True Detection Rate and False Positives Targets on Road Side Detectors for Autonomous Vehicle Traffic

Author(s):  
Pierre Dersin ◽  
Erio Piana
Author(s):  
LEE SENG YEONG ◽  
LI-MINN ANG ◽  
KING HANN LIM ◽  
KAH PHOOI SENG

A dynamic counterpropagation network based on the forward only counterpropagation network (CPN) is applied as the classifier for face detection. The network, called the dynamic supervised forward-propagation network (DSFPN) trains using a supervised algorithm that grows dynamically during training allowing subclasses in the training data to be learnt. The network is trained using a reduced dimensionality categorized wavelet coefficients of the image data. Experimental results obtained show that a 94% correct detection rate can be achieved with less than 6% false positives.


Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5242
Author(s):  
Loris Nanni ◽  
Sheryl Brahnam ◽  
Alessandra Lumini

A fundamental problem in computer vision is face detection. In this paper, an experimentally derived ensemble made by a set of six face detectors is presented that maximizes the number of true positives while simultaneously reducing the number of false positives produced by the ensemble. False positives are removed using different filtering steps based primarily on the characteristics of the depth map related to the subwindows of the whole image that contain candidate faces. A new filtering approach based on processing the image with different wavelets is also proposed here. The experimental results show that the applied filtering steps used in our best ensemble reduce the number of false positives without decreasing the detection rate. This finding is validated on a combined dataset composed of four others for a total of 549 images, including 614 upright frontal faces acquired in unconstrained environments. The dataset provides both 2D and depth data. For further validation, the proposed ensemble is tested on the well-known BioID benchmark dataset, where it obtains a 100% detection rate with an acceptable number of false positives.


Author(s):  
Shinji Hayashi ◽  
◽  
Osamu Hasegawa ◽  

Face detection, one of the most actively researched and progressive computer vision fields, has been little studied in low-resolution images. Using the AdaBoost-based face detector and MIT+CMU frontal face test set – the standard detector and images for evaluation in face detection – we found that face detection rate falls to 39% from 88% as face resolution decreases from 24×24 pixels to 6×6 pixels. We discuss a proposal using “portrait images,” “image expansion,” “frequency-band limitation of features” and “two-detector integration” and show that 71% of face detection rate is obtained for 6×6 pixel faces of MIT+CMU frontal face test set. Note that each of the above detections involves 100 false positives for 112 evaluation images.


Author(s):  
Bhagya R Navada ◽  
K. V Santhosh

The present civilization highly depends on industrial products and hence there is an increased demand for the same. Therefore, each industry is trying to increase its production output without hindering the quality. Maintenance of plant health is essential to improve the production rate without any loss. Industrial processes require monitoring of every element as their consistent behavior is a fundamental concern. Any deviation in the working of these components may alter the quality of the end product, causing a huge loss for the industry. Therefore, monitoring and finding the root cause for irregular behavior of industrial processes is a requisite for avoiding any future loss. In this paper, an attempt is made to present types of faults, types of pneumatic actuator faults, and different techniques used for the detection and isolation of faults. Simulation work is carried out to generate stiction behavior in the control valve using the Choudhury stiction model. Valve stiction behavior for different values of stick band and jump values are discussed in this paper. A comparison of several techniques used for the detection of faults based on two performance indices namely true detection rate and false alarm rate has been given at the end of this paper. From these techniques, it is observed that these indices are interdependent, such that an increase in the detection rate increases the false detection rate and increases detection time.


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Khodor Hamandi ◽  
Alaa Salman ◽  
Imad H. Elhajj ◽  
Ali Chehab ◽  
Ayman Kayssi

Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS) that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.


2003 ◽  
Vol 1845 (1) ◽  
pp. 139-147 ◽  
Author(s):  
Heejeong Shin ◽  
Dimitri A. Grivas

As ground-penetrating radar (GPR) is increasingly used for assessing the condition of bridge decks, quantifying and controlling the quality of GPR measures becomes an important challenge. A methodology developed to assess the accuracy of deck condition measures is presented, and its use in a case study involving real data is demonstrated. The latter are generated during GPR applications on a large bridge deck and are processed with a commercial image-processing algorithm. The measures extracted from the processed GPR data are the rebar reflection amplitude and the dielectric constant of the deck material. The accuracy of the GPR assessments is evaluated by comparing core data (ground truth) with the GPR measures. The methodology uses appropriate statistical characteristic curves for quality control. It is based on a use of data to plot the probabilities of true detection versus false detection. Image interpretation requires using a threshold value (typically established from experience) selected to optimize true and false detection rates. The results of the case study indicate that rebar reflection data detect defects of the bridge decks at a 75% true detection rate with a 15% false detection rate. The dielectric data generated during field testing appear not to adequately represent the condition of the bridge deck because of the presence of latex-modified concrete overlay. The details of this finding and important conclusions are presented and discussed.


Author(s):  
Dan Negrut ◽  
Asher Elmquist ◽  
Radu Serban ◽  
Dylan Hatch ◽  
Parmesh Ramanathan

We discuss a software infrastructure that provides a virtual proving ground for designing, training, and auditing the computer programs used to pilot connected autonomous vehicles (CAVs). This effort does not concentrate on developing the piloting computer programs (PCPs) responsible for path planning in autonomous vehicles (AVs). Instead, we have established a first version of an emulation platform that changes the PCP design/test/improve process, which is often times carried out covertly [46], or in actual traffic conditions with potentially fatal consequences [45, 47].


Author(s):  
Martin C. Towner ◽  
Martin Cupak ◽  
Jean Deshayes ◽  
Robert M. Howie ◽  
Ben A. D. Hartig ◽  
...  

Abstract The detection of fireballs streaks in astronomical imagery can be carried out by a variety of methods. The Desert Fireball Network uses a network of cameras to track and triangulate incoming fireballs to recover meteorites with orbits and to build a fireball orbital dataset. Fireball detection is done on-board camera, but due to the design constraints imposed by remote deployment, the cameras are limited in processing power and time. We describe the processing software used for fireball detection under these constrained circumstances. Two different approaches were compared: (1) A single-layer neural network with 10 hidden units that were trained using manually selected fireballs and (2) a more traditional computational approach based on cascading steps of increasing complexity, whereby computationally simple filters are used to discard uninteresting portions of the images, allowing for more computationally expensive analysis of the remainder. Both approaches allowed a full night’s worth of data (over a thousand 36-megapixel images) to be processed each day using a low-power single-board computer. We distinguish between large (likely meteorite-dropping) fireballs and smaller fainter ones (typical ‘shooting stars’). Traditional processing and neural network algorithms both performed well on large fireballs within an approximately 30 000-image dataset, with a true positive detection rate of 96% and 100%, respectively, but the neural network was significantly more successful at smaller fireballs, with rates of 67% and 82%, respectively. However, this improved success came at a cost of significantly more false positives for the neural network results, and additionally the neural network does not produce precise fireball coordinates within an image (as it classifies). Simple consideration of the network geometry indicates that overall detection rate for triangulated large fireballs is calculated to be better than 99.7% and 99.9%, by ensuring that there are multiple double-station opportunities to detect any one fireball. As such, both algorithms are considered sufficient for meteor-dropping fireball event detection, with some consideration of the acceptable number of false positives compared to sensitivity.


Sign in / Sign up

Export Citation Format

Share Document