Lecture Notes on the EM Algorithm
نویسنده
چکیده
This is a short tutorial on the EM algorithm, including modern proofs of monotonicity, and several examples focusing on the use of EM to handle heavy-tailed models (Laplace, Student) and on finite mixture estimation. 1 The Algorithm Consider a general scenario in which we have observed data x, and a set of unknown parameters θ. Let us also assume some prior p(θ) for the parameters, which could well be a flat prior. The a posteriori probability function p(θ|x) is proportional to p(x|θ)p(θ). Now, suppose that finding the MAP estimate of θ would be easier if we had access to some other data y, that is, it would be easy to maximize p(x,y|θ)p(θ), where p(x,y|θ) is related to p(x|θ) via marginalization p(x|θ) = ∫ p(y,x|θ) dy. (1) The expectation-maximization (EM) algorithm is an iterative procedure which can be shown to converge to a (local) maximum of the marginal a posteriori probability function p(θ|x) = p(x|θ) p(θ), without the need to explicitly manipulate the marginal likelihood p(x|θ). EM was first proposed in [9], and since then it has attracted a great deal of interest and stimulated a considerable amount of research. For example, the EM algorithm has been often used
منابع مشابه
Lecture Notes: Comparison-Based Lower Bounds
We have proved in a previous lecture that the permutation problem on n elements requires Ω(min{n, n B logM/B n B}) I/Os to solve in the indivisibility model. This immediately implies the same lower bound for sorting—if we can sort n elements in x I/Os, then we can also permute them in O(x) I/Os. This, in turn, means that no “indivisible” EM algorithm can always sort in o( n B logM/B n B ) I/Os,...
متن کاملFactors affecting students tendency of Univercity students to Lecture Notes
Introduction: Many studies detected factors contributing to the students’ tendency to lecture notes. This study aimed at evaluating the factors affecting students tendency to lecture notes in Hormozgan University of Medical Sciences. Methods: In this descriptive study, 179 students from medicine, nursing & midwifery, health, and Paramedicine schools were selected through stratified random...
متن کاملPerturbing Thermodynamically Unfeasible Metabolic Networks
Reactions within the cell should satisfy the law of mass conservation and the second law of thermodynamics. Networks of reactions violating any of these laws are unphysical and cannot occur in nature. In this paper we describe a technique that perturbs an unfeasible network to produce a metabolic network that satisfies the two fundamental laws. This algorithm has been applied to study the metab...
متن کاملEvaluation of the Contents of Partitions Obtained with Clustering Gene Expression Data
This work investigates the behavior of two different clustering algorithms, with two proximity measures, in terms of the contents of the partitions obtained with them. An analysis of how the classes are separated by these algorithms, as different numbers of clusters are generated, is also presented. A discussion on the use of these information in the identification of special cases for further ...
متن کاملSearching for Non-coding RNA
IV BSB 4 Favor ver os Anais do Simpósio em Springer Verlag, Lecture Notes in Bioinformatics (LNBI número 3594) para este trabalho.
متن کاملSegmentation and Centromere Locating Methods Applied to Fish Chromosomes Images
The objective of this paper is to describe a new approach for locating the centromere of each chromosome displayed in the digitalized photomicrography of fish cells. To detect the centromere position, the authors propose methods for both image segmentation and split touching chromosomes based on the fuzzy sets theory and a method for the rotation of chromosomes. These methods were applied to tw...
متن کامل