Sperm Whale Signal Analysis: Comparison using the AutoRegressive model and the Wavelets Transform

article presents the results using a parametric approach and a Wavelet Transform in analysing signals emitting from the sperm whale. The extraction of intrinsic characteristics of these unique signals emitted by marine mammals is still at present a difficult exercise for various reasons: firstly, it concerns non-stationary signals, and secondly, these signals are obstructed by interfering background noise. In this article, we compare the advantages and disadvantages of both methods: AutoRegressive models and Wavelet Transform. These approaches serve as an alternative to the commonly used estimators which are based on the Fourier Transform for which the hypotheses necessary for its application are in certain cases, not sufficiently proven. These modern approaches provide effective results particularly for the periodic tracking of the signal's characteristics and notably when the signal-to-noise ratio negatively effects signal tracking. Our objectives are twofold. Our first goal is to identify the animal through its acoustic signature. This includes recognition of the marine mammal species and ultimately of the individual animal (within the species). The second is much more ambitious and directly involves the intervention of cetologists to study the sounds emitted by marine mammals in an effort to characterize their behaviour. We are working on an approach based on the recordings of marine mammal signals and the findings from this data result from the Wavelet Transform. This article will explore the reasons for using this approach. In addition, thanks to the use of new processors, these algorithms once heavy in calculation time can be integrated in a real-time system.

[1]  Yoshikiyo Kato,et al.  Fault Detection by Mining Association Rules from House-keeping Data , 2001 .

[2]  Dennis Abrazhevich,et al.  Classification and Characteristics of Electronic Payment Systems , 2001, EC-Web.

[3]  Abraham Silberschatz,et al.  What Makes Patterns Interesting in Knowledge Discovery Systems , 1996, IEEE Trans. Knowl. Data Eng..

[4]  Nicolaos B. Karayiannis,et al.  Growing radial basis neural networks: merging supervised and unsupervised learning with network growth techniques , 1997, IEEE Trans. Neural Networks.

[5]  C. Centeno Building Security and Consumer Trust in Internet Payments , 2002 .

[6]  B. R. Pekilis Multi-Dimensional Separation of Concerns and IBM Hyper/J , 2002 .

[7]  D. L. Donoho,et al.  Ideal spacial adaptation via wavelet shrinkage , 1994 .

[8]  Giuseppe Psaila Discovery of Association Rule Meta-Patterns , 1999, DaWaK.

[9]  Rm Cameron-Jones,et al.  Instance Selection by Encoding Length Heuristic with Random Mutation Hill Climbing , 1995 .

[10]  John Mark,et al.  Introduction to radial basis function networks , 1996 .

[11]  Robert P. W. Duin,et al.  Novelty Detection Using Self-Organizing Maps , 1997, ICONIP.

[12]  Michael B. Porter,et al.  Automated model‐based localization of marine mammals near Hawaii , 2001 .

[13]  Han Yi,et al.  Trust and e-commerce: a study of consumer perceptions , 2003, Electron. Commer. Res. Appl..

[14]  Tomás Isakowitz,et al.  RMM: a methodology for structured hypermedia design , 1995, CACM.

[15]  Stephen J. Roberts,et al.  A Probabilistic Resource Allocating Network for Novelty Detection , 1994, Neural Computation.

[16]  Dmitry O. Gorodnichy,et al.  Affordable 3D Face Tracking Using Projective Vision , 2002 .

[17]  Ray Hunt,et al.  PKI and digital certification infrastructure , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..

[18]  I. Hidaka,et al.  Analysis of respiratory sinus arrhythmia with respect to respiratory phase. , 2000, Methods of information in medicine.

[19]  Jens Krinke,et al.  Aspect mining using event traces , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..

[20]  Philip D. Wasserman,et al.  Advanced methods in neural computing , 1993, VNR computer library.

[21]  Robert T. Collins,et al.  Multi-image focus of attention for rapid site model construction , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[22]  J. Mead,et al.  Measurement of the separate volume changes of rib cage and abdomen during breathing. , 1967, Journal of applied physiology.

[23]  B. Krieger,et al.  Calibration of respiratory inductive plethysmograph during natural breathing. , 1989, Journal of applied physiology.

[24]  David B. Lowe,et al.  A Framework for the Simulation of Web Applications , 2004, ICWE.

[25]  Wolfram Burgard,et al.  Monte Carlo Localization: Efficient Position Estimation for Mobile Robots , 1999, AAAI/IAAI.

[26]  P. J. Skevington,et al.  Trusted third parties in electronic commerce , 1997 .

[27]  Mariano Ceccato,et al.  Aspect mining through the formal concept analysis of execution traces , 2004, 11th Working Conference on Reverse Engineering.

[28]  L. Lawrence Ho Distributed Security Management in the Internet , 2004, Journal of Network and Systems Management.

[29]  Paolo Tonella,et al.  Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions , 2001, TACAS.

[30]  Pablo Laguna,et al.  Analysis of heart rate variability in the presence of ectopic beats using the heart timing signal , 2003, IEEE Transactions on Biomedical Engineering.

[31]  L. Miller,et al.  Sperm whale clicks: directionality and source level revisited. , 2000, The Journal of the Acoustical Society of America.

[32]  Flavio Sartoretto,et al.  Automatic detection of epileptiform activity by single-level wavelet analysis , 1999, Clinical Neurophysiology.

[33]  John Goold,et al.  Sound velocity measurements in spermaceti oil under the combined influences of temperature and pressure , 1996 .

[34]  Marimuthu Palaniswami,et al.  Effects of moving the centers in an RBF network , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).

[35]  Yolanda González Cid,et al.  Real-time 3d SLAM with wide-angle vision , 2004 .

[36]  James A. Blumenthal,et al.  Depression, Heart Rate Variability, and Acute Myocardial Infarction , 2001, Circulation.

[37]  Margaret H. Dunham,et al.  Data Mining: Introductory and Advanced Topics , 2002 .

[38]  Balaji Padmanabhan,et al.  Unexpectedness as a Measure of Interestingness in Knowledge Discovery , 1999, Decis. Support Syst..

[39]  Arie van Deursen,et al.  An Initial Experiment in Reverse Engineering Aspects from Existing Applications , 2004 .

[40]  Adrian G. Bors,et al.  Introduction of the Radial Basis Function (RBF) Networks , 2000 .

[41]  Thomas G. Dietterich,et al.  Improving the Performance of Radial Basis Function Networks by Learning Center Locations , 1991, NIPS.

[42]  Andrew J. Davison,et al.  Real-time simultaneous localisation and mapping with a single camera , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[43]  Dino Pedreschi,et al.  ExAMiner: optimized level-wise frequent pattern mining with monotone constraints , 2003, Third IEEE International Conference on Data Mining.

[44]  Tony R. Martinez,et al.  Reduction Techniques for Instance-Based Learning Algorithms , 2000, Machine Learning.

[45]  Dennis L. Wilson,et al.  Asymptotic Properties of Nearest Neighbor Rules Using Edited Data , 1972, IEEE Trans. Syst. Man Cybern..

[46]  George Whitson,et al.  Computer security: theory, process and management , 2003 .

[47]  Giuseppe A. Di Lucca,et al.  Testing Web applications , 2002, International Conference on Software Maintenance, 2002. Proceedings..

[48]  Naveen Kumar,et al.  Novelty Framework for Knowledge Discovery in Databases , 2004, DaWaK.

[49]  Willis J. Tompkins,et al.  A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.

[50]  Abraham Silberschatz,et al.  On Subjective Measures of Interestingness in Knowledge Discovery , 1995, KDD.

[51]  Jian Pei,et al.  Can we push more constraints into frequent pattern mining? , 2000, KDD '00.

[52]  A. Porta,et al.  Relationship between spectral components of cardiovascular variabilities and direct measures of muscle sympathetic nerve activity in humans. , 1997, Circulation.

[53]  Stefanos Gritzalis,et al.  Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture , 2000, Comput. Secur..

[54]  Michael Unser,et al.  A review of wavelets in biomedical applications , 1996, Proc. IEEE.

[55]  Neil J. Gordon,et al.  A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking , 2002, IEEE Trans. Signal Process..

[56]  A. Malliani,et al.  Cardiovascular Neural Regulation Explored in the Frequency Domain , 1991, Circulation.

[57]  Dino Pedreschi,et al.  Adaptive Constraint Pushing in Frequent Pattern Mining , 2003, PKDD.

[58]  Carlos E. D'Attellis,et al.  Detection of epileptic events in electroencephalograms using wavelet analysis , 2007, Annals of Biomedical Engineering.

[59]  A. S. Al-Hegami,et al.  Subjective Measures and their Role in Data Mining Process , 2004 .

[60]  M A Sackner,et al.  Non-invasive measurement of ventilation during exercise using a respiratory inductive plethysmograph. I. , 1980, The American review of respiratory disease.

[61]  Michael Chesher,et al.  Electronic Commerce and Business Communications , 1998, Practitioner Series.

[62]  Arie van Deursen,et al.  Aspect Mining and Refactoring , 2003 .

[63]  Bernardo A. Huberman,et al.  A methodology for managing risk in electronic transactions over the Internet , 2000 .

[64]  N. Asokan,et al.  Designing a Generic Payment Service , 1998, IBM Syst. J..

[65]  Wynne Hsu,et al.  Post-Analysis of Learned Rules , 1996, AAAI/IAAI, Vol. 1.

[66]  Hsiao-Cheng Yu,et al.  Electronic payment systems: an analysis and comparison of types , 2002 .

[67]  Sung Yang Bang,et al.  An Efficient Method to Construct a Radial Basis Function Neural Network Classifier , 1997, Neural Networks.

[68]  Joydeep Ghosh,et al.  Knowledge enhancement and reuse with radial basis function networks , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[69]  D. Royston,et al.  Non-Invasive Respiratory Monitoring , 1987 .

[70]  P. Welch The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .

[71]  David L. Donoho,et al.  De-noising by soft-thresholding , 1995, IEEE Trans. Inf. Theory.

[72]  G. Paolisso,et al.  Glucose ingestion affects cardiac ANS in healthy subjects with different amounts of body fat. , 1997, The American journal of physiology.

[73]  Understanding Public Key Infrastructure ( PKI ) An RSA Data Security White Paper , 2022 .

[74]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[75]  Michael Isard,et al.  CONDENSATION—Conditional Density Propagation for Visual Tracking , 1998, International Journal of Computer Vision.

[76]  W. Mckenna,et al.  Repolarization Aiternans: Techniques, Mechanisms, and Cardiac Vulnerability , 1997, Pacing and clinical electrophysiology : PACE.

[77]  I. Johnstone,et al.  Wavelet Shrinkage: Asymptopia? , 1995 .

[78]  Tomoji Kishi,et al.  On Aspect-Oriented Design-Applying “ Multi-Dimensional Separation of Concerns ” on Designing Quality Attributes - , 1999 .

[79]  A. Orso,et al.  Efficient and precise dynamic impact analysis using execute-after sequences , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[80]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[81]  Paul J. M. Havinga,et al.  Survey of Electronic Payment Methods and Systems , 1996 .

[82]  M. Kubat,et al.  Decision trees can initialize radial-basis function networks , 1998, IEEE Trans. Neural Networks.

[83]  T. Sejnowski,et al.  Practical Security in Public-Key Cryptography , 2002 .

[84]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[85]  Martin P. Robillard,et al.  Separating features in source code: an exploratory study , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[86]  Bruce J. West,et al.  Wavelet analysis of epileptic spikes. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[87]  Yao-Hua Tan A Trust Matrix Model for Electronic Commerce , 2003, iTrust.

[88]  Jim Conallen,et al.  Building Web applications with UML , 1999 .

[89]  Roberto Togneri,et al.  Speech recognition using the probabilistic neural network , 1998, ICSLP.

[90]  L. Beran,et al.  [Formal concept analysis]. , 1996, Casopis lekaru ceskych.

[91]  Thomas W. Reps,et al.  Identifying modules via concept analysis , 1997, 1997 Proceedings International Conference on Software Maintenance.

[92]  R Biscay,et al.  Multiresolution decomposition of non-stationary EEG signals: a preliminary study. , 1995, Computers in biology and medicine.

[93]  J R Thompson,et al.  Qualitative diagnostic calibration technique. , 1999, Journal of applied physiology.

[94]  K. S. Norris,et al.  a Theory for the Function of the Spermaceti Organ of the Sperm Whale (physeter Catodon L) , 1972 .

[95]  Carlo Bellettini,et al.  TestUml: user-metrics driven web applications testing , 2005, SAC '05.

[96]  Gregor Kiczales,et al.  Aspect-oriented programming , 2001, ESEC/FSE-9.

[97]  C. Wientjes,et al.  A comparison of three quantification methods for estimation of respiratory sinus arrhythmia. , 1990, Psychophysiology.

[98]  Mark Soper,et al.  Digital Cash Payment Systems , 1996 .

[99]  Jean Louchet,et al.  Mobile Robot Sensor Fusion Using Flies , 2003, EvoWorkshops.

[100]  Michael Friedman,et al.  Software Assessment: Reliability, Safety, Testability , 1995 .

[101]  R. Stockton Gaines,et al.  Some security principles and their application to computer security , 1978, OPSR.

[102]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[103]  S. Mukhopadhyay,et al.  A new interpretation of nonlinear energy operator and its efficacy in spike detection , 1998, IEEE Transactions on Biomedical Engineering.

[104]  M A Sackner,et al.  Measurement of breath amplitudes: Comparison of three noninvasive respiratory monitors to integrated pneumotachograph , 1993, Pediatric pulmonology.

[105]  Tadayoshi Kohno,et al.  Trust (and mistrust) in secure applications , 2001, CACM.

[106]  I. Daubechies Orthonormal bases of compactly supported wavelets , 1988 .

[107]  Man Wai Mak,et al.  Genetic evolution of radial basis function centers for pattern classification , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).

[108]  Carlo Bellettini,et al.  WebUml: reverse engineering of web applications , 2004, SAC '04.

[109]  Stefanos Gritzalis,et al.  A digital seal solution for deploying trust on commercial transactions , 2001, Inf. Manag. Comput. Secur..

[110]  H. Huikuri,et al.  Ectopic Beats in Heart Rate Variability Analysis: Effects of Editing on Time and Frequency Domain Measures , 2001, Annals of noninvasive electrocardiology : the official journal of the International Society for Holter and Noninvasive Electrocardiology, Inc.

[111]  A. M. Reina,et al.  Aspect-Oriented Web Development vs . Non Aspect-Oriented Web Development , 2003 .

[112]  Giuseppe A. Di Lucca,et al.  WARE: a tool for the reverse engineering of Web applications , 2002, Proceedings of the Sixth European Conference on Software Maintenance and Reengineering.

[113]  Stanley M. Sutton,et al.  N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[114]  Stefano Ceri,et al.  Web Modeling Language (WebML): a modeling language for designing Web sites , 2000, Comput. Networks.

[115]  I. Tomek An Experiment with the Edited Nearest-Neighbor Rule , 1976 .

[116]  Ed Dawson,et al.  Modelling Trust Structures for Public Key Infrastructures , 2002, ACISP.

[117]  Dan Klein,et al.  Evaluating strategies for similarity search on the web , 2002, WWW '02.

[118]  Michael Bilitch,et al.  North American Society of Pacing and Electrophysiology (NASPE) , 1979, Pacing and clinical electrophysiology : PACE.

[119]  Eric R. Verheul,et al.  Binding cryptography - A fraud-detectible alternative to Key-Escrow proposals , 1997, Comput. Law Secur. Rev..

[120]  Dino Pedreschi,et al.  ExAnte: Anticipated Data Reduction in Constrained Pattern Mining , 2003, PKDD.

[121]  A. Porta,et al.  Power spectrum analysis of heart rate variability to assess the changes in sympathovagal balance during graded orthostatic tilt. , 1994, Circulation.

[122]  Rüdiger W. Brause,et al.  Medical Analysis and Diagnosis by Neural Networks , 2001, ISMDA.

[123]  Antonio F. Gómez-Skarmeta,et al.  New security services based on PKI , 2003, Future Gener. Comput. Syst..

[124]  Nathalie Japkowicz,et al.  A Novelty Detection Approach to Classification , 1995, IJCAI.

[125]  Audun Jøsang,et al.  Technologies for Trust in Electronic Commerce , 2004, Electron. Commer. Res..

[126]  David C. Yen,et al.  Public key infrastructure: a micro and macro analysis , 2003, Comput. Stand. Interfaces.

[127]  Tuomas Sandholm,et al.  Contracting With Uncertain Level Of Trust , 1999, EC '99.

[128]  Harris Drucker,et al.  Comparison of learning algorithms for handwritten digit recognition , 1995 .

[129]  Joel Weise-Sunps,et al.  Public Key Infrastructure Overview , 2001 .

[130]  Daniel Schwabe,et al.  OOHDM-Web: an environment for implementation of hypermedia applications in the WWW , 1999, LINK.

[131]  Jeff Tian,et al.  Measuring and Modeling Usage and Reliability for Statistical Web Testing , 2001, IEEE Trans. Software Eng..

[132]  Gregory Piatetsky-Shapiro,et al.  The interestingness of deviations , 1994 .

[133]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[134]  Sugato Basu and Raymond J. Mooney and Krupakar V. Pasupul Ghosh Using Lexical Knowlege to Evaluate the Novelty of Rules Mined from Text , 2001 .

[135]  Patrick Pérez,et al.  Data fusion for visual tracking with particles , 2004, Proceedings of the IEEE.

[136]  Raul Queiroz Feitosa,et al.  Facial Expression Classification Using RBF AND Back-Propagation Neural Networks , 2000 .

[137]  Sead Muftic,et al.  A secure payment system for electronic commerce , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[138]  C. Tracy,et al.  ACC/AHA PRACTICE GUIDELINES ACC/AHA Guidelines for Ambulatory Electrocardiography , 1999 .

[139]  Jean Louchet,et al.  Using an Individual Evolution Strategy for Stereovision , 2001, Genetic Programming and Evolvable Machines.

[140]  David A. Helweg,et al.  Acoustic identification of female Steller sea lions , 2000 .

[141]  Teuvo Kohonen,et al.  Self-Organization and Associative Memory , 1988 .

[142]  Wynne Hsu,et al.  Using General Impressions to Analyze Discovered Classification Rules , 1997, KDD.

[143]  Ulrich Parlitz,et al.  Methods of chaos physics and their application to acoustics , 1988 .

[144]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..