Computational Intelligence - August 2014 - 34

to each row of the distance matrix. The
method was tested on +34,500 light curves
from early-stage periodic variable star catalogs
originated from the MACHO and OGLE [3]
surveys. The results of this process were lists of
mislabeled variables with careful explanations
of the new phenomena and reasons why they
were misclassified. Calculating the similarity matrix scales quadratically with the number of light curves in the survey. The
authors discuss this issue and provide an approximation of the
metric that reduces the computational complexity to O (N).
Also, an exact and efficient solution for distance-based outlier
detection can be found in [43], which uses a discord metric
that requires only two linear searches to find outlier light
curves as well.
A different approach for novelty detection was given in
[44], where an anomaly detection technique dubbed PCAD
(Periodic Curve Anomaly Detection) was proposed and used
to find outlier periodic variables in large astronomical databases. PCAD finds clusters using a modified k -means algorithm called phased k -means ( pk -means). This modification
is required in order to compare asynchronous time series
(arbitrary phases). By using a clustering methodology the
authors were able to find anomalies in both a global and local
sense. Local anomalies correspond to periodic variables that
lie in the frontier of a given class. Global anomalies on the
other hand differ from all the clusters. Approximately 10,000
periodic light curves from the OGLE survey were tested with
PCAD. The pre-processing of the light curves, the selection of
features, and the computation of the cross-correlations follow
the work of [42]. The cross-correlation is used as a distance
metric for the pk -means. The results obtained by the method
were then evaluated by experts and sorted as noisy light
curves, misclassified light curves and interesting outliers worthy of follow-up.
A problem with purely unsupervised methods is that prior
knowledge, when available, is not necessarily used. Semisupervised learning schemes deal with the case where labels
(supervised information) exist although not for all the available
data. Semi-supervised methods are able to find the structure of
the data distribution, learn representations and then combine
this information with what is known. Semi-supervised methods can also be used for novelty detection, with the benefit
that they may improve their discrimination by automatically
incorporating the newly extracted knowledge. The semisupervised approach is particularly interesting in the astronomical case where prior information exists, although scarce in
comparison to the bulk of available unlabeled data. In [45] a
semi-supervised scheme for classification of supernova subtypes was proposed. In this work the unlabeled supernovae
data are used to obtain optimal low-dimensional representations in an unsupervised way. A diagram of the proposed
implementation is shown in Fig. 5a. In general, features are
extracted from supernovae light curves following fixed templates. The data-driven feature extraction proposed in [45]

Astronomy has a long history of serendipitous
discovery [...] Computational intelligence and machine
learning may provide the means for facilitating the
task of novelty detection.
events does not necessarily correspond to that produced by
automated systems. Interestingly, this study establishes that there
is another problem as well: the same computational intelligence
algorithms working on different databases produced distinct
classification structures, showing that even though these databases have large numbers of examples, they have inherent biases
and may not be sufficiently large to allow the discovery of general rules. This problem has also been reported in other fields,
specifically artificial vision [39]. The work in [39] showed that
in order to produce consistent classification performances, one
could not simply use databases with hundreds of thousands of
examples, it was necessary to use close to 80 million images, far
exceeding what was traditionally considered enough by the
practitioners of the field.
Kernel Principal Component Analysis (KPCA) was used in
[40] to perform spectral clustering on light curves from the
CoRoT survey. The light curves were characterized using
three different approaches: Fourier series, autocorrelation functions, and Hidden Markov Models (HMMs). Then, dimensionality was reduced with KPCA using the Gaussian kernel.
Finally, the eigenvalues were used to find clusters of variable
stars. This novel characterization of light curves permits identifying not only periodic variable stars correctly (Fourier and
autocorrelation features), but also irregular variable stars
(HMM features).
Unsupervised learning can also be used for novelty detection, i.e., finding objects that are statistically different from
everything that is known and hence cannot be classified in one
of the existing categories. Astronomy has a long history regarding serendipitous discovery [41], i.e., to find the unexpected
(and unsought). Computational intelligence and machine
learning may provide the means for facilitating the task of novelty detection.
One may argue that the first step for novelty detection is to
define a similarity metric for astronomical time series in order
to compare time-varying astronomical objects. This is the
approach found in [42] where a methodology for outlier light
curve identification in astronomical catalogs was presented. A
similarity metric based on the correlation coefficient is computed between every pair of light curves in order to obtain a
similarity matrix. Intuitively, the outlier variable star will be dissimilar to all the other variables. Before any distance calculation, light curves are interpolated and smoothed in order to
normalize the number of points and time instants. For each
pair the lag of maximum cross-correlation is found in Fourier
space, which solves the problem of comparison between light
curves with arbitrary phases. Finally the outliers correspond to
the light curves with the lowest cross correlations with respect

34

IEEE ComputatIonal IntEllIgEnCE magazInE | august 2014



Table of Contents for the Digital Edition of Computational Intelligence - August 2014

Computational Intelligence - August 2014 - Cover1
Computational Intelligence - August 2014 - Cover2
Computational Intelligence - August 2014 - 1
Computational Intelligence - August 2014 - 2
Computational Intelligence - August 2014 - 3
Computational Intelligence - August 2014 - 4
Computational Intelligence - August 2014 - 5
Computational Intelligence - August 2014 - 6
Computational Intelligence - August 2014 - 7
Computational Intelligence - August 2014 - 8
Computational Intelligence - August 2014 - 9
Computational Intelligence - August 2014 - 10
Computational Intelligence - August 2014 - 11
Computational Intelligence - August 2014 - 12
Computational Intelligence - August 2014 - 13
Computational Intelligence - August 2014 - 14
Computational Intelligence - August 2014 - 15
Computational Intelligence - August 2014 - 16
Computational Intelligence - August 2014 - 17
Computational Intelligence - August 2014 - 18
Computational Intelligence - August 2014 - 19
Computational Intelligence - August 2014 - 20
Computational Intelligence - August 2014 - 21
Computational Intelligence - August 2014 - 22
Computational Intelligence - August 2014 - 23
Computational Intelligence - August 2014 - 24
Computational Intelligence - August 2014 - 25
Computational Intelligence - August 2014 - 26
Computational Intelligence - August 2014 - 27
Computational Intelligence - August 2014 - 28
Computational Intelligence - August 2014 - 29
Computational Intelligence - August 2014 - 30
Computational Intelligence - August 2014 - 31
Computational Intelligence - August 2014 - 32
Computational Intelligence - August 2014 - 33
Computational Intelligence - August 2014 - 34
Computational Intelligence - August 2014 - 35
Computational Intelligence - August 2014 - 36
Computational Intelligence - August 2014 - 37
Computational Intelligence - August 2014 - 38
Computational Intelligence - August 2014 - 39
Computational Intelligence - August 2014 - 40
Computational Intelligence - August 2014 - 41
Computational Intelligence - August 2014 - 42
Computational Intelligence - August 2014 - 43
Computational Intelligence - August 2014 - 44
Computational Intelligence - August 2014 - 45
Computational Intelligence - August 2014 - 46
Computational Intelligence - August 2014 - 47
Computational Intelligence - August 2014 - 48
Computational Intelligence - August 2014 - 49
Computational Intelligence - August 2014 - 50
Computational Intelligence - August 2014 - 51
Computational Intelligence - August 2014 - 52
Computational Intelligence - August 2014 - 53
Computational Intelligence - August 2014 - 54
Computational Intelligence - August 2014 - 55
Computational Intelligence - August 2014 - 56
Computational Intelligence - August 2014 - 57
Computational Intelligence - August 2014 - 58
Computational Intelligence - August 2014 - 59
Computational Intelligence - August 2014 - 60
Computational Intelligence - August 2014 - 61
Computational Intelligence - August 2014 - 62
Computational Intelligence - August 2014 - 63
Computational Intelligence - August 2014 - 64
Computational Intelligence - August 2014 - 65
Computational Intelligence - August 2014 - 66
Computational Intelligence - August 2014 - 67
Computational Intelligence - August 2014 - 68
Computational Intelligence - August 2014 - 69
Computational Intelligence - August 2014 - 70
Computational Intelligence - August 2014 - 71
Computational Intelligence - August 2014 - 72
Computational Intelligence - August 2014 - 73
Computational Intelligence - August 2014 - 74
Computational Intelligence - August 2014 - 75
Computational Intelligence - August 2014 - 76
Computational Intelligence - August 2014 - 77
Computational Intelligence - August 2014 - 78
Computational Intelligence - August 2014 - 79
Computational Intelligence - August 2014 - 80
Computational Intelligence - August 2014 - 81
Computational Intelligence - August 2014 - 82
Computational Intelligence - August 2014 - 83
Computational Intelligence - August 2014 - 84
Computational Intelligence - August 2014 - 85
Computational Intelligence - August 2014 - 86
Computational Intelligence - August 2014 - 87
Computational Intelligence - August 2014 - 88
Computational Intelligence - August 2014 - Cover3
Computational Intelligence - August 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com