Detection system performance metrics with scene content dependencies

Author(s):  
Timothy D. Ross ◽  
William E. Pierson ◽  
Edmund G. Zelnio ◽  
Kevin L. Priddy
Author(s):  
Nguyen Hong Giang ◽  
Vo Nguyen Quoc Bao ◽  
Hung Nguyen-Le

This paper analyzes the performance of a cognitive underlay system over Nakagami-m fading channels, where maximal ratio combining (MRC) is employed at secondary destination and relay nodes. Under the condition of imperfect channel state information (CSI) of interfering channels, system performance metrics for the primary network and for the secondary network are formulated into exact and approximate expressions, which can be served as theoretical guidelines for system designs. To verify the performance analysis, several analytical and simulated results of the system performance are provided under various system and channel settings.


Author(s):  
Daniel F. Silva ◽  
Alexander Vinel ◽  
Bekircan Kirkici

With recent advances in mobile technology, public transit agencies around the world have started actively experimenting with new transportation modes, many of which can be characterized as on-demand public transit. Design and efficient operation of such systems can be particularly challenging, because they often need to carefully balance demand volume with resource availability. We propose a family of models for on-demand public transit that combine a continuous approximation methodology with a Markov process. Our goal is to develop a tractable method to evaluate and predict system performance, specifically focusing on obtaining the probability distribution of performance metrics. This information can then be used in capital planning, such as fleet sizing, contracting, and driver scheduling, among other things. We present the analytical solution for a stylized single-vehicle model of first-mile operation. Then, we describe several extensions to the base model, including two approaches for the multivehicle case. We use computational experiments to illustrate the effects of the inputs on the performance metrics and to compare different modes of transit. Finally, we include a case study, using data collected from a real-world pilot on-demand public transit project in a major U.S. metropolitan area, to showcase how the proposed model can be used to predict system performance and support decision making.


2021 ◽  
Vol 35 (1) ◽  
pp. 11-21
Author(s):  
Himani Tyagi ◽  
Rajendra Kumar

IoT is characterized by communication between things (devices) that constantly share data, analyze, and make decisions while connected to the internet. This interconnected architecture is attracting cyber criminals to expose the IoT system to failure. Therefore, it becomes imperative to develop a system that can accurately and automatically detect anomalies and attacks occurring in IoT networks. Therefore, in this paper, an Intrsuion Detection System (IDS) based on extracted novel feature set synthesizing BoT-IoT dataset is developed that can swiftly, accurately and automatically differentiate benign and malicious traffic. Instead of using available feature reduction techniques like PCA that can change the core meaning of variables, a unique feature set consisting of only seven lightweight features is developed that is also IoT specific and attack traffic independent. Also, the results shown in the study demonstrates the effectiveness of fabricated seven features in detecting four wide variety of attacks namely DDoS, DoS, Reconnaissance, and Information Theft. Furthermore, this study also proves the applicability and efficiency of supervised machine learning algorithms (KNN, LR, SVM, MLP, DT, RF) in IoT security. The performance of the proposed system is validated using performance Metrics like accuracy, precision, recall, F-Score and ROC. Though the accuracy of Decision Tree (99.9%) and Randon Forest (99.9%) Classifiers are same but other metrics like training and testing time shows Random Forest comparatively better.


2020 ◽  
Vol 20 (1) ◽  
pp. 82-94
Author(s):  
Badrus Zaman ◽  
Army Justitia ◽  
Kretawiweka Nuraga Sani ◽  
Endah Purwanti

AbstractHoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use readers’ feedback and Naïve Bayes algorithm, which is used to verify news. Overtime, by using readers’ feedback, database corpus will continue to grow and could improve system performance. The current research aims to reach this. System performance evaluation is carried out under two conditions ‒ with and without sources (URL). The system is able to detect hoax news very well under both conditions. The highest precision, recall and f-measure values when including URL are 0.91, 1, and 0.95 respectively. Meanwhile, the highest value of precision, recall and f-measure without URL are 0.88, 1 and 0.94, respectively.


2017 ◽  
Vol 14 (2) ◽  
pp. 329-346 ◽  
Author(s):  
Srdjan Sladojevic ◽  
Andras Anderla ◽  
Dubravko Culibrk ◽  
Darko Stefanovic ◽  
Bojan Lalic

This paper presents the results of a study of the effects of integer (fixed-point) arithmetic implementation on classification accuracy of a popular open-source people detection system based on Histogram of Oriented Gradients. It is investigated how the system performance deviates from the reference algorithm performance as integer arithmetic is introduced with different bit-width in several critical parts of the system. In performed experiments, the effects of different bit-width integer arithmetic implementation for four key operations were separately considered: HoG descriptor magnitude calculation, HoG descriptor angle calculation, normalization and SVM classification. It is found that a 13-bit representation of variables is more than sufficient to accurately implement this system in integer arithmetic. The experiments in the paper are conducted for pedestrian detection and the methodology and the lessons learned from this study allow generalization of conclusions to a broader class of applications.


Author(s):  
Mannat Jot Singh Aneja ◽  
Tarunpreet Bhatia ◽  
Gaurav Sharma ◽  
Gulshan Shrivastava

This chapter describes how Vehicular Ad hoc Networks (VANETs) are classes of ad hoc networks that provides communication among various vehicles and roadside units. VANETs being decentralized are susceptible to many security attacks. A flooding attack is one of the major security threats to the VANET environment. This chapter proposes a hybrid Intrusion Detection System which improves accuracy and other performance metrics using Artificial Neural Networks as a classification engine and a genetic algorithm as an optimization engine for feature subset selection. These performance metrics have been calculated in two scenarios, namely misuse and anomaly. Various performance metrics are calculated and compared with other researchers' work. The results obtained indicate a high accuracy and precision and negligible false alarm rate. These performance metrics are used to evaluate the intrusion system and compare with other existing algorithms. The classifier works well for multiple malicious nodes. Apart from machine learning techniques, the effect of the network parameters like throughput and packet delivery ratio is observed.


Author(s):  
Jérôme Darmont

Performance measurement tools are very important, both for designers and users of Database Management Systems (DBMSs). Performance evaluation is useful to designers to determine elements of architecture, and, more generally, to validate or refute hypotheses regarding the actual behavior of a DBMS. Thus, performance evaluation is an essential component in the development process of well-designed and efficient systems. Users may also employ performance evaluation, either to compare the efficiency of different technologies before selecting a DBMS, or to tune a system. Performance evaluation by experimentation on a real system is generally referred to as benchmarking. It consists of performing a series of tests on a given DBMS to estimate its performance in a given setting. Typically, a benchmark is constituted of two main elements: a database model (conceptual schema and extension), and a workload model (set of read and write operations) to apply on this database, following a predefined protocol. Most benchmarks also include a set of simple or composite performance metrics such as response time, throughput, number of input/output, disk or memory usage, and so forth. The aim of this article is to present an overview of the major families of state-of-the-art database benchmarks, namely, relational benchmarks, object and object-relational benchmarks, XML benchmarks, and decision-support benchmarks; and to discuss the issues, tradeoffs, and future trends in database benchmarking. We particularly focus on XML and decision-support benchmarks, which are currently the most innovative tools that are developed in this area.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Felipe A. Cruz-Pérez ◽  
Genaro Hernandez-Valdez ◽  
Andrés Rico-Páez ◽  
Sandra L. Castellanos-López ◽  
José R. Miranda-Tello ◽  
...  

Cell dwell time (DT) and unencumbered interruption time (IT) are fundamental time interval variables in the teletraffic analysis for the performance evaluation of mobile cellular networks. Although a diverse set of general distributions has been proposed to model these time interval variables, the effect of their moments higher than the expected value on system performance has not been reported in the literature. In this paper, sensitivity of teletraffic performance metrics of mobile cellular networks to the first three standardized moments of both DT and IT is investigated in a comprehensive manner. Mathematical analysis is developed considering that both DT and IT are phase-type distributed random variables. This work includes substantial numerical results for quantifying the dependence of system level performance metrics to the values of the first three standardized moments of both DT and IT. For instance, for a high mobility scenario where DT is modeled by a hyper-Erlang distribution, we found that call forced termination probability decreases around 60% as the coefficient of variation (CoV) and skewness of DT simultaneously change from 1 to 20 and from 60 to 2, respectively. Also, numerical results confirm that as link unreliability increases the forced termination probability increases while both new call blocking and handoff failure probabilities decrease. Numerical results also indicate that for low values of skewness, performance metrics are highly sensitive to changes in the CoV of either the IT or DT. In general, it is observed that system performance is more sensitive to the statistics of the IT than to those of the DT. Such understanding of teletraffic engineering issues is vital for planning, designing, dimensioning, and optimizing mobile cellular networks.


Sign in / Sign up

Export Citation Format

Share Document