false alarms
Recently Published Documents


TOTAL DOCUMENTS

1519
(FIVE YEARS 562)

H-INDEX

49
(FIVE YEARS 10)

2022 ◽  
Vol 31 (2) ◽  
pp. 1-26
Author(s):  
Chandra Maddila ◽  
Nachiappan Nagappan ◽  
Christian Bird ◽  
Georgios Gousios ◽  
Arie van Deursen

Modern, complex software systems are being continuously extended and adjusted. The developers responsible for this may come from different teams or organizations, and may be distributed over the world. This may make it difficult to keep track of what other developers are doing, which may result in multiple developers concurrently editing the same code areas. This, in turn, may lead to hard-to-merge changes or even merge conflicts, logical bugs that are difficult to detect, duplication of work, and wasted developer productivity. To address this, we explore the extent of this problem in the pull-request-based software development model. We study half a year of changes made to six large repositories in Microsoft in which at least 1,000 pull requests are created each month. We find that files concurrently edited in different pull requests are more likely to introduce bugs. Motivated by these findings, we design, implement, and deploy a service named Concurrent Edit Detector (ConE) that proactively detects pull requests containing concurrent edits, to help mitigate the problems caused by them. ConE has been designed to scale, and to minimize false alarms while still flagging relevant concurrently edited files. Key concepts of ConE include the detection of the Extent of Overlap between pull requests, and the identification of Rarely Concurrently Edited Files . To evaluate ConE, we report on its operational deployment on 234 repositories inside Microsoft. ConE assessed 26,000 pull requests and made 775 recommendations about conflicting changes, which were rated as useful in over 70% (554) of the cases. From interviews with 48 users, we learned that they believed ConE would save time in conflict resolution and avoiding duplicate work, and that over 90% intend to keep using the service on a daily basis.


2022 ◽  
Vol 6 (POPL) ◽  
pp. 1-31
Author(s):  
Marco Campion ◽  
Mila Dalla Preda ◽  
Roberto Giacobazzi

Imprecision is inherent in any decidable (sound) approximation of undecidable program properties. In abstract interpretation this corresponds to the release of false alarms, e.g., when it is used for program analysis and program verification. As all alarming systems, a program analysis tool is credible when few false alarms are reported. As a consequence, we have to live together with false alarms, but also we need methods to control them. As for all approximation methods, also for abstract interpretation we need to estimate the accumulated imprecision during program analysis. In this paper we introduce a theory for estimating the error propagation in abstract interpretation, and hence in program analysis. We enrich abstract domains with a weakening of a metric distance. This enriched structure keeps coherence between the standard partial order relating approximated objects by their relative precision and the effective error made in this approximation. An abstract interpretation is precise when it is complete. We introduce the notion of partial completeness as a weakening of precision. In partial completeness the abstract interpreter may produce a bounded number of false alarms. We prove the key recursive properties of the class of programs for which an abstract interpreter is partially complete with a given bound of imprecision. Then, we introduce a proof system for estimating an upper bound of the error accumulated by the abstract interpreter during program analysis. Our framework is general enough to be instantiated to most known metrics for abstract domains.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 609
Author(s):  
Roman Meshcheryakov ◽  
Andrey Iskhakov ◽  
Mark Mamchenko ◽  
Maria Romanova ◽  
Saygid Uvaysov ◽  
...  

The paper proposes an approach to assessing the allowed signal-to-noise ratio (SNR) for light detection and ranging (LiDAR) of unmanned autonomous vehicles based on the predetermined probability of false alarms under various intentional and unintentional influencing factors. The focus of this study is on the relevant issue of the safe use of LiDAR data and measurement systems within the “smart city” infrastructure. The research team analyzed and systematized various external impacts on the LiDAR systems, as well as the state-of-the-art approaches to improving their security and resilience. It has been established that the current works on the analysis of external influences on the LiDARs and methods for their mitigation focus mainly on physical (hardware) approaches (proposing most often other types of modulation and optical signal frequencies), and less often software approaches, through the use of additional anomaly detection techniques and data integrity verification systems, as well as improving the efficiency of data filtering in the cloud point. In addition, the sources analyzed in this paper do not offer methodological support for the design of the LiDAR in the very early stages of their creation, taking into account a priori assessment of the allowed SNR threshold and probability of detecting a reflected pulse and the requirements to minimize the probability of “missing” an object when scanning with no a priori assessments of the detection probability characteristics of the LiDAR. The authors propose a synthetic approach as a mathematical tool for designing a resilient LiDAR system. The approach is based on the physics of infrared radiation, the Bayesian theory, and the Neyman–Pearson criterion. It features the use of a predetermined threshold for false alarms, the probability of interference in the analytics, and the characteristics of the LiDAR’s receivers. The result is the analytical solution to the problem of calculating the allowed SNR while stabilizing the level of “false alarms” in terms of background noise caused by a given type of interference. The work presents modelling results for the “false alarm” probability values depending on the selected optimality criterion. The efficiency of the proposed approach has been proven by the simulation results of the received optical power of the LiDAR’s signal based on the calculated SNR threshold and noise values.


2022 ◽  
Vol 9 ◽  
Author(s):  
Jean de Bremond d’Ars ◽  
Dominique Gibert

Volcanoes with highly-developed and shallow hydrothermal systems may be subject to sudden increases of their surface steam emission at vents in response to either deep forcing (e.g. increase of heat flux coming from the magma chamber) or external forcing (e.g. sudden decrease of atmospheric pressure or variation of meteoric water input). Because the vent plumbing has a limited heat and mass transfer capacity, the rise of steam pressure accompanying the increase of flux may destabilize the system in order to augment its net transfer capacity. This reorganization may, for instance, take the form of an enlargement of existing conduits and vents or to the creation of new ones. In such a case, local and extremely dangerous blast phenomena are likely to occur with devastating consequences several hundreds of meters around. Even volcanoes with a moderate activity and considered safe by the local population are exposed to such abrupt and dangerous events. The detection of early warning signals through temperature monitoring in the vents is of a primary importance and a main difficulty is to correctly interpret temperature jumps in order to reduce false alarms. We analyze time series of the temperature measured in three fumaroles located at the top of La Soufrière volcano in Guadeloupe, which are characterized by their relatively low temperature around 99°C, slightly above the boiling temperature of water at this altitude. Thanks to the long duration of the records from January to August 2017 and to their short 1-s sampling interval, a multiscale analysis can be performed over several orders of magnitude. We show that, despite their complex and sometimes erratic appearance, the temperature variations observed in the vents contain components highly correlated with rain input variations. Some remarkable patterns recurrently appear at different periods and we show that the main temperature variations of more than 10°C are related to the rainfall intensity. Our results illustrate the importance of external forcing on the otherwise complex and possibly chaotic dynamics of the shallow hydrothermal system of La Soufrière. They also reveal that a careful analysis of rainfall forcing must be done to be able to draw any conclusion concerning changes caused by the underlying hydrothermal system.


2022 ◽  
Vol 14 (2) ◽  
pp. 320
Author(s):  
Jinyu Bao ◽  
Xiaoling Zhang ◽  
Tianwen Zhang ◽  
Xiaowo Xu

Most existing SAR moving target shadow detectors not only tend to generate missed detections because of their limited feature extraction capacity among complex scenes, but also tend to bring about numerous perishing false alarms due to their poor foreground–background discrimination capacity. Therefore, to solve these problems, this paper proposes a novel deep learning network called “ShadowDeNet” for better shadow detection of moving ground targets on video synthetic aperture radar (SAR) images. It utilizes five major tools to guarantee its superior detection performance, i.e., (1) histogram equalization shadow enhancement (HESE) for enhancing shadow saliency to facilitate feature extraction, (2) transformer self-attention mechanism (TSAM) for focusing on regions of interests to suppress clutter interferences, (3) shape deformation adaptive learning (SDAL) for learning moving target deformed shadows to conquer motion speed variations, (4) semantic-guided anchor-adaptive learning (SGAAL) for generating optimized anchors to match shadow location and shape, and (5) online hard-example mining (OHEM) for selecting typical difficult negative samples to improve background discrimination capacity. We conduct extensive ablation studies to confirm the effectiveness of the above each contribution. We perform experiments on the public Sandia National Laboratories (SNL) video SAR data. Experimental results reveal the state-of-the-art performance of ShadowDeNet, with a 66.01% best f1 accuracy, in contrast to the other five competitive methods. Specifically, ShadowDeNet is superior to the experimental baseline Faster R-CNN by a 9.00% f1 accuracy, and superior to the existing first-best model by a 4.96% f1 accuracy. Furthermore, ShadowDeNet merely sacrifices a slight detection speed in an acceptable range.


2022 ◽  
Vol 2022 ◽  
pp. 1-11
Author(s):  
Mengmeng Jiang ◽  
Qiong Wu ◽  
Xuetao Li

In modern urban construction, digitalization has become a trend, but the single source of information of traditional algorithms can not meet people’s needs, so the data fusion technology needs to draw estimation and judgment from multisource data to increase the confidence of data, improve reliability, and reduce uncertainty. In order to understand the influencing factors of regional digitalization, this paper conducts multisource heterogeneous data fusion analysis based on regional digitalization of machine learning, using decision tree and artificial neural network algorithm, compares the management efficiency and satisfaction of school population under different algorithms, and understands the data fusion and construction under different algorithms. According to the results, decision-making tree and artificial neural network algorithms were more efficient than traditional methods in building regional digitization, and their magnitude was about 60% higher. More importantly, the machine learning-based methods in multisource heterogeneous data fusion have been better than traditional calculation methods both in computational efficiency and misleading rate with respect to false alarms and missed alarms. This shows that machine learning methods can play an important role in the analysis of multisource heterogeneous data fusion in regional digital construction.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Recent advances in machine learning have shown promising results for detecting network intrusion through supervised machine learning. However, such techniques are ineffective for new types of attacks. In the preferred unsupervised and semi-supervised cases, these newer techniques suffer from lower accuracy and higher rates of false alarms. This work proposes a machine learning model that combines auto-encoder with one-class support vectors machine. In this model, the auto-encoders learn the representation of the input data in a latent space and reduces the dimensionality of the input data. The dimensionality-reduced input is then extracted from the auto-encoder and passed to a one-class support vectors machine to classify the network event as an attack or a normal event. The model is trained on normal network events only. The proposed model is then evaluated and compared with several existing models. It achieves high accuracy when tested on the NSL-KDD and KDD99 datasets, with total accuracies of 96.24% and 99.45%, respectively.


Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 319
Author(s):  
Xin Chen ◽  
Jinghong Liu ◽  
Fang Xu ◽  
Zhihua Xie ◽  
Yujia Zuo ◽  
...  

Aircraft detection in remote sensing images (RSIs) has drawn widespread attention in recent years, which has been widely used in the military and civilian fields. While the complex background, variations of aircraft pose and size bring great difficulties to the effective detection. In this paper, we propose a novel aircraft target detection scheme based on small training samples. The scheme is coarse-to-fine, which consists of two main stages: region proposal and target identification. First, in the region proposal stage, a circular intensity filter, which is designed based on the characteristics of the aircraft target, can quickly locate the centers of multi-scale suspicious aircraft targets in the RSIs pyramid. Then the target regions can be extracted by adding bounding boxes. This step can get high-quality but few candidate regions. Second, in the stage of target identification, we proposed a novel rotation-invariant feature, which combines rotation-invariant histogram of oriented gradient and vector of locally aggregated descriptors (VLAD). The feature can characterize the aircraft target well by avoiding the impact of its rotation and can be effectively used to remove false alarms. Experiments are conducted on Remote Sensing Object Detection (RSOD) dataset to compare the proposed method with other advanced methods. The results show that the proposed method can quickly and accurately detect aircraft targets in RSIs and achieve a better performance.


Author(s):  
Prathima P

Abstract: Fall is a significant national health issue for the elderly people, generally resulting in severe injuries when the person lies down on the floor over an extended period without any aid after experiencing a great fall. Thus, elders need to be cared very attentively. A supervised-machine learning based fall detection approach with accelerometer, gyroscope is devised. The system can detect falls by grouping different actions as fall or non-fall events and the care taker is alerted immediately as soon as the person falls. The public dataset SisFall with efficient class of features is used to identify fall. The Random Forest (RF) and Support Vector Machine (SVM) machine learning algorithms are employed to detect falls with lesser false alarms. The SVM algorithm obtain a highest accuracy of 99.23% than RF algorithm. Keywords: Fall detection, Machine learning, Supervised classification, Sisfall, Activities of daily living, Wearable sensors, Random Forest, Support Vector Machine


Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 226
Author(s):  
Marek Hermansa ◽  
Michał Kozielski ◽  
Marcin Michalak ◽  
Krzysztof Szczyrba ◽  
Łukasz Wróbel ◽  
...  

In this paper, the problem of the identification of undesirable events is discussed. Such events can be poorly represented in the historical data, and it is predominantly impossible to learn from past examples. The discussed issue is considered in the work in the context of two use cases in which vibration and temperature measurements collected by wireless sensors are analysed. These use cases include crushers at a coal-fired power plant and gantries in a steelworks converter. The awareness, resulting from the cooperation with industry, of the need for a system that works in cold start conditions and does not flood the machine operator with alarms was the motivation for proposing a new predictive maintenance method. The proposed solution is based on the methods of outlier identification. These methods are applied to the collected data that was transformed into a multidimensional feature vector. The novelty of the proposed solution stems from the creation of a methodology for the reduction of false positive alarms, which was applied to a system identifying undesirable events. This methodology is based on the adaptation of the system to the analysed data, the interaction with the dispatcher, and the use of the XAI (eXplainable Artificial Intelligence) method. The experiments performed on several data sets showed that the proposed method reduced false alarms by 90.25% on average in relation to the performance of the stand-alone outlier detection method. The obtained results allowed for the implementation of the developed method to a system operating in a real industrial facility. The conducted research may be valuable for systems with a cold start problem where frequent alarms can lead to discouragement and disregard for the system by the user.


Sign in / Sign up

Export Citation Format

Share Document