A study on data correlation for interferometric observations like vlbi and delta-dor applications and the correlation analysis of XF correlator

Author(s):  
Arathi S. Nair ◽  
Salim Paul

2021 ◽  
Author(s):  
Zhongdi Ge ◽  
Longjun Zhao ◽  
Zhen Wang ◽  
Dandan Cui ◽  
Yang Yang ◽  
...  




2019 ◽  
Vol 95 ◽  
pp. 306-319 ◽  
Author(s):  
Jing Yang ◽  
Guo Xie ◽  
Yanxi Yang ◽  
Youmin Zhang ◽  
Wei Liu


2013 ◽  
Vol 21 (1) ◽  
pp. 28-34
Author(s):  
A. Brandowski ◽  
Hoang Nguyen ◽  
Wojciech Frąckowiak

ABSTRACT The neural network tuning procedure applied to reliability analyses of anthrop technical systems, based on judgements of experts - experienced operating practicians. Numerical and linguistic elicitation of the judgements, analyses of the network input and output data correlation and of the AHP method processing deviation are presented. Example of data elicitation and correlation analysis of a reliability arrangement of the seagoing ship propulsion system are included to the article.



2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Hao Hu ◽  
Yuling Liu ◽  
Hongqi Zhang ◽  
Yuchen Zhang

Network security metrics allow quantitatively evaluating the overall resilience of networked systems against attacks. From this aim, security metrics are of great importance to the security-related decision-making process of enterprises. In this paper, we employ absorbing Markov chain (AMC) to estimate the network security combining with the technique of big data correlation analysis. Specifically, we construct the model of AMC using a large amount of alert data to describe the scenario of multistep attacks in the real world. In addition, we implement big data correlation analysis to generate the transition probability matrix from alert stream, which defines the probabilities of transferring from one attack action to another according to a given scenario before reaching one of some attack targets. Based on the probability reasoning, two metric algorithms are designed to estimate the attack scenario as well as the attackers, namely, the expected number of visits (ENV) and the expected success probability (ESP). The superiority is that the proposed model and algorithms assist the administrator in building new scenarios, prioritizing alerts, and ranking them.



2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Sreemoyee Biswas ◽  
Nilay Khare ◽  
Pragati Agrawal ◽  
Priyank Jain

AbstractWith data becoming a salient asset worldwide, dependence amongst data kept on growing. Hence the real-world datasets that one works upon in today’s time are highly correlated. Since the past few years, researchers have given attention to this aspect of data privacy and found a correlation among data. The existing data privacy guarantees cannot assure the expected data privacy algorithms. The privacy guarantees provided by existing algorithms were enough when there existed no relation between data in the datasets. Hence, by keeping the existence of data correlation into account, there is a dire need to reconsider the privacy algorithms. Some of the research has considered utilizing a well-known machine learning concept, i.e., Data Correlation Analysis, to understand the relationship between data in a better way. This concept has given some promising results as well. Though it is still concise, the researchers did a considerable amount of research on correlated data privacy. Researchers have provided solutions using probabilistic models, behavioral analysis, sensitivity analysis, information theory models, statistical correlation analysis, exhaustive combination analysis, temporal privacy leakages, and weighted hierarchical graphs. Nevertheless, researchers are doing work upon the real-world datasets that are often large (technologically termed big data) and house a high amount of data correlation. Firstly, the data correlation in big data must be studied. Researchers are exploring different analysis techniques to find the best suitable. Then, they might suggest a measure to guarantee privacy for correlated big data. This survey paper presents a detailed survey of the methods proposed by different researchers to deal with the problem of correlated data privacy and correlated big data privacy and highlights the future scope in this area. The quantitative analysis of the reviewed articles suggests that data correlation is a significant threat to data privacy. This threat further gets magnified with big data. While considering and analyzing data correlation, then parameters such as Maximum queries executed, Mean average error values show better results when compared with other methods. Hence, there is a grave need to understand and propose solutions for correlated big data privacy.



2021 ◽  
Author(s):  
Wenkai Li ◽  
Teng Fang ◽  
Chunlin Guo ◽  
Jie Xie ◽  
Huiyuan Ma ◽  
...  


Sign in / Sign up

Export Citation Format

Share Document