SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Persistent Homology
the basics
Image:Jean-Marie Hullot (CC BY 3.0)
kelly davis (founder forty.to)
problem:what’s the topology of a point cloud?
Image:Jean-Marie Hullot (CC BY 3.0)
solution: persistent homology
Image:Jean-Marie Hullot (CC BY 2.0)
simplicial complex
Image:Antoine Hubert (CC BY 2.0)
simplicial homology
Image:Jean-Marie Hullot (CC BY 2.0)
simplicial homology
i
K L
Image:Jean-Marie Hullot (CC BY 2.0)
simplicial filtrations
iK Ki
Image:Jean-Marie Hullot (CC BY 3.0)
birth, death, and taxes
it is born at Ki if γ ∈ Hp . Furthermore, if γ is born at Ki then it dies
entering Kj if it merges with an older class as we go from Kj−1 to Kj, that is,
fi,j−1
p (γ) ∈ Hi−1,j−1
p but fi,j
p (γ) ∈ Hi−1,j
p ; see Figure VII.2. This is again the
0 0 0 0
H p
i−1
H
i
H p
j −1
H pp
j
γ
Figure VII.2: The class γ is born at Ki since it does not lie in the (shaded) image
of Hi−1
p . Furthermore, γ dies entering Kj since this is the first time its image merges
into the image of Hi−1
p .
Elder Rule. If γ is born at Ki and dies entering Kj then we call the difference
in function value the persistence, pers(γ) = aj − ai. Sometimes we prefer to
ignore the actual function values and consider the difference in index, j − i,
which we call the index persistence of the class. If γ is born at Ki but neverImage:Jean-Marie Hullot (CC BY 3.0)
persistence
it is born at Ki if γ ∈ Hp . Furthermore, if γ is born at Ki then it dies
entering Kj if it merges with an older class as we go from Kj−1 to Kj, that is,
fi,j−1
p (γ) ∈ Hi−1,j−1
p but fi,j
p (γ) ∈ Hi−1,j
p ; see Figure VII.2. This is again the
0 0 0 0
H p
i−1
H
i
H p
j −1
H pp
j
γ
Figure VII.2: The class γ is born at Ki since it does not lie in the (shaded) image
of Hi−1
p . Furthermore, γ dies entering Kj since this is the first time its image merges
into the image of Hi−1
p .
Elder Rule. If γ is born at Ki and dies entering Kj then we call the difference
in function value the persistence, pers(γ) = aj − ai. Sometimes we prefer to
ignore the actual function values and consider the difference in index, j − i,
which we call the index persistence of the class. If γ is born at Ki but neverImage:Jean-Marie Hullot (CC BY 3.0)
so what!
2.3. Barcodes. The parameter intervals arising from the basis for H∗(C; F) in
Equation (2.3) inspire a visual snapshot of Hk(C; F) in the form of a barcode. A
barcode is a graphical representation of Hk(C; F) as a collection of horizontal line
segments in a plane whose horizontal axis corresponds to the parameter and whose
vertical axis represents an (arbitrary) ordering of homology generators. Figure 4
gives an example of barcode representations of the homology of the sampling of
points in an annulus from Figure 3 (illustrated in the case of a large number of
parameter values i).
H0
H1
H2
Figure 4. [bottom] An example of the barcodes for H∗(R) in the
example of Figure 3. [top] The rank of Hk(R i
) equals the number
of intervals in the barcode for Hk(R) intersecting the (dashed) line
= i.
Theorem 2.3 yields the fundamental characterization of barcodes.
Theorem 2.4 ([22]). The rank of the persistent homology group Hi→j
k (C; F) is
equal to the number of intervals in the barcode of Hk(C; F) spanning the parameter
i Image:Padmanaba01 (CC BY 2.0)
calm before the algorithm
Image:Pierre-Emmanuel BOITON (CC BY 2.0)
the algorithm: betti numbers
Image:Pierre-Emmanuel BOITON (CC BY 2.0)
the algorithm: persistence
Image:Pierre-Emmanuel BOITON (CC BY 2.0)
implementations:
phat - c++ with c++ api
dionysus - c++ with python api
plex - java with java api
Image:Jean-Marie Hullot (CC BY 3.0)
Persistent Homology
the basics
kelly davis (founder forty.to)

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamental Theorem of Calculus
Fundamental Theorem of CalculusFundamental Theorem of Calculus
Fundamental Theorem of Calculusgizemk
 
20110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-0420110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-04Computer Science Club
 
Cs6503 theory of computation november december 2016
Cs6503 theory of computation november december 2016Cs6503 theory of computation november december 2016
Cs6503 theory of computation november december 2016appasami
 
CoClus ICDM Workshop talk
CoClus ICDM Workshop talkCoClus ICDM Workshop talk
CoClus ICDM Workshop talkDmitrii Ignatov
 
Meta-learning and the ELBO
Meta-learning and the ELBOMeta-learning and the ELBO
Meta-learning and the ELBOYoonho Lee
 
On the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphOn the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphijngnjournal
 
Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...
Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...
Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...Dmitrii Ignatov
 
Cs6503 theory of computation may june 2016 be cse anna university question paper
Cs6503 theory of computation may june 2016 be cse anna university question paperCs6503 theory of computation may june 2016 be cse anna university question paper
Cs6503 theory of computation may june 2016 be cse anna university question paperappasami
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
The Yoneda lemma and String diagrams
The Yoneda lemma and String diagramsThe Yoneda lemma and String diagrams
The Yoneda lemma and String diagramsRay Sameshima
 
On complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptographyOn complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptographywtyru1989
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
OmniChannelNewsvendor
OmniChannelNewsvendorOmniChannelNewsvendor
OmniChannelNewsvendorAshwin Rao
 
Path Contraction Faster than 2^n
Path Contraction Faster than 2^nPath Contraction Faster than 2^n
Path Contraction Faster than 2^nAkankshaAgrawal55
 

Was ist angesagt? (20)

Fundamental Theorem of Calculus
Fundamental Theorem of CalculusFundamental Theorem of Calculus
Fundamental Theorem of Calculus
 
20110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-0420110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-04
 
Cs6503 theory of computation november december 2016
Cs6503 theory of computation november december 2016Cs6503 theory of computation november december 2016
Cs6503 theory of computation november december 2016
 
CoClus ICDM Workshop talk
CoClus ICDM Workshop talkCoClus ICDM Workshop talk
CoClus ICDM Workshop talk
 
Day 8b examples
Day 8b examplesDay 8b examples
Day 8b examples
 
Meta-learning and the ELBO
Meta-learning and the ELBOMeta-learning and the ELBO
Meta-learning and the ELBO
 
On the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphOn the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graph
 
Art07
Art07Art07
Art07
 
Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...
Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...
Turning Krimp into a Triclustering Technique on Sets of Attribute-Condition P...
 
Cs6503 theory of computation may june 2016 be cse anna university question paper
Cs6503 theory of computation may june 2016 be cse anna university question paperCs6503 theory of computation may june 2016 be cse anna university question paper
Cs6503 theory of computation may june 2016 be cse anna university question paper
 
Characterizing and mining numerical patterns, an FCA point of view
Characterizing and mining numerical patterns, an FCA point of viewCharacterizing and mining numerical patterns, an FCA point of view
Characterizing and mining numerical patterns, an FCA point of view
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
125 7.3 and 7.5
125 7.3 and 7.5125 7.3 and 7.5
125 7.3 and 7.5
 
確率伝播その2
確率伝播その2確率伝播その2
確率伝播その2
 
The Yoneda lemma and String diagrams
The Yoneda lemma and String diagramsThe Yoneda lemma and String diagrams
The Yoneda lemma and String diagrams
 
On complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptographyOn complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptography
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
OmniChannelNewsvendor
OmniChannelNewsvendorOmniChannelNewsvendor
OmniChannelNewsvendor
 
Topics in Category Theory
Topics in Category TheoryTopics in Category Theory
Topics in Category Theory
 
Path Contraction Faster than 2^n
Path Contraction Faster than 2^nPath Contraction Faster than 2^n
Path Contraction Faster than 2^n
 

Andere mochten auch

Introduction to Topological Data Analysis
Introduction to Topological Data AnalysisIntroduction to Topological Data Analysis
Introduction to Topological Data AnalysisHendri Karisma
 
Geometric and Topological Data Analysis
Geometric and Topological Data AnalysisGeometric and Topological Data Analysis
Geometric and Topological Data AnalysisDon Sheehy
 
011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_mapHa Phuong
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Ha Phuong
 
Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Ha Phuong
 
013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_CompressibilityHa Phuong
 
Topological Data Analysis: visual presentation of multidimensional data sets
Topological Data Analysis: visual presentation of multidimensional data setsTopological Data Analysis: visual presentation of multidimensional data sets
Topological Data Analysis: visual presentation of multidimensional data setsDataRefiner
 
Topological data analysis
Topological data analysisTopological data analysis
Topological data analysisSunghyon Kyeong
 
Using Topological Data Analysis on your BigData
Using Topological Data Analysis on your BigDataUsing Topological Data Analysis on your BigData
Using Topological Data Analysis on your BigDataAnalyticsWeek
 
Turning a new leaf with persistent homology: old and new ways of analyzing le...
Turning a new leaf with persistent homology: old and new ways of analyzing le...Turning a new leaf with persistent homology: old and new ways of analyzing le...
Turning a new leaf with persistent homology: old and new ways of analyzing le...DanChitwood
 

Andere mochten auch (12)

Introduction to Topological Data Analysis
Introduction to Topological Data AnalysisIntroduction to Topological Data Analysis
Introduction to Topological Data Analysis
 
Geometric and Topological Data Analysis
Geometric and Topological Data AnalysisGeometric and Topological Data Analysis
Geometric and Topological Data Analysis
 
011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map
 
Sharing-akka-pub
Sharing-akka-pubSharing-akka-pub
Sharing-akka-pub
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)
 
Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)
 
013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility
 
Topological Data Analysis: visual presentation of multidimensional data sets
Topological Data Analysis: visual presentation of multidimensional data setsTopological Data Analysis: visual presentation of multidimensional data sets
Topological Data Analysis: visual presentation of multidimensional data sets
 
Topological data analysis
Topological data analysisTopological data analysis
Topological data analysis
 
Topological data analysis
Topological data analysisTopological data analysis
Topological data analysis
 
Using Topological Data Analysis on your BigData
Using Topological Data Analysis on your BigDataUsing Topological Data Analysis on your BigData
Using Topological Data Analysis on your BigData
 
Turning a new leaf with persistent homology: old and new ways of analyzing le...
Turning a new leaf with persistent homology: old and new ways of analyzing le...Turning a new leaf with persistent homology: old and new ways of analyzing le...
Turning a new leaf with persistent homology: old and new ways of analyzing le...
 

Persistent homology

  • 1. Persistent Homology the basics Image:Jean-Marie Hullot (CC BY 3.0) kelly davis (founder forty.to)
  • 2. problem:what’s the topology of a point cloud? Image:Jean-Marie Hullot (CC BY 3.0)
  • 8. birth, death, and taxes it is born at Ki if γ ∈ Hp . Furthermore, if γ is born at Ki then it dies entering Kj if it merges with an older class as we go from Kj−1 to Kj, that is, fi,j−1 p (γ) ∈ Hi−1,j−1 p but fi,j p (γ) ∈ Hi−1,j p ; see Figure VII.2. This is again the 0 0 0 0 H p i−1 H i H p j −1 H pp j γ Figure VII.2: The class γ is born at Ki since it does not lie in the (shaded) image of Hi−1 p . Furthermore, γ dies entering Kj since this is the first time its image merges into the image of Hi−1 p . Elder Rule. If γ is born at Ki and dies entering Kj then we call the difference in function value the persistence, pers(γ) = aj − ai. Sometimes we prefer to ignore the actual function values and consider the difference in index, j − i, which we call the index persistence of the class. If γ is born at Ki but neverImage:Jean-Marie Hullot (CC BY 3.0)
  • 9. persistence it is born at Ki if γ ∈ Hp . Furthermore, if γ is born at Ki then it dies entering Kj if it merges with an older class as we go from Kj−1 to Kj, that is, fi,j−1 p (γ) ∈ Hi−1,j−1 p but fi,j p (γ) ∈ Hi−1,j p ; see Figure VII.2. This is again the 0 0 0 0 H p i−1 H i H p j −1 H pp j γ Figure VII.2: The class γ is born at Ki since it does not lie in the (shaded) image of Hi−1 p . Furthermore, γ dies entering Kj since this is the first time its image merges into the image of Hi−1 p . Elder Rule. If γ is born at Ki and dies entering Kj then we call the difference in function value the persistence, pers(γ) = aj − ai. Sometimes we prefer to ignore the actual function values and consider the difference in index, j − i, which we call the index persistence of the class. If γ is born at Ki but neverImage:Jean-Marie Hullot (CC BY 3.0)
  • 10. so what! 2.3. Barcodes. The parameter intervals arising from the basis for H∗(C; F) in Equation (2.3) inspire a visual snapshot of Hk(C; F) in the form of a barcode. A barcode is a graphical representation of Hk(C; F) as a collection of horizontal line segments in a plane whose horizontal axis corresponds to the parameter and whose vertical axis represents an (arbitrary) ordering of homology generators. Figure 4 gives an example of barcode representations of the homology of the sampling of points in an annulus from Figure 3 (illustrated in the case of a large number of parameter values i). H0 H1 H2 Figure 4. [bottom] An example of the barcodes for H∗(R) in the example of Figure 3. [top] The rank of Hk(R i ) equals the number of intervals in the barcode for Hk(R) intersecting the (dashed) line = i. Theorem 2.3 yields the fundamental characterization of barcodes. Theorem 2.4 ([22]). The rank of the persistent homology group Hi→j k (C; F) is equal to the number of intervals in the barcode of Hk(C; F) spanning the parameter i Image:Padmanaba01 (CC BY 2.0)
  • 11. calm before the algorithm Image:Pierre-Emmanuel BOITON (CC BY 2.0)
  • 12. the algorithm: betti numbers Image:Pierre-Emmanuel BOITON (CC BY 2.0)
  • 14. implementations: phat - c++ with c++ api dionysus - c++ with python api plex - java with java api Image:Jean-Marie Hullot (CC BY 3.0) Persistent Homology the basics kelly davis (founder forty.to)