6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H...
Transcript of 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H...
![Page 1: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/1.jpg)
![Page 2: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/2.jpg)
![Page 3: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/3.jpg)
yi i i y
xi i i X
xij j i
d i
![Page 4: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/4.jpg)
yi i i y
xi i i X
xij j i
d i
![Page 5: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/5.jpg)
yi
p(yi|xi) ∝ p(xi|yi)p(yi)
![Page 6: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/6.jpg)
yi
p(yi|xi) ∝ p(xi|yi)p(yi)
![Page 7: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/7.jpg)
p(xi|yi)p(yi) = p(xi, yi) = p(xi1, ..., xid, yi)
p(xi1, ..., xid, yi) = p(xi1|xi2, ..., xid, yi)p(xi2, ..., xid, yi)
= ...
= p(xi1|xi2, ..., xid, yi)p(xi2|xi3, ..., xid, yi) p(xid|yi)p(yi)
xi yi
p(xij |xij+1, ..., xid, yi) = p(xij |yi)
p(yi, xi) ∝ p(yi)d∏
j=1
p(xij |yi)
![Page 8: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/8.jpg)
p(xi|yi)p(yi) = p(xi, yi) = p(xi1, ..., xid, yi)
p(xi1, ..., xid, yi) = p(xi1|xi2, ..., xid, yi)p(xi2, ..., xid, yi)
= ...
= p(xi1|xi2, ..., xid, yi)p(xi2|xi3, ..., xid, yi) p(xid|yi)p(yi)
xi yi
p(xij |xij+1, ..., xid, yi) = p(xij |yi)
p(yi, xi) ∝ p(yi)d∏
j=1
p(xij |yi)
![Page 9: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/9.jpg)
p(xi|yi)p(yi) = p(xi, yi) = p(xi1, ..., xid, yi)
p(xi1, ..., xid, yi) = p(xi1|xi2, ..., xid, yi)p(xi2, ..., xid, yi)
= ...
= p(xi1|xi2, ..., xid, yi)p(xi2|xi3, ..., xid, yi) p(xid|yi)p(yi)
xi yi
p(xij |xij+1, ..., xid, yi) = p(xij |yi)
p(yi, xi) ∝ p(yi)d∏
j=1
p(xij |yi)
![Page 10: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/10.jpg)
p(xi|yi)p(yi) = p(xi, yi) = p(xi1, ..., xid, yi)
p(xi1, ..., xid, yi) = p(xi1|xi2, ..., xid, yi)p(xi2, ..., xid, yi)
= ...
= p(xi1|xi2, ..., xid, yi)p(xi2|xi3, ..., xid, yi) p(xid|yi)p(yi)
xi yi
p(xij |xij+1, ..., xid, yi) = p(xij |yi)
p(yi, xi) ∝ p(yi)d∏
j=1
p(xij |yi)
![Page 11: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/11.jpg)
![Page 12: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/12.jpg)
![Page 13: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/13.jpg)
p( = N | = Y, = N, = Y ) ∝p( = Y | = N)p( = N | = N)p( =
Y | = N)p( = N) = 13 ∗ 2
3 ∗ 13 ∗ 1
2 = 0.0370
p( = Y | = Y, = N, = Y ) ∝p( = Y | = Y )p( = N | = Y )p( =
Y | = Y )p( = Y ) = 23 ∗ 1
3 ∗ 23 ∗ 1
2 = 0.0741
![Page 14: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/14.jpg)
p( = N | = Y, = N, = Y ) ∝p( = Y | = N)p( = N | = N)p( =
Y | = N)p( = N) = 13 ∗ 2
3 ∗ 13 ∗ 1
2 = 0.0370
p( = Y | = Y, = N, = Y ) ∝p( = Y | = Y )p( = N | = Y )p( =
Y | = Y )p( = Y ) = 23 ∗ 1
3 ∗ 23 ∗ 1
2 = 0.0741
![Page 15: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/15.jpg)
p( = N | = Y, = N, = Y ) ∝p( = Y | = N)p( = N | = N)p( =
Y | = N)p( = N) = 13 ∗ 2
3 ∗ 13 ∗ 1
2 = 0.0370
p( = Y | = Y, = N, = Y ) ∝p( = Y | = Y )p( = N | = Y )p( =
Y | = Y )p( = Y ) = 23 ∗ 1
3 ∗ 23 ∗ 1
2 = 0.0741
![Page 16: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/16.jpg)
p( = N | = Y, = N, = Y ) ∝p( = Y | = N)p( = N | = N)p( =
Y | = N)p( = N) = 13 ∗ 2
3 ∗ 13 ∗ 1
2 = 0.0370
p( = Y | = Y, = N, = Y ) ∝p( = Y | = Y )p( = N | = Y )p( =
Y | = Y )p( = Y ) = 23 ∗ 1
3 ∗ 23 ∗ 1
2 = 0.0741
![Page 17: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/17.jpg)
![Page 18: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/18.jpg)
p(F |G) = 1 1%
p(F | ∼ G) = 0.01
p(G|F ) =?
F
G
∼ G
![Page 19: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/19.jpg)
p(G|F ) =p(F |G)p(G)
p(F )=
p(F |G)p(G)
p(F |G)p(G) + p(F | ∼ G)p(∼ G)
p(G) =? →
![Page 20: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/20.jpg)
p(G|F ) =p(F |G)p(G)
p(F )=
p(F |G)p(G)
p(F |G)p(G) + p(F | ∼ G)p(∼ G)
p(G) =? →
![Page 21: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/21.jpg)
⇒
![Page 22: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/22.jpg)
⇒
![Page 23: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/23.jpg)
⇒
![Page 24: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/24.jpg)
![Page 25: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/25.jpg)
![Page 26: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/26.jpg)
![Page 27: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/27.jpg)
![Page 28: 6 HHkyRd - Home | Computer Science at UBCschmidtm/Courses/340-F17/T3.pdf · Pp2`pB2r RL Bp2" v2b*H bbB}2` kLQM@S ` K2i`B+JQ/2Hb.2}MBiBQMb ELL jh` BMBM;-h2biBM;- M/o HB/ iBQMa2i kfR9](https://reader033.fdocuments.us/reader033/viewer/2022060921/60aca0ef6c0dcc19c869eb62/html5/thumbnails/28.jpg)