correlation methods
Recently Published Documents


TOTAL DOCUMENTS

474
(FIVE YEARS 52)

H-INDEX

50
(FIVE YEARS 3)

Author(s):  
Elisabeth Keller ◽  
Theodoros Tsatsoulis ◽  
Karsten Reuter ◽  
Johannes Theo Margraf

2021 ◽  
Vol 4 (3) ◽  
pp. 157-185
Author(s):  
Etaga H.O. ◽  
Okoro I. ◽  
Aforka K.F. ◽  
Ngonadi L.O.

Correlation methods are indispensable in the study of the linear relationship between two variables. However, many researchers often adopt inappropriate correlation methods in the study of linear relationships which usually leads to unreliable results. Recurrently, most researchers ignorantly employ the Pearson method in a dataset that contained outliers, instead of more appropriate correlation methods such as Spearman, Kendall Tau, Median and Quadrant which might be suitable in the calculation of correlation coefficient in the presence of influential outliers. It is noted that the accuracy of estimation of correlation coefficients under outliers has been a long-standing problem for methodological researchers. This is due to low knowledge of correlation methods and their assumptions which have led to inappropriate application of correlation methods in research analysis. Five different methods of estimating correlation coefficients in the presence of influential outlier (contaminated data) were considered: Pearson Correlation Coefficient, Spearman Correlation Coefficient, Kendall Tau Correlation Coefficient, Median Correlation Coefficient and Quadrant Correlation Coefficient.


2021 ◽  
Author(s):  
Stefano Palmero ◽  
Carlo Guidi ◽  
Vladimir Kulikovskiy ◽  
Matteo Sanguineti ◽  
Michele Manghi ◽  
...  

Abstract Orca (Orcinus orca) is known for complex vocalisation. Their social structure consists of pods and clans sharing unique dialects due to geographic isolation. Sound type repertoires are fundamental for monitoring orca populations and are typically created visually and aurally. An orca pod occurring in the Ligurian Sea (Pelagos Sanctuary) in December 2019 provided a unique occasion for long-term recordings. The numerous data collected with the bottom recorder were analysed with a traditional human-driven inspection to create a repertoire of this pod and to compare it to catalogues from different orca populations (Icelandic and Antarctic) investigating its origins. Automatic signal detection and cross-correlation methods (R package warbleR) were used for the first time in orca studies. We found the Pearson cross-correlation method to be efficient for most pairwise calculations (> 85%) but with false positives. One sound type from our repertoire presented a high positive match (range 0.62–0.67) with one from the Icelandic catalogue, which was confirmed visually and aurally. Our first attempt to automatically classify orca sound types presented limitations due to background noise and sound complexity of orca communication. We show cross-correlation methods can be a powerful tool for sound type classification in combination with conventional methods.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2160
Author(s):  
Michael Heigl ◽  
Enrico Weigelt ◽  
Andreas Urmann ◽  
Dalibor Fiala ◽  
Martin Schramm

Future-oriented networking infrastructures are characterized by highly dynamic Streaming Data (SD) whose volume, speed and number of dimensions increased significantly over the past couple of years, energized by trends such as Software-Defined Networking or Artificial Intelligence. As an essential core component of network security, Intrusion Detection Systems (IDS) help to uncover malicious activity. In particular, consecutively applied alert correlation methods can aid in mining attack patterns based on the alerts generated by IDS. However, most of the existing methods lack the functionality to deal with SD data affected by the phenomenon called concept drift and are mainly designed to operate on the output from signature-based IDS. Although unsupervised Outlier Detection (OD) methods have the ability to detect yet unknown attacks, most of the alert correlation methods cannot handle the outcome of such anomaly-based IDS. In this paper, we introduce a novel framework called Streaming Outlier Analysis and Attack Pattern Recognition, denoted as SOAAPR, which is able to process the output of various online unsupervised OD methods in a streaming fashion to extract information about novel attack patterns. Three different privacy-preserving, fingerprint-like signatures are computed from the clustered set of correlated alerts by SOAAPR, which characterizes and represents the potential attack scenarios with respect to their communication relations, their manifestation in the data's features and their temporal behavior. Beyond the recognition of known attacks, comparing derived signatures, they can be leveraged to find similarities between yet unknown and novel attack patterns. The evaluation, which is split into two parts, takes advantage of attack scenarios from the widely-used and popular CICIDS2017 and CSE‐CIC‐IDS2018 datasets. Firstly, the streaming alert correlation capability is evaluated on CICIDS2017 and compared to a state-of-the-art offline algorithm, called Graph-based Alert Correlation (GAC), which has the potential to deal with the outcome of anomaly-based IDS. Secondly, the three types of signatures are computed from attack scenarios in the datasets and compared to each other. The discussion of results, on the one hand, shows that SOAAPR can compete with GAC in terms of alert correlation capability leveraging four different metrics and outperforms it significantly in terms of processing time by an average factor of 70 in 11 attack scenarios. On the other hand, in most cases, all three types of signatures seem to reliably characterize attack scenarios such that similar ones are grouped together, with up to 99.05\% similarity between the FTP and SSH Patator attack.intrusion detection; alert analysis; alert correlation; outlier detection; attack scenario; streaming data; network security


2021 ◽  
Vol 232 (9) ◽  
Author(s):  
Marlon Heitor Kunst Valentini ◽  
Gabriel Borges dos Santos ◽  
Victória Huch Duarte ◽  
Henrique Sanchez Franz ◽  
Hugo Alexandre Soares Guedes ◽  
...  

2021 ◽  
pp. 1-15
Author(s):  
Christoph Brandstetter ◽  
Xavier Ottavy ◽  
Benoit Paoletti ◽  
Sina C Stapelfeldt

Abstract A specific phenomenon that has been observed in many experimental studies on turbomachinery compressors and fans is discussed under the term ‘rotating instabilities’. It is associated to a local aerodynamic phenomenon, typically occurring in the tip region at highly loaded near stall conditions and often linked to blade vibrations. Even though the effect has been discussed over more than two decades, a very ambiguous interpretation still prevails. A particular problem is that certain signatures in measurement data are often considered to characterize the phenomenon despite possible misinterpretations. The present paper illustrates that a specific image of a pulsating disturbance that has been established in the 1990s needs to be reconsidered. At the example of a recent investigation on a composite fan the difficulties concerning sensor placement and post-processing techniques is discussed with a focus on spectral averaging, isolation of non-synchronous phenomena and multi-sensor cross-correlation methods.


Sign in / Sign up

Export Citation Format

Share Document