• Title/Summary/Keyword: False

Search Result 3,153, Processing Time 0.027 seconds

Design of T-N2SCD Detection Model based on Time Window (타임 윈도우 기반의 T-N2SCD 탐지 모델 구현)

  • Shin, Mi-Yea;Won, Il-Young;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2341-2348
    • /
    • 2009
  • An intrusion detection technique based on host consider system call sequence or system call arguments. These two ways are suitable when system call sequence or order and length of system call arguments are out of order. However, there are two disadvantages which a false positive rate and a false negative rate are high. In this paper we propose the T-N2SCD detection model based on Time Window in order to reduce false positive rate and false negative rate. Data for using this experiment is provided from DARPA. As experimental results, the proposed model showed that the false positive rate and the false negative rate are lowest at an interval of 1000ms than at different intervals.

Thermal Imaging Fire Detection Algorithm with Minimal False Detection

  • Jeong, Soo-Young;Kim, Won-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2156-2170
    • /
    • 2020
  • This paper presents a fire detection algorithm with a minimal false detection rate, intended for a thermal imaging surveillance environment, whose properties vary depending on temporal conditions of day or night and environmental changes. This algorithm was designed to minimize the false detection alarm rate while ensuring a high detection rate, as required in fire detection applications. It was necessary to reduce false fire detections due to non-flame elements occurring when existing fixed threshold-based fire detection methods were applied. To this end, adaptive flame thresholds that varied depending on the characteristics of input images, as well as the center of gravity of the heat-source and hot-source regions, were analyzed in an attempt to minimize such non-flame elements in the phase of selecting flame candidate blocks. Also, to remove any false detection elements caused by camera shaking, one of the most frequently raised issues at outdoor sites, preliminary decision thresholds were adaptively set to the motion pixel ratio of input images to maximize the accuracy of the preliminary decision. Finally, in addition to the preliminary decision results, the texture correlation and intensity of the flame candidate blocks were averaged for a specific period of time and tested for their conformity with the fire decision conditions before making the final decision. To verify the fire detection performance of the proposed algorithm, a total of ten test videos were subjected to computer simulation. As a result, the fire detection accuracy of the proposed algorithm was determined to be 94.24%, with minimum false detection, demonstrating its improved performance and practicality compared to previous fixed threshold-based algorithms.

A Detection Mechanism of Portscan Attacks based on Fuzzy Logic for an Abnormal Traffic Control Framework (비정상 트래픽 제어 프레임워크를 위한 퍼지로직 기반의 포트스캔 공격 탐지기법)

  • Kim, Jae-Kwang;Kim, Ka-Eul;Ko, Kwang-Sun;Kang, Yong-Hyeog;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1185-1188
    • /
    • 2005
  • 비정상 행위에 대한 true/false 방식의 공격 탐지 및 대응방법은 높은 오탐지율(false-positive)을 나타내기 때문에 이를 대체할 새로운 공격 탐지방법과 공격 대응방법이 연구되고 있다. 대표적인 연구로는 트래픽 제어 기술을 이용한 단계적 대응방법으로, 이 기술은 비정상 트래픽에 대해 단계적으로 대응함으로써 공격의 오탐지로 인하여 정상 서비스를 이용하는 트래픽이 차단되지 않도록 하는 기술이다. 비정상 트래픽 중 포트스캔 공격은 네트워크 기반 공격을 위해 공격대상 호스트의 서비스 포트를 찾아내는 공격으로 이 공격을 탐지하기 위해서는 일정 시간동안 특정 호스트의 특정 포트에 보내지는 패킷 수를 모니터링 하여 임계치와 비교하는 방식의 true/false 방식의 공격 탐지방법이 주로 사용되었다. 비정상 트래픽 제어 프레임워크(Abnormal Traffic Control Framework)는 true/false 방식의 공격 탐지방법을 이용하여 공격이 탐지되었을 때, 처음에는 트래픽 제어로 대응하고 같은 공격이 재차 탐지되었을때, 차단하여 기존의 true-false 방식의 공격 탐지 및 대응방법이 가지는 높은 오탐지율을 낮춘다. 하지만 포트스캔 공격의 특성상, 공격이 탐지된 후 바로 차단하지 못하였을 경우, 이미 공격자가 원하는 모든 정보를 유출하게 되는 문제가 있다. 본 논문에서는 기존의 True/False 방식의 포트스캔 공격 탐지방법에 퍼지 로직 개념을 추가하여 공격 탐지의 정확성을 높이고 기존의 탐지방법을 이용하였을 때보다 신속한 트래픽 제어 및 차단을 할 수 있는 방법을 제안한다.

  • PDF

Improvement of Domain-specific Keyword Spotting Performance Using Hybrid Confidence Measure (하이브리드 신뢰도를 이용한 제한 영역 핵심어 검출 성능향상)

  • 이경록;서현철;최승호;최승호;김진영
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.7
    • /
    • pp.632-640
    • /
    • 2002
  • In this paper, we proposed ACM (Anti-filler confidence measure) to compensate shortcoming of conventional RLJ-CM (RLJ-CM) and NCM (normalized CM), and integrated proposed ACM and conventional NCM using HCM (hybrid CM). Proposed ACM analyzes that FA (false acceptance) happens by the construction method of anti-phone model, and presumed phoneme sequence in actuality using phoneme recognizer to compensate this. We defined this as anti-phone model and used in confidence measure calculation. Analyzing feature of two confidences measure, conventional NCM shows good performance to FR (false rejection) and proposed ACM shows good performance in FA. This shows that feature of each other are complementary. Use these feature, we integrated two confidence measures using weighting vector α And defined this as HCM. In MDR (missed detection rate) 10% neighborhood, HCM is 0.219 FA/KW/HR (false alarm/keyword/hour). This is that Performance improves 22% than used conventional NCM individually.

A CASE OF FALSE ALLEGATION OF CHILD SEXUAL ABUSE (위(僞) 소아성학대 보고 1예)

  • Choi, Bo-Moon
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.5 no.1
    • /
    • pp.194-200
    • /
    • 1994
  • When children exhibit unusually intense or persistent sexual interests or behavior, this is an indication that they have been exposed to more than the expectable amount of sexual experience, Although sexualized behavior and/or statement is a symptom of sexual abuse, it is not necessarily an indication of sexual abuse. The possibility of false allegation needs to be considered, particularly if allegations are coming from the parent rather than a child, if parents are engaged in dispute over custody or visitation, and/or if the child is a preschooler. False allegations may arise in other situations as well, such as the misinterpretation of a child's statement or behavior by relative or caretakers. And children may make false statement in psychiatric evaluations. A case of false allegation of sexual abuse made by mentally retarded 10 year-old girl who has been located in an institute is presented. During her evaluation process, it was clinician's diagnostic impression that she had no been sexually abused but sexually stimulated in some way, and most of what she said was a fantasy lie. Its pathological mechanism is discussed in terms of pseudologia fantastica along with the review of literatures.

  • PDF

Reduction of Dynamic False Contours based on Gray Level Selection method in PDP (계조 수 감소를 이용한 PDP내에서 의사 윤곽 제거 기법)

  • Ahn Sang-Jun;Eo Yoon-Phil;Lee Sang-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.716-725
    • /
    • 2005
  • In this paper, we propose a new approach for the reduction of the dynamic false contours, which detects and compensates false contour artifacts adaptively. First, we develop a simple but effective method to select the pixels that are likely to cause the motion artifacts, based on the distribution of pixel values. Then, we merge the selected pixels into several regions using tree structure. Next, we reduce number of gray levels within the regions slightly to reduce the false contours. Note that reducing number of gray levels yield the distortion, thus it is applied only to the selected regions, instead of the whole picture. Intensive simulations on real moving image show that the proposed algorithm alleviates the dynamic false contours effectively with tolerable computational complexity.

Comparison and analysis of multiple testing methods for microarray gene expression data (유전자 발현 데이터에 대한 다중검정법 비교 및 분석)

  • Seo, Sumin;Kim, Tae Houn;Kim, Jaehee
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.5
    • /
    • pp.971-986
    • /
    • 2014
  • When thousands of hypotheses are tested simultaneously, the probability of rejecting any true hypotheses increases, and large multiplicity problems are generated. To solve these problems, researchers have proposed different approaches to multiple testing methods, considering family-wise error rate (FWER), false discovery rate (FDR) or false nondiscovery rate (FNR) as a type I error and some test statistics. In this article, we discuss Bonferroni (1960), Holm (1979), Benjamini and Hochberg (1995) and Benjamini and Yekutieli (2001) procedures based on T statistics, modified T statistics or local-pooled-error (LPE) statistics. We also consider Sun and Cai (2007) procedure based on Z statistics. These procedures are compared in the simulation and applied to Arabidopsis microarray gene expression data to identify differentially expressed genes.

Ultrasonographic Measurement of the Ligamentum Flavum Depth : Is It a Reliable Method to Distinguish True and False Loss of Resistance?

  • Pak, Michael Hae-Jin;Lee, Won-Hyung;Ko, Young-Kwon;So, Sang-Young;Kim, Hyun-Joong
    • The Korean Journal of Pain
    • /
    • v.25 no.2
    • /
    • pp.99-104
    • /
    • 2012
  • Background: Previous studies have shown that if performed without radiographic guidance, the loss of resistance (LOR) technique can result in inaccurate needle placement in up to 30% of lumbar epidural blocks. To date, no study has shown the efficacy of measuring the depth of the posterior complex (ligamentum flavum, epidural space, and posterior dura) ultrasonographically to distinguish true and false LOR. Methods: 40 cervical epidural blocks were performed using the LOR technique and confirmed by epidurograms. Transverse ultrasound images of the C6/7 area were taken before each cervical epidural block, and the distances from the skin to the posterior complex, transverse process, and supraspinous ligament were measured on each ultrasound view. The number of LOR attempts was counted, and the depth of each LOR was measured with a standard ruler. Correlation of false and true positive LOR depth with ultrasonographically measured depth was also statistically analyzed. Results: 76.5% of all cases (26 out of 34) showed false positive LOR. Concordance correlation coefficients between the measured distances on ultrasound (skin to ligamentum flavum) and actual needle depth were 0.8285 on true LOR. Depth of the true positive LOR correlated with height and weight, with a mean of $5.64{\pm}1.06cm$, while the mean depth of the false positive LOR was $4.08{\pm}1.00cm$. Conclusions: Ultrasonographic measurement of the ligamentum flavum depth (or posterior complex) preceding cervical epidural block is beneficial in excluding false LOR and increasing success rates of cervical epidural blocks.

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

Evaluation of Usefulness for Diagnosis of Lung Cancer on Integrated PET-MRI Using Decision Matrix (판정행렬을 기반한 일체형 PET-MRI의 폐암 진단 유용성 평가)

  • Kim, Jung-Soo;Yang, Hyun-Jin;Kim, Yoo-Mi;Kwon, Hyeong-Jin;Park, Chanrok
    • Journal of radiological science and technology
    • /
    • v.44 no.6
    • /
    • pp.635-643
    • /
    • 2021
  • The results of empirical researches on the diagnosis of lung cancer are insufficient, so it is limited to objectively judge the clinical possibility and utilization according to the accuracy of diagnosis. Thus, this study retrospectively analyzed the lung cancer diagnostic performance of PET-MRI (Positron Emission Tomography-Magnetic Resonance Imaging) by using the decision matrix. This study selected and experimented total 165 patients who received both hematological CEA (Carcinoembryonic Antigen) test and hybrid PET-MRI (18F-FDG, 5.18 MBq/kg / Body TIM coil. VIVE-Dixon). After setting up the result of CEA (positive:>4 ㎍/ℓ. negative:<2.5㎍/ℓ) as golden data, the lung cancer was found in the image of PET-MRI, and then the SUVmax (positive:>4, negative:<1.5) was measured, and then evaluated the correlation and significance of results of relative diagnostic performance of PET-MRI compared to CEA through the statistical verification (t-test, P>0.05). Through this, the PET-MRI was analyzed as 96.29% of sensitivity, 95.23% of specificity, 3.70% of false negative rate, 4.76% of false positive rate, and 95.75% of accuracy. The false negative rate was 1.06% lower than the false positive rate. The PET-MRI that significant accuracy of diagnosis through high sensitivity and specificity, and low false negative rate and false positive rate of lung cancer, could acquire the fusion image of specialized soft tissue by combining the radio-pharmaceuticals with various sequences, so its clinical value and usefulness are regarded as latently sufficient.