24,014 research outputs found

    A multi-method approach to delineate and validate migratory corridors

    Get PDF
    Context: Managers are faced with numerous methods for delineating wildlife movement corridors, and often must make decisions with limited data. Delineated corridors should be robust to different data and models. Objectives: We present a multi-method approach for delineating and validating wildlife corridors using multiple data sources, which can be used conserve landscape connectivity. We used this approach to delineate and validate migration corridors for wildebeest (Connochaetes taurinus) in the Tarangire Ecosystem of northern Tanzania. Methods: We used two types of locational data (distance sampling detections and GPS collar locations), and three modeling methods (negative binomial regression, logistic regression, and Maxent), to generate resource selection functions (RSFs) and define resistance surfaces. We compared two corridor detection algorithms (cost-distance and circuit theory), to delineate corridors. We validated corridors by comparing random and wildebeest locations that fell within corridors, and cross-validated by data type. Results: Both data types produced similar RSFs. Wildebeest consistently selected migration habitat in flatter terrain farther from human settlements. Validation indicated three of the combinations of data type, modeling, and corridor detection algorithms (detection data with Maxent modeling, GPS collar data with logistic regression modeling, and GPS collar data with Maxent modeling, all using cost-distance) far outperformed the other seven. We merged the predictive corridors from these three data-method combinations to reveal habitat with highest probability of use. Conclusions: The use of multiple methods ensures that planning is able to prioritize conservation of migration corridors based on all available information

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering

    Get PDF
    Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. Our method is able to detect many different types of intrusions, while maintaining a low false positive rate as verified over the Knowledge Discovery and Data Mining - KDD CUP 1999 dataset

    The model of an anomaly detector for HiLumi LHC magnets based on Recurrent Neural Networks and adaptive quantization

    Full text link
    This paper focuses on an examination of an applicability of Recurrent Neural Network models for detecting anomalous behavior of the CERN superconducting magnets. In order to conduct the experiments, the authors designed and implemented an adaptive signal quantization algorithm and a custom GRU-based detector and developed a method for the detector parameters selection. Three different datasets were used for testing the detector. Two artificially generated datasets were used to assess the raw performance of the system whereas the 231 MB dataset composed of the signals acquired from HiLumi magnets was intended for real-life experiments and model training. Several different setups of the developed anomaly detection system were evaluated and compared with state-of-the-art OC-SVM reference model operating on the same data. The OC-SVM model was equipped with a rich set of feature extractors accounting for a range of the input signal properties. It was determined in the course of the experiments that the detector, along with its supporting design methodology, reaches F1 equal or very close to 1 for almost all test sets. Due to the profile of the data, the best_length setup of the detector turned out to perform the best among all five tested configuration schemes of the detection system. The quantization parameters have the biggest impact on the overall performance of the detector with the best values of input/output grid equal to 16 and 8, respectively. The proposed solution of the detection significantly outperformed OC-SVM-based detector in most of the cases, with much more stable performance across all the datasets.Comment: Related to arXiv:1702.0083
    corecore