116 research outputs found
Periodicity Detection Method for Small-Sample Time Series Datasets
Time series of gene expression often exhibit periodic behavior under the influence of multiple signal pathways, and are represented by a model that incorporates multiple harmonics and noise. Most of these data, which are observed using DNA microarrays, consist of few sampling points in time, but most periodicity detection methods require a relatively large number of sampling points. We have previously developed a detection algorithm based on the discrete Fourier transform and Akaike’s information criterion. Here we demonstrate the performance of the algorithm for small-sample time series data through a comparison with conventional and newly proposed periodicity detection methods based on a statistical analysis of the power of harmonics
A Behavior-Based Approach To Securing Email Systems
The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based security system for email services. The Email Mining Toolkit (EMT) presented in this paper is an offline email archive data mining analysis system that is designed to assist computing models of malicious email behavior for deployment in an online MET system. EMT includes a variety of behavior models for email attachments, user accounts and groups of accounts. Each model computed is used to detect anomalous and errant email behaviors. We report on the set of features implemented in the current version of EMT, and describe tests of the system and our plans for extensions to the set of models
Fingerprint for Network Topologies
A network's topology information can be given as an adjacency matrix. The
bitmap of sorted adjacency matrix(BOSAM) is a network visualisation tool which
can emphasise different network structures by just looking at reordered
adjacent matrixes. A BOSAM picture resembles the shape of a flower and is
characterised by a series of 'leaves'. Here we show and mathematically prove
that for most networks, there is a self-similar relation between the envelope
of the BOSAM leaves. This self-similar property allows us to use a single
envelope to predict all other envelopes and therefore reconstruct the outline
of a network's BOSAM picture. We analogise the BOSAM envelope to human's
fingerprint as they share a number of common features, e.g. both are simple,
easy to obtain, and strongly characteristic encoding essential information for
identification.Comment: 12papes, 3 figures, in pres
Near-Surface Interface Detection for Coal Mining Applications Using Bispectral Features and GPR
The use of ground penetrating radar (GPR) for detecting the presence of near-surface interfaces is a scenario of special interest to the underground coal mining industry. The problem is difficult to solve in practice because the radar echo from the near-surface interface is often dominated by unwanted components such as antenna crosstalk and ringing, ground-bounce effects, clutter, and severe attenuation. These nuisance components are also highly sensitive to subtle variations in ground conditions, rendering the application of standard signal pre-processing techniques such as background subtraction largely ineffective in the unsupervised case. As a solution to this detection problem, we develop a novel pattern recognition-based algorithm which utilizes a neural network to classify features derived from the bispectrum of 1D early time radar data. The binary classifier is used to decide between two key cases, namely whether an interface is within, for example, 5 cm of the surface or not. This go/no-go detection capability is highly valuable for underground coal mining operations, such as longwall mining, where the need to leave a remnant coal section is essential for geological stability. The classifier was trained and tested using real GPR data with ground truth measurements. The real data was acquired from a testbed with coal-clay, coal-shale and shale-clay interfaces, which represents a test mine site. We show that, unlike traditional second order correlation based methods such as matched filtering which can fail even in known conditions, the new method reliably allows the detection of interfaces using GPR to be applied in the near-surface region. In this work, we are not addressing the problem of depth estimation, rather confining ourselves to detecting an interface within a particular depth range
Dynamics of tournaments: the soccer case
A random walk-like model is considered to discuss statistical aspects of
tournaments. The model is applied to soccer leagues with emphasis on the
scores. This competitive system was computationally simulated and the results
are compared with empirical data from the English, the German and the Spanish
leagues and showed a good agreement with them. The present approach enabled us
to characterize a diffusion where the scores are not normally distributed,
having a short and asymmetric tail extending towards more positive values. We
argue that this non-Gaussian behavior is related with the difference between
the teams and with the asymmetry of the scores system. In addition, we compared
two tournament systems: the all-play-all and the elimination tournaments.Comment: To appear in EPJ
Can a supernova be located by its neutrinos?
A future core-collapse supernova in our Galaxy will be detected by several
neutrino detectors around the world. The neutrinos escape from the supernova
core over several seconds from the time of collapse, unlike the electromagnetic
radiation, emitted from the envelope, which is delayed by a time of order
hours. In addition, the electromagnetic radiation can be obscured by dust in
the intervening interstellar space. The question therefore arises whether a
supernova can be located by its neutrinos alone. The early warning of a
supernova and its location might allow greatly improved astronomical
observations. The theme of the present work is a careful and realistic
assessment of this question, taking into account the statistical significance
of the various neutrino signals. Not surprisingly, neutrino-electron forward
scattering leads to a good determination of the supernova direction, even in
the presence of the large and nearly isotropic background from other reactions.
Even with the most pessimistic background assumptions, SuperKamiokande (SK) and
the Sudbury Neutrino Observatory (SNO) can restrict the supernova direction to
be within circles of radius and , respectively. Other
reactions with more events but weaker angular dependence are much less useful
for locating the supernova. Finally, there is the oft-discussed possibility of
triangulation, i.e., determination of the supernova direction based on an
arrival time delay between different detectors. Given the expected statistics
we show that, contrary to previous estimates, this technique does not allow a
good determination of the supernova direction.Comment: 11 pages including 2 figures. Revised version corrects typos, adds
some brief comment
Structural transitions in granular packs: statistical mechanics and statistical geometry investigations
We investigate equal spheres packings generated from several experiments and
from a large number of different numerical simulations. The structural
organization of these disordered packings is studied in terms of the network of
common neighbours. This geometrical analysis reveals sharp changes in the
network's clustering occurring at the packing fractions (fraction of volume
occupied by the spheres respect to the total volume, ) corresponding to
the so called Random Loose Packing limit (RLP, ) and Random
Close Packing limit (RCP, ). At these packing fractions we
also observe abrupt changes in the fluctuations of the portion of free volume
around each sphere. We analyze such fluctuations by means of a statistical
mechanics approach and we show that these anomalies are associated to sharp
variations in a generalized thermodynamical variable which is the analogous for
these a-thermal systems to the specific heat in thermal systems.Comment: 7 pages, 6 figure
- …