review, 2003
[2] Duncan J. Watts & Steven H. Strogatz, “Collective dynamics of ‘small
[2] Duncan J. Watts & Steven H. Str... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1fc7ee99f40b5f81cfa1765ed1304033_MITESD_00S11_lec09.pdf |
Power
• Legitimacy
• Urgency
Urgency
St eholder
s
Stakeholders
ak
S k
Stakehholdld er
ill be positively
salience
1:
PProposiitiion 1
related
the cumulative number of stakeholder
attributes –power, legitimacy, and urgency –perceived by
(Mitchell)
present. (Mitchell)
managers toto bebe present
managers
w... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1fc7ee99f40b5f81cfa1765ed1304033_MITESD_00S11_lec09.pdf |
MASSACHUSETTS INSTITUTE OF TECHNOLOGY
Physics Department
Physics 8.07: Electromagnetism II
Prof. Alan Guth
September 21, 2012
LECTURE NOTES 4
CONDUCTORS: SURFACE FORCES AND CAPACITANCE
These notes are an addendum to Lecture 7, Wednesday September 19, 2012. The
notes will not repeat what I said in class, but rather will... | https://ocw.mit.edu/courses/8-07-electromagnetism-ii-fall-2012/1ffda29d6ddadef8e37e4be9c071b4e7_MIT8_07F12_ln4.pdf |
��
4π(cid:8)0r2
(cid:6)0
have
(cid:6)E · d(cid:6)(cid:13)
∞
(cid:4)
= +
r
∞
(cid:6)E · d(cid:6)(cid:13) =
Q
4π(cid:8)0
(cid:4) ∞ dr
r2
r
=
Q
4π(cid:8)0r
.
(4.2)
(4.3)
8.07 LECTURE NOTES 4, FALL 2012
p. 2
The potential on the surface is therefore Q/(4π(cid:8)0R, and the potential inside the sphere
is constant, with thi... | https://ocw.mit.edu/courses/8-07-electromagnetism-ii-fall-2012/1ffda29d6ddadef8e37e4be9c071b4e7_MIT8_07F12_ln4.pdf |
is
(4.6)
dWmech = d (cid:6)F · (ˆr dR) = P da dR .
Integrating over the surface, the total mechanical work done is
(cid:4)
dWmech = P dR
da = 4πR2P dR .
(4.7)
(4.8)
Even though we have integrated, I am still calling the work dWmech, since it is an in-
finitesimal quantity proportional to dR. From Eq. (4.5), the change i... | https://ocw.mit.edu/courses/8-07-electromagnetism-ii-fall-2012/1ffda29d6ddadef8e37e4be9c071b4e7_MIT8_07F12_ln4.pdf |
real charge layer will have some nonzero thickness.
If we model the charge density as being uniform over this thickness, the situation is
described in the following diagram:
Gauss’s law implies that the electric field at any point is proportional to the enclosed
charge, so the electric field varies linearly with distance... | https://ocw.mit.edu/courses/8-07-electromagnetism-ii-fall-2012/1ffda29d6ddadef8e37e4be9c071b4e7_MIT8_07F12_ln4.pdf |
)
(cid:6)E = 0
outside the conductors, and on the boundaries of each conductor
(cid:6)
E = n ,ˆ
⊥
σ
(cid:8)0
(cid:6)
E = 0 ,
(cid:3)
⊥
where (cid:6)E is the normal contribution of the electric field, (cid:6)E is the tangential contribution,
and nˆ is a unit outward normal vector to the surface. The total charges on each... | https://ocw.mit.edu/courses/8-07-electromagnetism-ii-fall-2012/1ffda29d6ddadef8e37e4be9c071b4e7_MIT8_07F12_ln4.pdf |
the geometry of the conductors. This matrix
can be inverted, so we can write
Qi =
(cid:5)
j
Cij Vj ,
(4.16)
where as a matrix,
C = P −1 , or equivalently
(cid:5)
j
CijPjk = δik .
(4.17)
Cij is called the capacitance matrix, while Pij is called either the elastance matrix, or
simply the reciprocal capacitance matrix. In... | https://ocw.mit.edu/courses/8-07-electromagnetism-ii-fall-2012/1ffda29d6ddadef8e37e4be9c071b4e7_MIT8_07F12_ln4.pdf |
o9¢ëA8v9 àAí†o<
>íàâ ÄëB†o2
;;;;;;;;;;;;;
á; =wôIUAío9†¢ Pwàà†¢2 óí9wA9A_ír 4†9ëõvâoAôëà 4_oëAô;
j
MIT OpenCourseWare
https://ocw.mit.edu
2.062J / 1.138J / 18.376J Wave Propagation
Spring 2017
For information about citing these materials or our Terms of Use, visit: https://ocw.mit.edu/terms. | https://ocw.mit.edu/courses/2-062j-wave-propagation-spring-2017/201818c21f2a69ccbd7afc473b5aa143_MIT2_062J_S17_Chap5.pdf |
Machine Learning for Healthcare
HST.956, 6.S897
Lecture 1: What makes healthcare unique?
Prof. David Sontag & Pete Szolovits
1
The Problem
• Cost of health care expenditures in the US are
over $3 trillion, and rising
• Despite having some of the best clinicians in
the world, chronic conditi... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
is one of the symptoms
that the patient had 5 days ago
FIGURE 1-1 Major parts of an expert system. Arrows indicate
information flow.
© Addison-Wesley Publishing Company, Inc. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/
FIGURE 33-1 Short ... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
G;"<'9%"&(&'0E-*F9H("CC*-I%@"0'(
%&,'*'&#'J
1*-?/'@9A 2$ B:<;<.<6;9)-;/-1-F)9O7E/@79)()!$)**+
R$ L<CC<.0:/)/@)76<;/6<;()F<CC<.0:/)/@)K-;-16:<f-
cP<::-1)-/)6:$()d*'()"5M- -/)6:$()d%2e
51980’s: automating medical discovery
Discovers that prednisone
elevates cholesterol
(Annals of Internal Medicine, ‘86)
[Robert ... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
.mit.edu/help/faq-fair-use/
7
Outline for today’s class
1. Brief history of AI and ML in healthcare
2. Why now?
3. Examples of how ML will transform
healthcare
4. What is unique about ML in healthcare?
5. Overview of cla... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
()
;@/-9()n
© Lab for Computational Physiology. All rights reserved. This content is excluded from our Creative Commons license.
For more information, see https://ocw.mit.edu/help/faq-fair-use/
10
Large datasets
President Obama’s initiative to create a 1 million
person research cohort
Core data set:
• Basel... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
<9).@F-93)WBL_%)6;F
WBL_2U)YW;/-1;6/<@;6:
B:699<C<.6/<@;)@C)L<9-69-9Z
! ,6A@16/@1O)/-9/93),NWXB
.@F-9
! ?56176.O3)X6/<@;6:)L10K
B@F-9)YXLB9Z
! G;<C<-F)P-F<.6:),6;K06K-
"O9/-7)YGP,"Z3)7<::<@;9)@C
7-F<.6:).@;.-E/9
© (cid:45)O(cid:42)(cid:47)C. All rights reserved. This content is excluded
from our Creative Commons... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
content is excluded from our Creative Commons license. For more information,
see https://ocw.mit.edu/help/faq-fair-use/
17
Breakthroughs in machine learning
• Major advances in ML & AI
– Learning with high-dimensional features (e.g., l1-
regularization)
– Semi-supervised and unsupervised learning
– Modern dee... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
5-)E6/<-;/Q9)
.@;F</<@;9)Y.011-;/)6;F)C0/01-Z
C:0 E;-07@;<6 F<6A-/-9
L<9-69-9
"O7E/@79
C6/<K0-
.@0K5
.5-9/
5<K5
E6<;
b2B
E6<; b2B
b0/@76/<.6::O)-D/16./-F)C1@7)
-:-./1@;<.)5-6:/5)1-.@1F
L1<H-9
! ]-//-1)/1<6K-
! l69/-1)F<6K;@9<9
! S61:O)F-/-./<@;)@C
6FH-19-)-H-;/9
! ?1-H-;/)7-F<.6:
-11@19
25456/)M<::)/... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
456/)M<::)/5-)S^)@C)/5-)C0/01-)A-):<8->
^-F0.<;K)/5-);--F)C@1)9E-.<6:<9/).@;90:/9
Input
Chest X-Ray Image
CheXNet
121-layer CNN
Output
Pneumonia Positive (85%)
b115O/57<6>
© (cid:51)a(cid:75)pur(cid:76)ar et al. All rights reserved. This content is excluded from our
Creative Commons license. For more informat... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
Undiagnosed
condition
#<7-
Courtesy of the CDC. Image is in the public domain.
l<K01-).1-F</3)5//E93``MMM$.F.$K@H`8<F;-OF<9-69-`E1-H-;/<@;_1<98$5/7:
31456/)<9)/5-)C0/01-)@C)5@M)M-)/1-6/)
.51@;<.)F<9-69->
! ?1-F<./<;K)6)E6/<-;/Q9)C0/01-)F<9-69-)E1@K1-99<@;
! ?1-.<9<@;)7-F<.<;-
S$--9%&+(,%*90(/%&'(0$'*"C<(%&(@Q/0%... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
3. Examples of how ML will transform
healthcare
4. What is unique about ML in healthcare?
5. Overview of class syllabus
34
What makes healthcare different?
• Life or death decisions
– Need robust algorithms
– Checks and balances built into ML deployment
– (Also aris... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
6.S897/HST.956 vs 6.874
• Our class will focus on clinical data and its use
to improve health care
• For reasons of time & scope, we will not go
deep into applications in the life sciences
– For this, we recommend taking 6.874
Computational Systems Biology: Deep Learning
in the Life Sciences
39
... | https://ocw.mit.edu/courses/6-s897-machine-learning-for-healthcare-spring-2019/2020812c6b3be9e2c27873595d1a9aed_MIT6_S897S19_lec1.pdf |
6.852: Distributed Algorithms
Fall, 2009
Class 3
Today’s plan
• Algorithms in general synchronous networks (continued):
Shortest paths spanning tree
Minimum-weight spanning tree
Maximal independent set
• Reading: Sections 4.3-4.5
• Next:
– Distributed consensus
– Reading: Sections 5.1, 6.1-6.3
Last time... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
e.g. latency.
– UIDs.
– Nodes know weights of incident edges.
– Nodes know n (need for termination).
• Required:
– Shortest-paths tree, giving shortest paths from i0 to every other node.
– Shortest path = path with minimum total weight.
– Each node should output parent, “distance” from root (by weight).
Shorte... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
4
1
6
3
8 0
4
0
9
6
3
Round 1 (msgs)
Shortest paths
7
2
10
11 5 1
11
1
6
3
8 0
4
0
9
6
3
5
2
0
2
4
Round 1 (trans)
Shortest paths
2
5
10
1
4
2
4
5
2
11 1
8
6
3
3
7
11
0
9
6
Round 2 (start)
Shortest paths
7
2
10
... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
0
2
4 2
11 1
11
19 8 0
6
3
19
6
3
0
9
6
4
6
6
Round 3 (msgs)
Shortest paths
10
1
3
7
2
3
11 3 5 2 1
310
11
19 8 0
6
3
9
6
3
4
0
9 6
6
6
5
2
0
2
4 2
Round 3 (trans)
Shortest paths
3
2
5
10
1
4
2
4
5
2
10
1
8
6
3
9
3
7
11
0
9
6
6
Round 4 (start)
Shortest paths
10 1
3
7
2
3
11 3 5 2 1
310
1... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
5 2 1
310
10
9 8 0
6
3
9
6
3
4
0
9 6
6
6
5
2
0
2
4 2
Round 5 (msgs)
Shortest paths
10
1
3
7
2
3
11 3 5 2 1
310
10
9 8 0
6
3
9
6
3
4
0
9 6
6
6
5
2
0
2
4 2
Round 5 (trans)
Shortest paths
3
2
5
10
1
4
2
4
5
2
10 1
8
6
3
9
3
7
11
0
9
6
6
End configuration
Correctness
z Need to show... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
really is the distance on some at-
most-r-hop path to i, and parent is its parent on such a path.
z LTTR---easy use of inductive hypothesis.
z But we must still argue that disti and parenti correspond to a shortest
at-most-r-hop path.
Correctness
z Key invariant: After r rounds:
Every process i has its dist and... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
Q: Does the time bound really depend on n, or is it O(diam)?
z A: It’s really n, since “shortest path” can be over a path with more links.
z Example:
79
i0
1
1
1
i0
i0
i0
1
i0
1
i
Bellman-Ford Shortest-Paths
Algorithm
• Will revisit Bellman-Ford shortly in asynchronous
networks.
• Gets even more expens... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
forest of G. Fix any
j, 1 d j d k . Let e be a minimum weight outgoing edge of Tj.
Then there is a spanning tree for G that includes all the Tis and e,
and has minimum weight among all spanning trees for G that
include all the Tis.
• Proof:
– Suppose not---there’s some spanning tree T for G that includes all the T... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
ifies the following concurrent strategy:
z At each stage, suppose (inductively) that the current forest contains only
edges from the unique MST.
z Now several components choose MWOEs concurrently.
z Each of these edges is in the unique MST, by Lemma 1.
z So OK to add them all (no cycles, since all are in the same ... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
all components to find MWOEs.
– Leader of each level k component tells endpoint nodes of its
MWOE to add the edge for level k+1.
– Each new component has t 2k+1 nodes, as claimed.
Level k o Level k+1, cont’d
• Each level-k component leader finds MWOE of its component.
• Combine level-k components using MWOEs, to o... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
2
f
9
i
10
0
b
8
3
7
e
11
j
6
h
k
13
Minimum spanning tree
4
g
a
d
12
5
c
1
2
f
9
i
10
0
b
8
3
7
e
11
j
6
h
k
13
Minimum spanning tree
4
g
a
d
12
5
c
1
2
f
9
i
10
0
b
8
3
7
e
11
j
6
h
k
13
Minimum spanning tree
4
g
a
d
12
5
c
1
2
f
9
i
10
... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
Minimum spanning tree
4
g
a
d
12
5
c
1
2
f
9
i
10
0
b
8
3
7
e
11
j
6
h
k
13
Minimum spanning tree
4
g
a
d
12
5
c
1
2
f
9
i
10
0
b
8
3
7
e
11
j
6
h
k
13
Minimum spanning tree
4
g
a
d
12
5
c
1
2
f
9
i
10
0
b
8
3
7
e
11
j
6
h
k
13
Minimum spannin... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
n rounds for each level
log n levels, because there are t 2k nodes in each level k component.
Messages: O( (n + |E|) log n)
Naïve analysis.
At each level, O(n) messages sent on tree edges, O(|E|) messages
overall for all the test messages and their responses.
Messages: O(n log n + |E|)
A surprising, s... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
can become the leader) or cross on an edge (choose
endpoint with the larger UID).
– Complexity: Time O(n); Messages O(n)
• Given any weighted connected undirected graph, with known
n, but no leader, elect a leader:
– First use GHS MST to get a spanning tree, then use the
spanning tree to elect a leader.
– Complexit... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
Large enough set so it’s very likely that all numbers are distinct.
• Neighbors exchange vals.
• If node i’s val > all neighbors’ vals, then process i declares
itself a winner and notifies its neighbors.
• Any neighbor of a winner declares itself a loser, notifies its
neighbors.
• Processes reconstruct the remainin... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/203e61d32dfad9ba4279f269f1e4595b_MIT6_852JF09_lec03.pdf |
Filter Banks: time domain
Filter Banks: time domain
((HaarHaar example) and frequency domain;
example) and frequency domain;
conditions for alias cancellation
conditions for alias cancellation
and no distortion
and no distortion
trivial) example of a two channel FIR
Simplest (non--trivial) example of a two channe... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
i.e.
^^
x[2nx[2n--1] =
1] =
11
� 22
(y00[n][n] –– yy11[n]) = x[2n
(y
[n]) = x[2n--1]1]
^^
x[2n] =
x[2n] =
11
� 22
(y00[n] + y
(y
[n]) = x[2n]
[n] + y11[n]) = x[2n]
fromfrom jj andand kk
^^
So x[n]
So x[n]
=
=
x[n]
x[n]
�
Perfect reconstruction!
Perfect reconstruction!
In general, we will make all f... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
[1][1]
MM
^^ x
x
=
=
LTT BBTT
L
yy00
yy11
----------------mm
----------------
88
�
Perfect reconstruction means that the synthesis
Perfect reconstruction means that the synthesis
bank is the inverse of the analysis bank.
bank is the inverse of the analysis bank.
^^
�
x = x �
x = x
LL
LLTT BBT
T
= I= ... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
FF11(z)(z)
¯
vv11[n][n]
zz--transform definition:
transform definition:
¥
� x[n]z
X(z) = �
X(z) =
¥
n=n=--¥
w
Put z = eeii w
Put z =
x[n]z--nn
to get DTFT
to get DTFT
x[n]x[n]^^
1010
fl
fl
›
›
¯
¥
Perfect reconstruction requirement:
Perfect reconstruction requirement:
time delays)
(ll time delays)
(
^^
]
x... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
}
In frequency domain:
In frequency domain:
or X(eeiiw
or X(
w ))
fi X(X(w
X(z)X(z)
)
)
w ++ p
fi X(X(w
X(X(--z)z)
w
fi
X(zX(z½½)) fi
)
X(
X(
)
w
(
) =) = ½½{H{H00(
22
) X(
) X(
22
p ))
YY00((w
w
w
( + p
) + H00( +
) + H
22
22
w
p )X(
)X( ++ p
22
p )})}
1212
fi
w
fi
w
w
w
w
w
w
Suppose X(w
Suppos... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
1(z) H(z) H11(z) = 2z
(z) = 2z-- ll
--------------jj
--------------
2)2) Condition for alias cancellation (no term in X(
Condition for alias cancellation (no term in X(--z))z))
FF00(z) H(z) H00((--z) + F
z) = 0
z) + F11(z) H(z) H11((--z) = 0
--------------kk
--------------
To satisfy alias cancellation condition, ... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
So we can rewrite Equation
zz-- ll P(z) + z
P(z) + z-- ll P(P(--z) = 2z
z) = 2z-- ll
i.e.
i.e.
z) = 2
P(z) + P(--z) = 2
P(z) + P(
---------------------------pp
---------------------------
This is the condition on the normalized product filter
This is the condition on the normalized product filter
for Perfect Reco... | https://ocw.mit.edu/courses/18-327-wavelets-filter-banks-and-applications-spring-2003/204a826459bc8236e14f4787e1575cc2_Slides3.pdf |
6.867 Machine learning, lecture 9 (Jaakkola)
1
Lecture topics:
• Kernel optimization
• Model (kernel) selection
Kernel optimization
Whether we are interested in (linear) classification or regression we are faced with the
problem of selecting an appropriate kernel function. A step in this direction might be to
ta... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
in the kernel
representation as follows
K˜ (x, x�) = �
K(x, x�)
K(x, x)K(x�, x�)
(1)
Another approach to optimizing the kernel function is kernel alignment. In other words,
we would adjust the kernel parameters so as to make it, or its Gram matrix, more towards
an ideal target kernel. For example, in a classifica... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
as to make the Gram matrix of this kernel, Kij (θ), more similar to the Gram matrix of
∗ . To do this we view the Gram matrices as vectors and define their
the target kernel, Kij
inner product in the usual way
i=1
i=1
�K ∗, Kθ� =
n
�
i,j=1
Kij
∗ Kij (θ)
(5)
The parameters θ can be now set so as to maximize t... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
T x�) or
K2(x, x�) = (1 + x T x�)2
(7)
(8)
1In statistics, a model is a family/set of distributions or a family/set of linear separators.
Cite as: Tommi Jaakkola, course materials for 6.867 Machine Learning, Fall 2006. MIT OpenCourseWare
(http://ocw.mit.edu/), Massachusetts Institute of Technology. Downloaded on [... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
⊆ F2. For purposes of classification, we wouldn’t actually have to assert
that the families of discriminant functions are nested, only that the discriminant functions
in F2 can produce the signs of those in F1.
The formal problem for us to solve is then to select a kernel Ki from a set of possible kernels
K1, K2, . ... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
we chose
model Fi then we would find the best fitting discriminant function fˆ i ∈ Fi by minimizing
n
�
�
�
J(θ, θ0) =
Loss yt, f (xt; θ, θ0) + λn�θ�2
(11)
t=1
Cite as: Tommi Jaakkola, course materials for 6.867 Machine Learning, Fall 2006. MIT OpenCourseWare
(http://ocw.mit.edu/), Massachusetts Institute of Tec... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
example, our goal may be to
minimize classification error so that Loss∗(y, f (x)) = 1 − δ(y, sign(f (x))), i.e., the zero-one
loss. We could still estimate the SVM classifier from the training set in the usual way,
optimizing the hinge loss. The hinge loss can be viewed as a convex surrogate for the
zero-one loss and... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
distributions are the same.
Now, we clearly do not have access to the underlying distribution and therefore cannot
evaluate R(fˆ i). In fact, the whole model selection problem would go away if had access to
the underlying distribution P (x, y). To classify new instances, we would simply forget about
the training se... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
the labels and examples were linear (the
minimum probability of error classifier is linear), then the quadratic nature of the resulting
decision boundary would simply be due to noise and couldn’t generalize very well. So we
should be able to see an increasing gap between the training and test errors as a function
of... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
6.867 Machine learning, lecture 9 (Jaakkola)
that we would like to have and the empirical risk Rn(fˆ i)
Rn(fˆ i) =
1
n
n
�
�
�
Loss∗ yt, fˆ i(xt)
t=1
6
(15)
that we can compute. If we can do this, then we have a partial access to R(fˆ i) through its
empirical counterpart Rn(fˆ i). Note that the empirical r... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
increasing function of i,
the model order (e.g., the degree of polynomial kernel). Moreover, the penalty should go
down as a function n. In other words, the more data we have, the more complex models
we expect to be able to fit and still have the training error close to the generalization error.
The type of result i... | https://ocw.mit.edu/courses/6-867-machine-learning-fall-2006/2051efc0159bf145f2050469b7589fc5_lec9.pdf |
6.863J Natural Language Processing
Lecture 16: the boundaries of syntax &
semantics – towards constraint-based
systems
Robert C. Berwick
The Menu Bar
• Administrivia:
• Lab 4 due April 9? (what about Friday)
• Start w/ final projects, unless there are
objections
• Agenda:
• Shallow instead of ‘deep’ semantic... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
16 Sp03
Another Example
Syntax:
S � NP VP
VP � V NP
NP �
Det N
Semantics:
S : Apply(VP, NP)
VP : Apply(V, NP)
NP : Apply(lambda (x) (DEF/SING x), N)
Lexicon:
V:kissed = lambda(o) lambda(x) (kiss past
[agent x] [theme o])
N:guy = person
N:dog = DOG
Det:the = DEF/SING
:
Top-down parse sentence
The guy ki... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
(x) (kiss past [agent x] [theme DEF/SING DOG]), (DEF /SING Person))
(kiss past [agent DEF/SING Person] [theme DEF/SING DOG])
6.863J/9.611J Lecture 16 Sp03
Semantic Grammar: Definition
• Syntactic and semantic processing is collapsed
in a single framework
• Like a regular grammar but terminal symbols
are replaced... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
OD � for PERSON
FLIGHT-NP � ART FLIGHT-NOUN
FLIGHT-NP � ART FLIGHT-NOUN
FLIGHT-MODS
FLIGHT-MODS � FLIGHT-MOD
FLIGHT-MODS
FLIGHT-MODS � FLIGHT-MOD
FLIGHT-MOD � from SOURCE
LOCATION
FLIGHT-MOD � to DEST -LOCATION
Parse this sentence (bottom-up):
Book a flight from Boston to Chicago for me
6.863J/9.611J Lectur... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
Boston] [FLIGHT-MODS [FLIGHT
MOD to DEST-LOCATION Chicago]]]]] for me
• RES-MOD � for PERSON
[RESERVING RESERVE-VERB Book [FLIGHT-NP ART a FLIGHT-NOUN flight [FLIGHT
MODS [FLIGHT-MOD from SOURCE-LOCATION Boston] [FLIGHT-MODS [FLIGHT
MOD to DEST-LOCATION Chicago]]]]] [RES-MOD for PERSON me]
• RES-VP � RESERVING RE... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
accused the Farabundo Marti National Liberation Front (FMLN) of the
crime. (...)
Garcia Alvarado, 56, was killed when a bomb placed by urban guerrillas on
his vehicle exploded as it came to a halt at an intersection in downtown San
Salvador.
Vice President -elect Francisco Merino said that when the attorney-genera... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
• Precision
= # correct answers
# total answers
• Recall = # correct answers
# possible correct answers
• Fß =
((ß² + 1) x P x R)
(ß² x P x R)
6.863J/9.611J Lecture 16 Sp03
Architecture – Steps 1 to 3
• Tokenization � split words and punctuation
• He is mr. Jones! � He is mr. Jones !
• Named-entity recognit... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
<joint-venture> with
<companies>
• <produce> <product>
• <company> <capitalized> at <currency>
• <company> <start> <activity> in/on <date>
• Fusion of event structures referring to the
same event = (co-)reference resolution
6.863J/9.611J Lecture 16 Sp03
FASTUS – Evaluation
• MUC-4:
• 44% recall and 55% precis... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
categorization?
• Example:
• consider: __ NP[acc] {AdjP, NP, VP[inf]}
• regard: __ NP[acc] as {NP, AdjP}
• think: __ CP[that], __ NP[acc] NP
There are standard examples for these – cf.
Lab 3.
6.863J/9.611J Lecture 16 Sp03
Example – consider w/ no ‘as’
• John considers vanilla to be an
acceptable flavor
• John ... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
said he
considers them as having championship potential.
• Culturally, the Croats consider themselves as
belonging to the “civilized” West, …
6.863J/9.611J Lecture 16 Sp03
Regarding the NY Times
• As 70 to 80 percent of the cost of blood tests, like
prescriptions, is paid for by the state, neither physicians
nor... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
863J/9.611J Lecture 16 Sp03
Incorporating knowledge
• Do density estimation
P(form | meaning context)
6.863J/9.611J Lecture 16 Sp03
Application: retire
• Step 1: look at what dictionary or wordnet has
for subcat
• Result: intrans; transitive NP; PP (to, from)
• Step 2: see whether these examples attested
(viz... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
of getting PP[from])
6.863J/9.611J Lecture 16 Sp03
We can recalculate entire frame
0.25
=
• P(NP[subj]___|V=retire)
• P(NP[subj]___NP[obj]|V=retire) =
0.50
• P(NP[subj]___PP[from]|V=retire) = 0.04
• P(NP[subj]___PP[from]PP[after]|V=retire) =
0.003
…
(Sum of pr’s of all frames
adds to 1)
6.863J/9.611J Lectu... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
J Lecture 16 Sp03
So…
• Payoff: this knowledge builds parsers that
do very, very well – the best
• How can we acquire this info
automatically?
6.863J/9.611J Lecture 16 Sp03
Lerner (Brent 1993)
• Cues
• A pattern that can be matched against unrestricted
text
• NP NP � (OBJ|SUBJ_OBJ|CAP) (PUNC|CC)
• […] greet... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
16 Sp03
-
-
�
�
‡
Hypothesis Testing – Example
(
i
v P
(
=
p
E
)
=
(
i
v C
0
j
c
,
)
‡
j
f
n
)
�
=
m
=
mr
(
r
e 1
j
)
n
r
e
j
�
�
Ł
�
n
�
r
ł
• Verb = greet � occurs 80 times (n = 80)
• Cue = (OBJ|SUBJ_OBJ|CAP) (PUNC|CC) � has
e = 0.25
• Frame = NP__ NP
• C(greet,(OBJ|SUBJ_OBJ|CAP... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
Reject � PE = 0.011 < 0.02
6.863J/9.611J Lecture 16 Sp03
-
-
�
�
-
-
-
-
�
�
-
-
�
�
Ł
ł
�
�
�
�
Ł
ł
�
�
�
�
Ł
ł
Evaluating Lerner
• Very high precision � always close to
100%
• Recall is lower � only 60%
• Only for six frames …
6.863J/9.611J Lecture 16 Sp03
We can start adding pr’... | https://ocw.mit.edu/courses/6-863j-natural-language-and-the-computer-representation-of-knowledge-spring-2003/20c08c6b52614f6bc8ebbb0d7d7a457e_lecture16bw_03.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.