• Title/Summary/Keyword: Posterior robustness

Search Result 13, Processing Time 0.027 seconds

Robust Bayes and Empirical Bayes Analysis in Finite Population Sampling with Auxiliary Information

  • Kim, Dal-Ho
    • Journal of the Korean Statistical Society
    • /
    • v.27 no.3
    • /
    • pp.331-348
    • /
    • 1998
  • In this paper, we have proposed some robust Bayes estimators using ML-II priors as well as certain empirical Bayes estimators in estimating the finite population mean in the presence of auxiliary information. These estimators are compared with the classical ratio estimator and a subjective Bayes estimator utilizing the auxiliary information in terms of "posterior robustness" and "procedure robustness" Also, we have addressed the issue of choice of sampling design from a robust Bayesian viewpoint.

  • PDF

Robust Bayes and Empirical Bayes Analysis in Finite Population Sampling

  • Dal Ho Kim
    • Communications for Statistical Applications and Methods
    • /
    • v.2 no.2
    • /
    • pp.63-73
    • /
    • 1995
  • We consider some robust Bayes estimators using ML-II priors as well as certain empirical Bayes estimators in estimating the finite population mean. The proposed estimators are compared with the sample mean and subjective Bayes estimators in terms of "posterior robustness" and "procedure robustness".re robustness".uot;.

  • PDF

Local Sensitivity Analysis using Divergence Measures under Weighted Distribution

  • Chung, Younshik;Dey, Dipak K.
    • Journal of the Korean Statistical Society
    • /
    • v.30 no.3
    • /
    • pp.467-480
    • /
    • 2001
  • This paper considers the use of local $\phi$-divergence measures between posterior distributions under classes of perturbations in order to investigate the inherent robustness of certain classes. The smaller value of the limiting local $\phi$-divergence implies more robustness for the prior or the likelihood. We consider the cases when the likelihood comes form the class of weighted distribution. Two kinds of perturbations are considered for the local sensitivity analysis. In addition, some numerical examples are considered which provide measures of robustness.

  • PDF

Robustness in the Hierarchical Bayes Estimation of Normal Means

  • Kim, Dal-Ho;Park, Jin -Kap
    • Communications for Statistical Applications and Methods
    • /
    • v.6 no.2
    • /
    • pp.511-522
    • /
    • 1999
  • The paper considers the problem of robustness in hierarchical bayesian models. In specific we address Bayesian robustness in the estimation of normal means. We provide the ranges of the posterior means under $\varepsilon$-contamination class as well as the density ratio class of priors. For the class of priors that are uniform over a specified interval we investigate the sensitivity as to the choice of the intervals. The methods are illustrated using the famous baseball data of Efron and Morris(1975).

  • PDF

The Motion Estimation of Caterpilla-type Mobile Robot Using Robust SLAM (강인한 SLAM을 이용한 무한궤도형 이동로봇의 모션 추정)

  • Byun, Sung-Jae;Lee, Suk-Gyu;Park, Ju-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.4
    • /
    • pp.817-823
    • /
    • 2009
  • This paper proposes a robust method for mapping of a caterpillar-type mobile robot which inherently has uncertainty in its modeling by compensating for the estimated pose error of the robot. In general, a caterpillar type robot is difficult to model, which results in inaccuracy in Simultaneous Localization And Mapping(SLAM). To enhance the robustness of the SLAM for a caterpillar-type mobile robot, we factorize the SLAM posterior, where we used particle filter to estimate the position of the robot and Extended Kalman Filter(EKF) to map the environment. The simulation results show the effectiveness and robustness of the proposed method for mapping.

Utterance Verification Using Search Confusion Rate and Its N-Best Approach

  • Kim, Kyu-Hong;Kim, Hoi-Rin;Hahn, Min-Soo
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.461-464
    • /
    • 2005
  • Recently, a variety of confidence measures for utterance verification has been studied to improve speech recognition performance by rejecting out-of-vocabulary inputs. Most of the conventional confidence measures for utterance verification are based primarily on hypothesis testing or an approximated posterior probability, and their performances depend on the robustness of an alternative hypothesis or the prior probability. We introduce a novel confidence measure called a search confusion rate (SCR), which does not require an alternative hypothesis or the approximation of posterior probability. Our confusion-based approach shows better performance in additive noise-corrupted speech as well as in clean speech.

  • PDF

Creep-Induced Tension Loosening of CRT Tension Mask (크리프에 따른 CRT 텐션 마스크의 장력 이완)

  • Chung, Il-Sup
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.6
    • /
    • pp.1034-1040
    • /
    • 2003
  • Tension mask is a part of CRT type devices, which is installed right behind glass-made front panel. Numerous slits on the thin metal sheet enable the electron beams emitted from posterior gun to be focused, resulting in enhanced definition. Flattened and enlarged displays necessitate the imposition of pretension on the masks, in order to improve the robustness of display quality against vibration or impact. High temperature assembly process subsequent to pretensioning, however, degenerates creep resistance of mask material, and common mask may become susceptible to undesirable elongation due to creep. Once tensile stress becomes high enough to induce creep deformation, pretension is substantially loosened. In this study, tension mask assembly is modeled as a combined structure of beams and wire array, and a numerical simulation is attempted for pretensioning followed by high temperature process. Based on a model study, creep occurrence is found to be probable and its adverse influence is quantified. As fur maintaining high tensile force, simply increasing pretension does not seem to be helpful. Instead, the structure of frame needs to be modified somehow, or material for mask needs to be selected properly.

Factor Graph-based Multipath-assisted Indoor Passive Localization with Inaccurate Receiver

  • Hao, Ganlin;Wu, Nan;Xiong, Yifeng;Wang, Hua;Kuang, Jingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.703-722
    • /
    • 2016
  • Passive wireless devices have increasing civilian and military applications, especially in the scenario with wearable devices and Internet of Things. In this paper, we study indoor localization of a target equipped with radio-frequency identification (RFID) device in ultra-wideband (UWB) wireless networks. With known room layout, deterministic multipath components, including the line-of-sight (LOS) signal and the reflected signals via multipath propagation, are employed to locate the target with one transmitter and a single inaccurate receiver. A factor graph corresponding to the joint posterior position distribution of target and receiver is constructed. However, due to the mixed distribution in the factor node of likelihood function, the expressions of messages are intractable by directly applying belief propagation on factor graph. To this end, we approximate the messages by Gaussian distribution via minimizing the Kullback-Leibler divergence (KLD) between them. Accordingly, a parametric message passing algorithm for indoor passive localization is derived, in which only the means and variances of Gaussian distributions have to be updated. Performance of the proposed algorithm and the impact of critical parameters are evaluated by Monte Carlo simulations, which demonstrate the superior performance in localization accuracy and the robustness to the statistics of multipath channels.

First report on Gonyaulax polygramma (Gonyaulacales, Dinophyceae) blooms in the Yeosu waters of the South Sea of Korea

  • Cho Eun-Seob
    • Journal of Environmental Science International
    • /
    • v.14 no.7
    • /
    • pp.639-647
    • /
    • 2005
  • The aim of this study is to determine the outbreaks of nontoxic Gonyaulax polygramma Stein in Yeosu waters in place of harmful Cochlodinium polykrikoides Margalef, which has occurred annually in the same region since 1995. The observation of cellular arrangement and structure by electron microscopy showed that G. polygramma isolated from Yeosu waters had a few spines connecting with membranes and prominent longitudinal ridges on the cell surface, with a cingular displacement 1.5 times their cell width. Furthermore, the location of the nucleus was posterior of large oval formation according to electron microscopy. On 6 August, 2004, the first bloom of G. polygramma occurred, the date of its disappearance was with a maximum cell density of 8,000 cells $ml^{-1}$ on 21 August, 2004. During the period of this study, the horizontal distribution of sea water temperature and salinity showed a strong coastal front, whereas the front of DIN (Dissolved Inorganic Nitrogen) was significantly different between the occurrence and disappearance of G. polygramma blooms. These results suggested that the process of the breakdown of stratification by wind and a low level of inorganic nitrogen play important roles in the rapid growth of G. polygramma, which is associated with a greater robustness in growth against DIN than that of C. polykrikoides in nature.

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.