-
Non-coresident family as a driver of migration change in a crisis: The case of the COVID-19 pandemic
Authors:
Unchitta Kan,
Jericho McLeod,
Eduardo López
Abstract:
Changes in U.S. migration during the COVID-19 pandemic show that many moved to less populated cities from larger cities, deviating from previous trends. In this study, building on prior work in the literature showing that the abundance of family ties is inversely related to population size, we analyze these migration changes with a focus on the crucial, yet overlooked factor of extended family. Em…
▽ More
Changes in U.S. migration during the COVID-19 pandemic show that many moved to less populated cities from larger cities, deviating from previous trends. In this study, building on prior work in the literature showing that the abundance of family ties is inversely related to population size, we analyze these migration changes with a focus on the crucial, yet overlooked factor of extended family. Employing two large-scale data sets, census microdata and mobile phone GPS relocation data, we show a collection of empirical results that paints a picture of migration change affected by kin. Namely, we find that people migrated closer to family at higher rates after the COVID-19 pandemic started. Moreover, even controlling for factors such as population density and cost of living, we find that changes in net in-migration tended to be larger and positive in cities with larger proportions of people who can be parents to adult children (our proxy for parental family availability, which is also inversely related to population size). Our study advances the demography-disaster nexus and amplifies ongoing literature highlighting the role of broader kinship systems in large-scale socioeconomic phenomena.
△ Less
Submitted 2 April, 2024; v1 submitted 4 October, 2023;
originally announced October 2023.
-
A Step Towards Worldwide Biodiversity Assessment: The BIOSCAN-1M Insect Dataset
Authors:
Zahra Gharaee,
ZeMing Gong,
Nicholas Pellegrino,
Iuliia Zarubiieva,
Joakim Bruslund Haurum,
Scott C. Lowe,
Jaclyn T. A. McKeown,
Chris C. Y. Ho,
Joschka McLeod,
Yi-Yun C Wei,
Jireh Agda,
Sujeevan Ratnasingham,
Dirk Steinke,
Angel X. Chang,
Graham W. Taylor,
Paul Fieguth
Abstract:
In an effort to catalog insect biodiversity, we propose a new large dataset of hand-labelled insect images, the BIOSCAN-Insect Dataset. Each record is taxonomically classified by an expert, and also has associated genetic information including raw nucleotide barcode sequences and assigned barcode index numbers, which are genetically-based proxies for species classification. This paper presents a c…
▽ More
In an effort to catalog insect biodiversity, we propose a new large dataset of hand-labelled insect images, the BIOSCAN-Insect Dataset. Each record is taxonomically classified by an expert, and also has associated genetic information including raw nucleotide barcode sequences and assigned barcode index numbers, which are genetically-based proxies for species classification. This paper presents a curated million-image dataset, primarily to train computer-vision models capable of providing image-based taxonomic assessment, however, the dataset also presents compelling characteristics, the study of which would be of interest to the broader machine learning community. Driven by the biological nature inherent to the dataset, a characteristic long-tailed class-imbalance distribution is exhibited. Furthermore, taxonomic labelling is a hierarchical classification scheme, presenting a highly fine-grained classification problem at lower levels. Beyond spurring interest in biodiversity research within the machine learning community, progress on creating an image-based taxonomic classifier will also further the ultimate goal of all BIOSCAN research: to lay the foundation for a comprehensive survey of global biodiversity. This paper introduces the dataset and explores the classification task through the implementation and analysis of a baseline classifier.
△ Less
Submitted 13 November, 2023; v1 submitted 19 July, 2023;
originally announced July 2023.
-
Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts
Authors:
Beckett LeClair,
James McLeod,
Lee Ramsay,
Mick Warren
Abstract:
The ever increasing push towards reliance upon computerised technology in commercial, general, and military aerospace brings with it an increasing amount of potential cyber hazards and attacks. Consequently, the variety of attack vectors is greater than ever. Recognized Good Practice standards such as DO 326A and ED 202A attempt to address this by providing guidelines for cyber security on in-serv…
▽ More
The ever increasing push towards reliance upon computerised technology in commercial, general, and military aerospace brings with it an increasing amount of potential cyber hazards and attacks. Consequently, the variety of attack vectors is greater than ever. Recognized Good Practice standards such as DO 326A and ED 202A attempt to address this by providing guidelines for cyber security on in-service aircraft, though implementation work for such initiatives is still in early stages. From previous work on in service aircraft, the authors have determined that one of the key challenges is that of the retrospective application of new regulations to existing designs. This can present significant requirements for time, money, and Suitably Qualified and Experienced Personnel resource, things which are often in already limited supply in military environments. The authors have previously explored efficient ways of approaching compliance, with promising results. There is still the need to consider this retroactivity challenge in tandem with other key factors affecting the application of CSA, in order to determine any more potential mitigating actions that could lower the barrier to effective and efficient implementation of secure approaches in the air domain. This work explores the interrelated challenges surrounding real-world applications of CSA and the beginnings of how these may be overcome.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Origins of Face-to-face Interaction with Kin in US Cities
Authors:
Jericho McLeod,
Unchitta Kan,
Eduardo López
Abstract:
People interact face-to-face on a frequent basis if (i) they live nearby and (ii) make the choice to meet. The first constitutes an availability of social ties; the second a propensity to interact with those ties. Despite being distinct social processes, most large-scale human interaction studies overlook these separate influences. Here, we study trends of interaction, availability, and propensity…
▽ More
People interact face-to-face on a frequent basis if (i) they live nearby and (ii) make the choice to meet. The first constitutes an availability of social ties; the second a propensity to interact with those ties. Despite being distinct social processes, most large-scale human interaction studies overlook these separate influences. Here, we study trends of interaction, availability, and propensity across US cities for a critical, abundant, and understudied type of social tie: extended family that live locally in separate households. We observe a systematic decline in interactions as a function of city population, which we attribute to decreased non-coresident local family availability. In contrast, interaction propensity and duration are either independent of or increase with city population. The large-scale patterns of availability and interaction propensity we discover, derived from analyzing the American Time Use Survey and Pew Social Trends Survey data, unveil previously-unknown effects on several social processes such as the effectiveness of pandemic-related social interventions, drivers affecting residential choice, and the ability of kin to provide care to family.
△ Less
Submitted 13 May, 2023;
originally announced May 2023.
-
Validating Gaussian Process Models with Simulation-Based Calibration
Authors:
John Mcleod,
Fergus Simpson
Abstract:
Gaussian process priors are a popular choice for Bayesian analysis of regression problems. However, the implementation of these models can be complex, and ensuring that the implementation is correct can be challenging. In this paper we introduce Gaussian process simulation-based calibration, a procedure for validating the implementation of Gaussian process models and demonstrate the efficacy of th…
▽ More
Gaussian process priors are a popular choice for Bayesian analysis of regression problems. However, the implementation of these models can be complex, and ensuring that the implementation is correct can be challenging. In this paper we introduce Gaussian process simulation-based calibration, a procedure for validating the implementation of Gaussian process models and demonstrate the efficacy of this procedure in identifying a bug in existing code. We also present a novel application of this procedure to identify when marginalisation of the model hyperparameters is necessary.
△ Less
Submitted 27 October, 2021;
originally announced October 2021.
-
GPflux: A Library for Deep Gaussian Processes
Authors:
Vincent Dutordoir,
Hugh Salimbeni,
Eric Hambro,
John McLeod,
Felix Leibfried,
Artem Artemev,
Mark van der Wilk,
James Hensman,
Marc P. Deisenroth,
ST John
Abstract:
We introduce GPflux, a Python library for Bayesian deep learning with a strong emphasis on deep Gaussian processes (DGPs). Implementing DGPs is a challenging endeavour due to the various mathematical subtleties that arise when dealing with multivariate Gaussian distributions and the complex bookkee** of indices. To date, there are no actively maintained, open-sourced and extendable libraries ava…
▽ More
We introduce GPflux, a Python library for Bayesian deep learning with a strong emphasis on deep Gaussian processes (DGPs). Implementing DGPs is a challenging endeavour due to the various mathematical subtleties that arise when dealing with multivariate Gaussian distributions and the complex bookkee** of indices. To date, there are no actively maintained, open-sourced and extendable libraries available that support research activities in this area. GPflux aims to fill this gap by providing a library with state-of-the-art DGP algorithms, as well as building blocks for implementing novel Bayesian and GP-based hierarchical models and inference schemes. GPflux is compatible with and built on top of the Keras deep learning eco-system. This enables practitioners to leverage tools from the deep learning community for building and training customised Bayesian models, and create hierarchical models that consist of Bayesian and standard neural network layers in a single coherent framework. GPflux relies on GPflow for most of its GP objects and operations, which makes it an efficient, modular and extensible library, while having a lean codebase.
△ Less
Submitted 12 April, 2021;
originally announced April 2021.
-
Bellman: A Toolbox for Model-Based Reinforcement Learning in TensorFlow
Authors:
John McLeod,
Hrvoje Stojic,
Vincent Adam,
Dongho Kim,
Jordi Grau-Moya,
Peter Vrancx,
Felix Leibfried
Abstract:
In the past decade, model-free reinforcement learning (RL) has provided solutions to challenging domains such as robotics. Model-based RL shows the prospect of being more sample-efficient than model-free methods in terms of agent-environment interactions, because the model enables to extrapolate to unseen situations. In the more recent past, model-based methods have shown superior results compared…
▽ More
In the past decade, model-free reinforcement learning (RL) has provided solutions to challenging domains such as robotics. Model-based RL shows the prospect of being more sample-efficient than model-free methods in terms of agent-environment interactions, because the model enables to extrapolate to unseen situations. In the more recent past, model-based methods have shown superior results compared to model-free methods in some challenging domains with non-linear state transitions. At the same time, it has become apparent that RL is not market-ready yet and that many real-world applications are going to require model-based approaches, because model-free methods are too sample-inefficient and show poor performance in early stages of training. The latter is particularly important in industry, e.g. in production systems that directly impact a company's revenue. This demonstrates the necessity for a toolbox to push the boundaries for model-based RL. While there is a plethora of toolboxes for model-free RL, model-based RL has received little attention in terms of toolbox development. Bellman aims to fill this gap and introduces the first thoroughly designed and tested model-based RL toolbox using state-of-the-art software engineering practices. Our modular approach enables to combine a wide range of environment models with generic model-based agent classes that recover state-of-the-art algorithms. We also provide an experiment harness to compare both model-free and model-based agents in a systematic fashion w.r.t. user-defined evaluation metrics (e.g. cumulative reward). This paves the way for new research directions, e.g. investigating uncertainty-aware environment models that are not necessarily neural-network-based, or develo** algorithms to solve industrially-motivated benchmarks that share characteristics with real-world problems.
△ Less
Submitted 13 April, 2021; v1 submitted 26 March, 2021;
originally announced March 2021.
-
Stereo Correspondence and Reconstruction of Endoscopic Data Challenge
Authors:
Max Allan,
Jonathan Mcleod,
Congcong Wang,
Jean Claude Rosenthal,
Zhenglei Hu,
Niklas Gard,
Peter Eisert,
Ke Xue Fu,
Trevor Zeffiro,
Wenyao Xia,
Zhanshi Zhu,
Huoling Luo,
Fucang Jia,
Xiran Zhang,
Xiaohong Li,
Lalith Sharan,
Tom Kurmann,
Sebastian Schmid,
Raphael Sznitman,
Dimitris Psychogyios,
Mahdi Azizian,
Danail Stoyanov,
Lena Maier-Hein,
Stefanie Speidel
Abstract:
The stereo correspondence and reconstruction of endoscopic data sub-challenge was organized during the Endovis challenge at MICCAI 2019 in Shenzhen, China. The task was to perform dense depth estimation using 7 training datasets and 2 test sets of structured light data captured using porcine cadavers. These were provided by a team at Intuitive Surgical. 10 teams participated in the challenge day.…
▽ More
The stereo correspondence and reconstruction of endoscopic data sub-challenge was organized during the Endovis challenge at MICCAI 2019 in Shenzhen, China. The task was to perform dense depth estimation using 7 training datasets and 2 test sets of structured light data captured using porcine cadavers. These were provided by a team at Intuitive Surgical. 10 teams participated in the challenge day. This paper contains 3 additional methods which were submitted after the challenge finished as well as a supplemental section from these teams on issues they found with the dataset.
△ Less
Submitted 28 January, 2021; v1 submitted 4 January, 2021;
originally announced January 2021.
-
Temporal Segmentation of Surgical Sub-tasks through Deep Learning with Multiple Data Sources
Authors:
Yidan Qin,
Sahba Aghajani Pedram,
Seyedshams Feyzabadi,
Max Allan,
A. Jonathan McLeod,
Joel W. Burdick,
Mahdi Azizian
Abstract:
Many tasks in robot-assisted surgeries (RAS) can be represented by finite-state machines (FSMs), where each state represents either an action (such as picking up a needle) or an observation (such as bleeding). A crucial step towards the automation of such surgical tasks is the temporal perception of the current surgical scene, which requires a real-time estimation of the states in the FSMs. The ob…
▽ More
Many tasks in robot-assisted surgeries (RAS) can be represented by finite-state machines (FSMs), where each state represents either an action (such as picking up a needle) or an observation (such as bleeding). A crucial step towards the automation of such surgical tasks is the temporal perception of the current surgical scene, which requires a real-time estimation of the states in the FSMs. The objective of this work is to estimate the current state of the surgical task based on the actions performed or events occurred as the task progresses. We propose Fusion-KVE, a unified surgical state estimation model that incorporates multiple data sources including the Kinematics, Vision, and system Events. Additionally, we examine the strengths and weaknesses of different state estimation models in segmenting states with different representative features or levels of granularity. We evaluate our model on the JHU-ISI Gesture and Skill Assessment Working Set (JIGSAWS), as well as a more complex dataset involving robotic intra-operative ultrasound (RIOUS) imaging, created using the da Vinci Xi surgical system. Our model achieves a superior frame-wise state estimation accuracy up to 89.4%, which improves the state-of-the-art surgical state estimation models in both JIGSAWS suturing dataset and our RIOUS dataset.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach
Authors:
Isuru Udayangani Hewapathirana,
Dominic Lee,
Elena Moltchanova,
Jeanette McLeod
Abstract:
Change detection in dynamic networks is an important problem in many areas, such as fraud detection, cyber intrusion detection and health care monitoring. It is a challenging problem because it involves a time sequence of graphs, each of which is usually very large and sparse with heterogeneous vertex degrees, resulting in a complex, high dimensional mathematical object. Spectral embedding methods…
▽ More
Change detection in dynamic networks is an important problem in many areas, such as fraud detection, cyber intrusion detection and health care monitoring. It is a challenging problem because it involves a time sequence of graphs, each of which is usually very large and sparse with heterogeneous vertex degrees, resulting in a complex, high dimensional mathematical object. Spectral embedding methods provide an effective way to transform a graph to a lower dimensional latent Euclidean space that preserves the underlying structure of the network. Although change detection methods that use spectral embedding are available, they do not address sparsity and degree heterogeneity that usually occur in noisy real-world graphs and a majority of these methods focus on changes in the behaviour of the overall network.
In this paper, we adapt previously developed techniques in spectral graph theory and propose a novel concept of applying Procrustes techniques to embedded points for vertices in a graph to detect changes in entity behaviour. Our spectral embedding approach not only addresses sparsity and degree heterogeneity issues, but also obtains an estimate of the appropriate embedding dimension. We call this method CDP (change detection using Procrustes analysis). We demonstrate the performance of CDP through extensive simulation experiments and a real-world application. CDP successfully detects various types of vertex-based changes including (i) changes in vertex degree, (ii) changes in community membership of vertices, and (iii) unusual increase or decrease in edge weight between vertices. The change detection performance of CDP is compared with two other baseline methods that employ alternative spectral embedding approaches. In both cases, CDP generally shows superior performance.
△ Less
Submitted 5 October, 2019;
originally announced October 2019.
-
A Continuous Max-Flow Approach to Cyclic Field Reconstruction
Authors:
John S. H. Baxter,
Jonathan McLeod,
Terry M. Peters
Abstract:
Reconstruction of an image from noisy data using Markov Random Field theory has been explored by both the graph-cuts and continuous max-flow community in the form of the Potts and Ishikawa models. However, neither model takes into account the particular cyclic topology of specific intensity types such as the hue in natural colour images, or the phase in complex valued MRI. This paper presents \tex…
▽ More
Reconstruction of an image from noisy data using Markov Random Field theory has been explored by both the graph-cuts and continuous max-flow community in the form of the Potts and Ishikawa models. However, neither model takes into account the particular cyclic topology of specific intensity types such as the hue in natural colour images, or the phase in complex valued MRI. This paper presents \textit{cyclic continuous max-flow} image reconstruction which models the intensity being reconstructed as having a fundamentally cyclic topology. This model complements the Ishikawa model in that it is designed with image reconstruction in mind, having the topology of the intensity space inherent in the model while being readily extendable to an arbitrary intensity resolution.
△ Less
Submitted 11 November, 2015;
originally announced November 2015.
-
Cooperative Automated Worm Response and Detection Immune Algorithm
Authors:
Jungwon Kim,
William Wilson,
Uwe Aickelin,
Julie McLeod
Abstract:
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell matu…
▽ More
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such an algorithm fits into a complete immune inspired computer security system and framework.
△ Less
Submitted 13 January, 2010;
originally announced January 2010.
-
Danger Theory: The Link between AIS and IDS?
Authors:
Uwe Aickelin,
Peter Bentley,
Steve Cayzer,
Kim Jungwon,
Julie McLeod
Abstract:
We present ideas about creating a next generation Intrusion Detection System based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and f…
▽ More
We present ideas about creating a next generation Intrusion Detection System based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems. The Human Immune System can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System for our computers.
△ Less
Submitted 16 May, 2008; v1 submitted 13 March, 2008;
originally announced March 2008.