24,014 research outputs found
A multi-method approach to delineate and validate migratory corridors
Context:
Managers are faced with numerous methods for delineating wildlife movement corridors, and often must make decisions with limited data. Delineated corridors should be robust to different data and models.
Objectives:
We present a multi-method approach for delineating and validating wildlife corridors using multiple data sources, which can be used conserve landscape connectivity. We used this approach to delineate and validate migration corridors for wildebeest (Connochaetes taurinus) in the Tarangire Ecosystem of northern Tanzania.
Methods:
We used two types of locational data (distance sampling detections and GPS collar locations), and three modeling methods (negative binomial regression, logistic regression, and Maxent), to generate resource selection functions (RSFs) and define resistance surfaces. We compared two corridor detection algorithms (cost-distance and circuit theory), to delineate corridors. We validated corridors by comparing random and wildebeest locations that fell within corridors, and cross-validated by data type.
Results:
Both data types produced similar RSFs. Wildebeest consistently selected migration habitat in flatter terrain farther from human settlements. Validation indicated three of the combinations of data type, modeling, and corridor detection algorithms (detection data with Maxent modeling, GPS collar data with logistic regression modeling, and GPS collar data with Maxent modeling, all using cost-distance) far outperformed the other seven. We merged the predictive corridors from these three data-method combinations to reveal habitat with highest probability of use.
Conclusions:
The use of multiple methods ensures that planning is able to prioritize conservation of migration corridors based on all available information
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. Our method is able to detect many different types of intrusions, while maintaining a low false positive rate as verified over the Knowledge Discovery and Data Mining - KDD CUP 1999 dataset
The model of an anomaly detector for HiLumi LHC magnets based on Recurrent Neural Networks and adaptive quantization
This paper focuses on an examination of an applicability of Recurrent Neural
Network models for detecting anomalous behavior of the CERN superconducting
magnets. In order to conduct the experiments, the authors designed and
implemented an adaptive signal quantization algorithm and a custom GRU-based
detector and developed a method for the detector parameters selection. Three
different datasets were used for testing the detector. Two artificially
generated datasets were used to assess the raw performance of the system
whereas the 231 MB dataset composed of the signals acquired from HiLumi magnets
was intended for real-life experiments and model training. Several different
setups of the developed anomaly detection system were evaluated and compared
with state-of-the-art OC-SVM reference model operating on the same data. The
OC-SVM model was equipped with a rich set of feature extractors accounting for
a range of the input signal properties. It was determined in the course of the
experiments that the detector, along with its supporting design methodology,
reaches F1 equal or very close to 1 for almost all test sets. Due to the
profile of the data, the best_length setup of the detector turned out to
perform the best among all five tested configuration schemes of the detection
system. The quantization parameters have the biggest impact on the overall
performance of the detector with the best values of input/output grid equal to
16 and 8, respectively. The proposed solution of the detection significantly
outperformed OC-SVM-based detector in most of the cases, with much more stable
performance across all the datasets.Comment: Related to arXiv:1702.0083
- …