• Title/Summary/Keyword: 거짓 평가

Search Result 52, Processing Time 0.024 seconds

Adaptive fingerprint minutiae validation method based on quality check of local block (지역적 품질 측정을 이용한 적응적 지운 특징점 검증 방법)

  • 황경서;문성림;정석재;김동윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.832-834
    • /
    • 2004
  • 특징점 기반 지문 인식 시스템은 지문의 특징점 정보를 사용하기 때문에 교문 획득 시 발생하는 거짓 특징점에 많은 영향을 받는다. 거짓 특징점의 제거를 위해 특징정의 이웃 융선을 추적하는 위상 검증 방법(Topological validation)은 거짓 특징점 제거에 뛰어난 효율을 보이지만 올바른 특징점까지 제거되는 단점이 있다. 본 논문에서는 올바른 특징점이 거짓 특징점으로 오판되어 제거되는 것을 줄이기 위챈 가보 필터를 사용하여 특징점 주위 영역을 특징점 방향과 특징점 방향에 수직인 방향으로 필터링 수행 후 특징값의 차를 구하여 특징점의 품질을 평가하였다. 특징값이 일정 기준을 넘는 좋은 품질의 영역에서 추출된 특징점이면 거짓 특징점 제거 알고리즘을 수행하지 않음으로써 올바른 특징점이 제거되는 것을 막을 수 있었고 이와 같이 추출된 특징점들을 이용해 실험한 결과 ERR(Equal eRror Rate)에서 1.7%의 성능 향상을 보였다.

  • PDF

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

A Study of Inducing spontaneous deceptive behavior in virtual environment (가상현실공간에서의 순간적 거짓행동 유발연구)

  • Jung, Kyu-Hee;Lee, Jang-Han
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.125-129
    • /
    • 2008
  • Lying has been such a wrong act in human society, but at the same time we are perpetrating lying surprisingly often in the interpersonal situation. Like this, between what we think and what we do about telling lie is pretty different, and these differences are came from ambivalent attitudes stemmed from different sources which is divided into the implicit and the explicit attitude. We find manipulative liars by simulated racing task by using virtual environment. Implicit Association Test was applied to them to see implicit beliefs, and used self-reported questionnaires to identify explicit attitude about lying. As a result they could manipulate the explicit measures but could not maneuver their own implicit attraction to lie Liars' deceptive behaviors usually occur in subtle and covert way so that it has been hard to notice and to know what lead them to lie. However, as we know those spontaneous process is linked with deception, triggering them lie, it became no more veiled, unpredictable actions.

  • PDF

Call-Site Tracing-based Shared Memory Allocator for False Sharing Reduction in DSM Systems (분산 공유 메모리 시스템에서 거짓 공유를 줄이는 호출지 추적 기반 공유 메모리 할당 기법)

  • Lee, Jong-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.349-358
    • /
    • 2005
  • False sharing is a result of co-location of unrelated data in the same unit of memory coherency, and is one source of unnecessary overhead being of no help to keep the memory coherency in multiprocessor systems. Moreover. the damage caused by false sharing becomes large in proportion to the granularity of memory coherency. To reduce false sharing in a page-based DSM system, it is necessary to allocate unrelated data objects that have different access patterns into the separate shared pages. In this paper we propose call-site tracing-based shared memory allocator. shortly CSTallocator. CSTallocator expects that the data objects requested from the different call-sites may have different access patterns in the future. So CSTailocator places each data object requested from the different call-sites into the separate shared pages, and consequently data objects that have the same call-site are likely to get together into the same shared pages. We use execution-driven simulation of real parallel applications to evaluate the effectiveness of our CSTallocator. Our observations show that by using CSTallocator a considerable amount of false sharing misses can be additionally reduced in comparison with the existing techniques.

A Reputation Management Scheme Improving the Trustworthiness of Multi-peers and Shared Resources in P2P Networks (다중 피어 및 공유 자원의 신뢰성 향상을 위한 P2P 네트워크의 평판 관리)

  • Shin, Jung-Hwa;Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1409-1419
    • /
    • 2008
  • Inauthentic resources can be easily spread by P2P (Peer-to-Peer) participants due to the openness and anonymity of P2P networks. A possible way to restrict the distribution of inauthentic resources and prevent malicious peers from joining P2P networks is to exploit peers' reputation which reflect their past behaviors and are also helpful to predict peers' future behaviors. There is a possibility that some peers intentionally plays along with other peers in order to increase/decrease its reputation through false feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRRep (Trustable Resource sharing service using Reputation) scheme, which improves the trustworthiness and efficiency of P2P networks by identifying peers who give false feedback. The TrustRRep scheme is also capable of providing peers with the trustworthiness of shared resources by discriminating resources distributed by malicious peers. We implement the proposed TrustRRep scheme on the NS-2 simulator for evaluating its performance compared to the recent reputation management work available in literature. A case study on simulations shows that the proposed reputation management scheme yields efficient performance in terms of the minimal download ratio and dissemination of inauthentic resources, the efficient identification of peers who give false feedback, and the provisioning of the trustworthiness of peers' reputation. It also shows that the proposed TrustRRep scheme imposes the restrictions of participating P2P networks on a malicious peers by diminishing its trust value.

  • PDF

Effect of LED trap on controlling Sitophilus zeamais and Tribolium castaneum in granary (곡물저장창고에서 LED 트랩을 이용한 어리쌀바구미와 거짓쌀도둑거저리의 실증 유인효과)

  • Song, Ja-Eun;Lee, Sang-Guei;Lee, Hoi-Seon
    • Journal of Applied Biological Chemistry
    • /
    • v.59 no.2
    • /
    • pp.129-132
    • /
    • 2016
  • This study was conducted to evaluate the attraction effects of Sitophilus zeamais and Tribolium castaneum to light emitting diode (LED) trap in granary and compared with the black light bulb (BLB) trap, which is typical used in commercial trap. The red LED trap showed more attractive to S. zeamais and T. castaneum than that of the BLB. Moreover, the external condition of granary was about 1.5 times more attractive to S. zeamais and T. castaneum than the internal condition of granary. These results suggested that red LED trap could be useful to control S. zeamais and T. castaneum in granary.

Performance Evaluation of Review Spam Detection for a Domestic Shopping Site Application (국내 쇼핑 사이트 적용을 위한 리뷰 스팸 탐지 방법의 성능 평가)

  • Park, Jihyun;Kim, Chong-kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.339-343
    • /
    • 2017
  • As the number of customers who write fake reviews is increasing, online shopping sites have difficulty in providing reliable reviews. Fake reviews are called review spam, and they are written to promote or defame the product. They directly affect sales volume of the product; therefore, it is important to detect review spam. Review spam detection methods suggested in prior researches were only based on an international site even though review spam is a widespread problem in domestic shopping sites. In this paper, we have presented new review features of the domestic shopping site NAVER, and we have applied the formerly introduced method to this site for performing an evaluation.

대학수학에서 증명문제의 다양한 평가

  • Kim, Byeong-Mu
    • Communications of Mathematical Education
    • /
    • v.18 no.2 s.19
    • /
    • pp.125-132
    • /
    • 2004
  • 대학 교양수학 과정에서 수학적 명제를 증명하는 과정은 중요하다. 선행 연구들은 주관식 증명문제의 시험이 어려워 증명문제를 피하고 더 나아가 포기하게 만든다고 한다. 여기서는 대학 교양수학 과정에서 필요하고 중요한 기본 개념이나 정리를 선정하여 선택형 또는 참, 거짓 평가문항으로 개발하고 학생들에게 시험을 보게 하여 결과를 분석하고 이를 통해 증명문제의 두려움을 조금이라도 줄여주고 기본개념의 확실한 이해를 위해 도움을 제공하려고 한다.

  • PDF

A New Reputation System for Reducing the Liars in P2P (P2P에서 Liar 감소를 위한 새로운 평판 시스템)

  • Shin, Jung-Hwa;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.599-606
    • /
    • 2006
  • As the P2P service does not have any administration authorities that are able to manage the behavior of participants and control the malicious users, malicious user can give harm to legitimate users for the benefit of themselves. To perform the secure transaction with new members who did not have past experiences on transaction, service users can differentiate malicious users and legitimate users by referring to the reputation information that provided by users having past experience. However, users can intentionally give false evaluation to other users on Performed transaction. We call these users as 'liar'. In this Paper, we propose a new reputation system for liar reduction to guarantee an accuracy on reputation information.

Coward Analysis based Spam SMS Detection Scheme (동시출현 단어분석 기반 스팸 문자 탐지 기법)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.693-700
    • /
    • 2016
  • Analyzing characteristics of spam text messages had limitations since spam datasets are typically difficult to obtain publicly and previous studies focused on spam email. Although existing studies, such as through the use of spam e-mail characterization and utilization of data mining techniques, there are limitations that influence is limited to high spam detection techniques using a single word character. In this paper, we reveal the characteristics of the spam SMS based on experiment and analysis from different perspectives and propose coward analysis based spam SMS detection scheme with a publicly disclosed spam SMS from the University of Singapore. With the extensive performance evaluations, we show false positive and false negative of the proposed method is less than 2%.