-
Evaluation of software impact designed for biomedical research: Are we measuring what's meaningful?
Authors:
Awan Afiaz,
Andrey Ivanov,
John Chamberlin,
David Hanauer,
Candace Savonen,
Mary J Goldman,
Martin Morgan,
Michael Reich,
Alexander Getka,
Aaron Holmes,
Sarthak Pati,
Dan Knight,
Paul C. Boutros,
Spyridon Bakas,
J. Gregory Caporaso,
Guilherme Del Fiol,
Harry Hochheiser,
Brian Haas,
Patrick D. Schloss,
James A. Eddy,
Jake Albrecht,
Andrey Fedorov,
Levi Waldron,
Ava M. Hoffman,
Richard L. Bradshaw
, et al. (2 additional authors not shown)
Abstract:
Software is vital for the advancement of biology and medicine. Analysis of usage and impact metrics can help developers determine user and community engagement, justify additional funding, encourage additional use, identify unanticipated use cases, and help define improvement areas. However, there are challenges associated with these analyses including distorted or misleading metrics, as well as e…
▽ More
Software is vital for the advancement of biology and medicine. Analysis of usage and impact metrics can help developers determine user and community engagement, justify additional funding, encourage additional use, identify unanticipated use cases, and help define improvement areas. However, there are challenges associated with these analyses including distorted or misleading metrics, as well as ethical and security concerns. More attention to the nuances involved in capturing impact across the spectrum of biological software is needed. Furthermore, some tools may be especially beneficial to a small audience, yet may not have compelling typical usage metrics. We propose more general guidelines, as well as strategies for more specific types of software. We highlight outstanding issues regarding how communities measure or evaluate software impact. To get a deeper understanding of current practices for software evaluations, we performed a survey of participants in the Informatics Technology for Cancer Research (ITCR) program funded by the National Cancer Institute (NCI). We also investigated software among this community and others to assess how often infrastructure that supports such evaluations is implemented and how this impacts rates of papers describing usage of the software. We find that developers recognize the utility of analyzing software usage, but struggle to find the time or funding for such analyses. We also find that infrastructure such as social media presence, more in-depth documentation, the presence of software health metrics, and clear information on how to contact developers seem to be associated with increased usage rates. Our findings can help scientific software developers make the most out of evaluations of their software.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
Primary Observables for Top Quark Collider Signals
Authors:
Layne Bradshaw,
Spencer Chang
Abstract:
At the HL-LHC and future high energy colliders, a sample of a billion top quarks will be produced, allowing precision searches for new physics in top quark decay and production. To aid in this endeavor, we characterize the independent three and four point on-shell amplitudes involving top quarks, under the assumption of $SU(3)_c\times U(1)_{em}$ invariance. The four point amplitudes factorize into…
▽ More
At the HL-LHC and future high energy colliders, a sample of a billion top quarks will be produced, allowing precision searches for new physics in top quark decay and production. To aid in this endeavor, we characterize the independent three and four point on-shell amplitudes involving top quarks, under the assumption of $SU(3)_c\times U(1)_{em}$ invariance. The four point amplitudes factorize into primary and descendent amplitudes, where descendants are primaries multiplied by Mandelstam variables. By enumerating the allowed amplitudes, we can check for amplitude redundancies to find the number of independent terms and convert those into a Lagrangian which parameterizes these amplitudes. These results are then cross checked by utilizing the Hilbert series to count the number of independent Lagrangian operators. Interestingly, we find situations where the Hilbert series has cancellations which, if naïvely interpreted, would lead to the incorrect conclusion that that there are no primary operators at a given mass dimension. We characterize the four fermion ($ffff$) and two fermion, two gauge boson ($ffVV$) operators respectively up to dimension 12 and 13. Finally, by combining unitarity bounds on the coupling strengths and simple estimates of the branching ratio sensitivities, we highlight interesting amplitudes for top quark decay that should be studied more closely at the HL-LHC. Of those highlighted, there are both new charge current and flavor changing neutral current decays that occur at dimension 8 and 10 in SMEFT.
△ Less
Submitted 7 September, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
Human Error Management in Requirements Engineering: Should We Fix the People, the Processes, or the Environment?
Authors:
Sweta Mahaju,
Jeffrey C. Carver,
Gary L. Bradshaw
Abstract:
Context: Software development is human-centric and vulnerable to human error. Human errors are errors in the human thought process. To ensure software quality, practitioners must understand how to manage these human errors. Organizations often change the requirements engineering process to prevent human errors from occurring or to mitigate the harm caused when those errors do occur. While there ar…
▽ More
Context: Software development is human-centric and vulnerable to human error. Human errors are errors in the human thought process. To ensure software quality, practitioners must understand how to manage these human errors. Organizations often change the requirements engineering process to prevent human errors from occurring or to mitigate the harm caused when those errors do occur. While there are studies on human error management in other disciplines, research on the prevention and mitigation of human errors in software engineering, and requirements engineering specifically, are limited. The software engineering studies do not provide strong results about the types of changes that are most effective in requirements engineering. Objective: The goal of this paper is to develop a taxonomy of human error prevention and mitigation strategies based on data from requirements engineering professionals. Method: We performed a qualitative analysis of two practitioner surveys on requirements engineering practices to identify and classify strategies for the prevention and mitigation of human errors. Results: We organized the human error management strategies into a taxonomy based on whether they primarily affect People, Processes, or the Environment. Inside each high-level category, we further organized the strategies into low-level classes. More than 50% of the reported strategies require a change in Process, 23% require a change in Environment, 21% require a change in People, with the remaining 5% too ambiguous to classify. In addition, more than 50\% of the strategies focus on Management activities. Conclusions: The Human Error Management Taxonomy provides a systematic classification and organization of strategies for prevention and mitigation of human errors in requirements engineering. This systematic organization provides a foundation upon which research can build.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
Creating Simple, Interpretable Anomaly Detectors for New Physics in Jet Substructure
Authors:
Layne Bradshaw,
Spencer Chang,
Bryan Ostdiek
Abstract:
Anomaly detection with convolutional autoencoders is a popular method to search for new physics in a model-agnostic manner. These techniques are powerful, but they are still a "black box," since we do not know what high-level physical observables determine how anomalous an event is. To address this, we adapt a recently proposed technique by Faucett et al., which maps out the physical observables l…
▽ More
Anomaly detection with convolutional autoencoders is a popular method to search for new physics in a model-agnostic manner. These techniques are powerful, but they are still a "black box," since we do not know what high-level physical observables determine how anomalous an event is. To address this, we adapt a recently proposed technique by Faucett et al., which maps out the physical observables learned by a neural network classifier, to the case of anomaly detection. We propose two different strategies that use a small number of high-level observables to mimic the decisions made by the autoencoder on background events, one designed to directly learn the output of the autoencoder, and the other designed to learn the difference between the autoencoder's outputs on a pair of events. Despite the underlying differences in their approach, we find that both strategies have similar ordering performance as the autoencoder and independently use the same six high-level observables. From there, we compare the performance of these networks as anomaly detectors. We find that both strategies perform similarly to the autoencoder across a variety of signals, giving a nontrivial demonstration that learning to order background events transfers to ordering a variety of signal events.
△ Less
Submitted 9 September, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
Mass Agnostic Jet Taggers
Authors:
Layne Bradshaw,
Rashmish K. Mishra,
Andrea Mitridate,
Bryan Ostdiek
Abstract:
Searching for new physics in large data sets needs a balance between two competing effects---signal identification vs background distortion. In this work, we perform a systematic study of both single variable and multivariate jet tagging methods that aim for this balance. The methods preserve the shape of the background distribution by either augmenting the training procedure or the data itself. M…
▽ More
Searching for new physics in large data sets needs a balance between two competing effects---signal identification vs background distortion. In this work, we perform a systematic study of both single variable and multivariate jet tagging methods that aim for this balance. The methods preserve the shape of the background distribution by either augmenting the training procedure or the data itself. Multiple quantitative metrics to compare the methods are considered, for tagging 2-, 3-, or 4-prong jets from the QCD background. This is the first study to show that the data augmentation techniques of Planing and PCA based scaling deliver similar performance as the augmented training techniques of Adversarial NN and uBoost, but are both easier to implement and computationally cheaper.
△ Less
Submitted 26 November, 2019; v1 submitted 23 August, 2019;
originally announced August 2019.
-
Laboratory-based X-ray Absorption Spectroscopy on a Working Pouch Cell Battery at Industrially-Relevant Charging Rates
Authors:
Evan P. Jahrman,
Lisa A. Pellerin,
Alexander S. Ditter,
Liam R. Bradshaw,
Timothy T. Fister,
Bryant J. Polzin,
Steven E. Trask,
Alison R. Dunlop,
Gerald T. Seidler
Abstract:
Li-ion battery (LIB) research has continuing importance for the entire range of applications from consumer products to vehicle electrification and grid stabilization. In many cases, standard electrochemical methods only provide an overall voltage or specific capacity, giving an inadequate description of parallel redox processes or chemical gradients at the particle and pack level. X-ray absorption…
▽ More
Li-ion battery (LIB) research has continuing importance for the entire range of applications from consumer products to vehicle electrification and grid stabilization. In many cases, standard electrochemical methods only provide an overall voltage or specific capacity, giving an inadequate description of parallel redox processes or chemical gradients at the particle and pack level. X-ray absorption fine structure (XAFS) is frequently used to augment bulk electrochemical data, as it provides element-specific changes in oxidation state and local atomic structure. Such microscopic descriptors are crucial for elucidating charge transfer and structural changes associated with bonding or site mixing, two key factors in evaluating state of charge and modes of cell failure. However, the impact of XAFS on LIB research has been significantly constrained by a logistical barrier: contemporary XAFS work is performed almost exclusively at synchrotron x-ray light sources, where beamtime is infrequent and experiment time-frames are limited. Here we show that modern laboratory based XAFS can not only be applied to, e.g., characterization of ex situ LIB electrode materials, but can also be used for operando studies at industrially-relevant charging rates in a standard pouch cell preparation. Such capability enables accelerated discovery of new materials and improved operation modes for LIBs.
△ Less
Submitted 24 May, 2019;
originally announced May 2019.