scholarly journals Quantifying the Probability of False Alarm for Automatically Detected Features in InSAR Deformation Maps

2022 ◽  
Author(s):  
Scott Staniewicz ◽  
Jingyi Chen
2018 ◽  
Vol 14 (09) ◽  
pp. 190 ◽  
Author(s):  
Shewangi Kochhar ◽  
Roopali Garg

<p>Cognitive Radio has been skillful technology to improve the spectrum sensing as it enables Cognitive Radio to find Primary User (PU) and let secondary User (SU) to utilize the spectrum holes. However detection of PU leads to longer sensing time and interference. Spectrum sensing is done in specific “time frame” and it is further divided into Sensing time and transmission time. Higher the sensing time better will be detection and lesser will be the probability of false alarm. So optimization technique is highly required to address the issue of trade-off between sensing time and throughput. This paper proposed an application of Genetic Algorithm technique for spectrum sensing in cognitive radio. Here results shows that ROC curve of GA is better than PSO in terms of normalized throughput and sensing time. The parameters that are evaluated are throughput, probability of false alarm, sensing time, cost and iteration.</p>


2018 ◽  
Vol 144 ◽  
pp. 201-215
Author(s):  
Natthanan Promsuk ◽  
Attaphongse Taparugssanagorn ◽  
Johanna Vartiainen

Author(s):  
Swetha Reddy ◽  
Isaac Cushman ◽  
Danda B. Rawat ◽  
Min Song

The popularity of cloud-assisted database-driven cognitive radio network (CRN) has increased significantly due to three main reasons; reduced sensing uncertainties (caused by the use of spectrum scanning and sensing techniques), FCC mandated use of a database for storing and utilizing idle channels, and leveraging cloud computing platform to process big data generated by wideband sensing and analyzing. In database-driven CRN, secondary users periodically query the database to find idle channels for opportunistic communications where secondary users use their geolocation (with the help of Global Positioning System - GPS) to find idle channels for given location and time. Use of GPS makes the overall CRN vulnerable where malicious users falsify their geolocations through GPS spoofing to find more channels. The other main drawback of GPS is estimation error while finding location of users and idle bands. Due to this there will be probability of misdetection and false alarm which will have its effect on overall performance and efficiency of the system. In this paper, the authors present a three-stage mechanism for detecting GPS spoofing attacks using angle of arrival, received signal strength and time of arrival. They also evaluate the probability of misdetection and probability of false alarm in this system while detecting location of secondary users. The authors evaluate the performance of the proposed approach using numerical results.


1989 ◽  
Vol 1989 (1) ◽  
pp. 27-35
Author(s):  
Joseph W. Maresca ◽  
James W. Starr ◽  
Robert D. Roach ◽  
John S. Farlow

ABSTRACT A United States Environmental Protection Agency (EPA) research program evaluated the current performance of commercially available volumetric test methods for the detection of small leaks in underground gasoline storage tanks. The evaluations were performed at the EPA Risk Reduction Engineering Laboratory's Underground Storage Tank Test Apparatus in Edison, New Jersey. The methodology used for evaluation made it possible to determine and resolve most of the technological and engineering issues associated with volumetric leak detection, as well as to define the current practice of commercially available test methods. The approach used (1) experimentally validated models of the important sources of ambient noise that affect volume changes in nonleaking and leaking tanks, (2) a large data base of product-temperature changes that result from the delivery of product to a tank at a different temperature than the product in the tank, and (3) a mathematical model of each test method to estimate the performance of that method. The test-method model includes the instrumentation noise, the configuration of the sensors, the test protocol, the data analysis algorithms, and the detection criterion. Twenty-five commercially available volumetric leak detection systems were evaluated. The leak rate measurable by these systems ranged from 0.26 to 6.78 L/h (0.07 to 1.79 gal/h), with a probability of detection of 0.95 and a probability of false alarm of 0.05. Five methods achieved a performance between 0.19 L/h (0.05 gal/h) and 0.57 L/h (0.15 gal/h). Only one method was able to detect leaks less than 0.57 L/h (0.15 gal/h) if the probability of detection was increased to 0.99 and the probability of false alarm was decreased to 0.01. The measurable leak rates ranged from 0.45 to 12.94 L/h (0.12 to 3.42 gal/h) with these more stringent detection and false alarm parameters. The performance of the methods evaluated was primarily limited by test protocol, operational sensor configuration, data analysis, and calibration, rather than by hardware. The experimental analysis and model calculations suggested that substantial performance improvements can be realized by making procedural changes. With modifications, it is estimated that more than 60 percent of the methods should be able to achieve a probability of detection of 0.99 and a probability of false alarm of 0.01 for leak rates between 0.19 L/h (0.05 gal/h) and 0.56 L/h (0.15 gal/h), and 100 percent should be able to achieve this performance for leak rates of approximately 0.76 L/h (0.20 gal/h).


1998 ◽  
Vol 34 (8) ◽  
pp. 806 ◽  
Author(s):  
G. de Miguel Vela ◽  
J.A. Besada Portas ◽  
J.R. Casar Corredera

Author(s):  
K. M. Ghylin ◽  
C. G. Drury ◽  
R Batta ◽  
L. Lin

Data from certified screeners performing an x-ray inspection task for 4 hours, or 1000 images, were analyzed to identify the nature of the vigilance decrement. The expected vigilance decrement was found, with performance measured by probability of detection (PoD) and probability of false alarm [P(FA)] decreasing from hour 1 to hour 4. Correlations between PoD and P(FA) indicate that sensitivity between hours remained the same, however a shift in criterion (Beta) occurred. Significant decreases in both detection and stopping time were found from the first hour to the second, third, and fourth hour. Evidence of changes in the search component of the time per item was found to account for part of the vigilance decrement. As the task continued, participants spent less time actively searching the image, as opposed to other activities. Evidence is provided for truncation of active search as security inspection continues.


Sign in / Sign up

Export Citation Format

Share Document