• Title/Summary/Keyword: 부정 탐지

Search Result 86, Processing Time 0.034 seconds

The cutoff criterion and the accuracy of the polygraph test for crime investigation (범죄수사를 위한 거짓말탐지 검사(polygraph test)의 판정기준과 정확성)

  • Yu Hwa Han ;Kwangbai Park
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.4
    • /
    • pp.103-117
    • /
    • 2008
  • The polygraph test administered by the Korean Prosecutors Office for crime investigations customarily uses the score of -12 as the cutoff point separating the subjects who lie from those who tell the truth. The criterion used by the KPO is different from the one (-13) suggested by Backster (1963) who invented the particular method for lie detection. Based on the signal detection theory applied to the real polygraph test data obtained from real crime suspects by the KPO, the present study identified the score of -8 as an optimal criterion resulting in the highest overall accuracy of the polygraph test. The classification of the subjects with the score of -8 as the criterion resulted in the highest accuracy (83.17%) compared with the accuracies of classifications with the Backster's criterion (76.24%) and the KPO's criterion (80.20%). However, the new criterion was also found to result in more false-positive cases. Based on the results from the present study, it was recommended to use the score of -8 as the criterion when the overall accuracy is important but the score of -12 or -13 when avoiding false-positive is more important than securing the overall accuracy.

  • PDF

사이버물리시스템 응용사례: 지능형 원격심전도 모니터링

  • Park, Ju-Yeong;Lee, Gu-Yeon;Gang, Gyeong-Tae
    • Information and Communications Magazine
    • /
    • v.30 no.10
    • /
    • pp.70-78
    • /
    • 2013
  • 최근 고령화 사회로 진입함에 따라 건강 상태 상시 모니터링에 대한 관심이 높아졌으며, 이에 편승하여 부정맥을 탐지하는 기법에 대한 연구도 활발히 진행되고 있다. 원격심전도 모니터링을 통해 병원 방문 없이도 진료 및 진단이 가능해 질 것으로 예측된다. 이러한 원격심전도 모니터링은 사이버물리시스템의 대표적인 응용사례에 해당된다. 본 고를 통해 우리는 원격심전도 모니터링 응용 사례를 물리시스템과 사이버시스템의 상호작용 관점에서 살펴보고, 이를 통하여 효율적인 시스템 설계 방안에 대하여 논한다.

Automatic Premature Ventricular Contraction Detection Using NEWFM (NEWFM을 이용한 자동 조기심실수축 탐지)

  • Lim Joon-Shik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.378-382
    • /
    • 2006
  • This paper presents an approach to detect premature ventricular contractions(PVC) using the neural network with weighted fuzzy membership functions(NEWFM). NEWFM classifies normal and PVC beats by the trained weighted fuzzy membership functions using wavelet transformed coefficients extracted from the MIT-BIH PVC database. The two most important coefficients are selected by the non-overlap area distribution measurement method to minimize the classification rules that show PVC classification rate of 99.90%. By Presenting locations of the extracted two coefficients based on the R wave location, it is shown that PVC can be detected using only information of the two portions.

A Study on Precision Rectification Technique of Multi-scale Satellite Images Data for Change Detection (변화탐지를 위한 인공위성영상자료의 정밀보정에 관한 연구)

  • 윤희천;이성순
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.1
    • /
    • pp.81-90
    • /
    • 2004
  • Because satellite images include geometry distortions according to photographing conditions and sensor property, and their spatial and radiational resolution and spectrum resolution are different, it is so difficult to make a precise results of analysis. For comparing more than two images, the precise geometric corrections should be preceded because it necessary to eliminate systematic errors due to basic sensor information difference and non-systematic errors due to topographical undulations. In this study, we did sensor modeling using satellite sensor information to make a basic map of change detection for artificial topography. We eliminated the systematic errors which can be occurred in photographing conditions using GCP and DEM data. The Kompsat EOC images relief could be reduced by precise rectification method. Classifying images which was used for change detections by city and forest zone, the accuracy of the matching results are increased by 10% and the positioning accuracies also increased. The result of change detection using basic map could be used for basic data fur GIS application and topographical renovation.

A Method for Quantifying the Risk of Network Port Scan (네트워크 포트스캔의 위험에 대한 정량화 방법)

  • Park, Seongchul;Kim, Juntae
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.91-102
    • /
    • 2012
  • Network port scan attack is the method for finding ports opening in a local network. Most existing IDSs(intrusion detection system) record the number of packets sent to a system per unit time. If port scan count from a source IP address is higher than certain threshold, it is regarded as a port scan attack. The degree of risk about source IP address performing network port scan attack depends on attack count recorded by IDS. However, the measurement of risk based on the attack count may reduce port scan detection rates due to the increased false negative for slow port scan. This paper proposes a method of summarizing 4 types of information to differentiate network port scan attack more precisely and comprehensively. To integrate the riskiness, we present a risk index that quantifies the risk of port scan attack by using PCA. The proposed detection method using risk index shows superior performance than Snort for the detection of network port scan.

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

The analysis of the detection probability of FMCW radar and implementation of signal processing part (차량용 FMCW 레이더의 탐지 성능 분석 및 신호처리부 개발)

  • Kim, Sang-Dong;Hyun, Eu-Gin;Lee, Jong-Hun;Choi, Jun-Hyeok;Park, Jung-Ho;Park, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2628-2635
    • /
    • 2010
  • This paper analyzes the detection probability of FMCW (Frequency Modulated Continuous Wave) radar based on Doppler frequency and analog-digital converter bit and designs and implements signal processing part of FMCW radar. For performance evaluation, the FMCW radar system consists of a transmitted part and a received part and uses AWGN channel. The system model is verified through analysis and simulation. Frequency offset occurs in the received part caused by the mismatching between the received signal and the reference signal. In case of Doppler frequency less than about 38KHz, performance degradation of detection does not occur in FMCW radar with 75cm resolution The analog-digital converter needs at least 6 bit in order not to degrade the detection probability. And, we design and implement digital signal processing part based on DDS chip of digital transmitted signal generator for FMCW radar.

Application of Symbolic Representation Method for Fault Detection and Clustering in Semiconductor Fabrication Processes (반도체공정 이상탐지 및 클러스터링을 위한 심볼릭 표현법의 적용)

  • Loh, Woong-Kee;Hong, Sang-Jeen
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.806-818
    • /
    • 2009
  • Since the invention of the integrated circuit (IC) in 1950s, semiconductor technology has undergone dramatic development up to these days. A complete semiconductor is manufactured through a diversity of processes. For better semiconductor productivity, fault detection and classification (FDC) has been rigorously studied for finding faults even before the processes are completed. For FDC, various kinds of sensors are attached in many semiconductor manufacturing devices, and sensor values are collected in a periodic manner. The collection of sensor values consists of sequences of real numbers, and hence is regarded as a kind of time-series data. In this paper, we propose an algorithm for detecting and clustering faults in semiconductor processes. The proposed algorithm is a modification of the existing anomaly detection algorithm dealing with symbolically-represented time-series. The contributions of this paper are: (1) showing that a modification of the existing anomaly detection algorithm dealing with general time-series could be used for semiconductor process data and (2) presenting experimental results for improving correctness of fault detection and clustering. As a result of our experiment, the proposed algorithm caused neither false positive nor false negative.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.