• Title/Summary/Keyword: False

Search Result 3,136, Processing Time 0.034 seconds

A Quantitative Measure in Uniform Color Space for Dynamic False Contours on PDP

  • Park, Seung-Ho;Kim, Choon-Woo
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.617-620
    • /
    • 2002
  • Quantitative analysis of dynamic false contours on PDP is essential to evaluate the performance of algorithms for false contour reduction. It also serves as an optimization criterion for selecting the subfield pattern. In this paper, a color difference in uniform color space is defined as a new measure for dynamic false contours. Unlike the measures in previous works, it accounts for the channel dependencies among the RGB color channels.

  • PDF

Effects of False Seedbed on the Preventative Weed Control in Organic Rice Paddy Field (유기재배 논에서의 예방적 잡초방제를 위한 가묘상 처리 효과)

  • Lee, Byung-Mo;Jee, Hyeong-Jin;Cho, Jeong-Rae;An, Nan-Hee;Ok, Jung-Hun;Jeong, Ji-Hee
    • Weed & Turfgrass Science
    • /
    • v.2 no.4
    • /
    • pp.358-361
    • /
    • 2013
  • This study was conducted to determine the weed control effect of false seedbed in organic rice paddy field. False seedbed is one of the preventative weed control method, especially effective in upland vegetable field. False seedbed frequency and methods were examined by varying the processing time in greenhouse and field condition in 2012 and 2013. In greenhouse experiment, shallow recultivation and harrow surface soil was effective to control weed up to 70%. Optimal processing time of false seedbed was when the weed was two or three leaf stages. Under field condition, one-time treatment of false seedbed was 61% of weed suppression rate and two-times of false seedbed treatment was 79% of weed suppression rate. Monochoria vaginalis was still troublesome weed after false seedbed treatment, but the occurrence of Echinochloa oryzoides was decreased after false seedbed treament. Results indicated that false seedbed treatment was very effective to lower early weed occurrence in rice paddy field especially Echinochloa spp. Weed control efficiency of shallow recultivation by weeder hollow and rotary tillage by tractor were 68%, 13% respectively.

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.

A Study of Usefulness of Fine Needle Aspiration Cytology of the Thyroid Lesions (갑상선 병변의 세침흡인 세포검사의 유용성에 관한 연구)

  • Kwon, Kye-Hyun;Jin, So-Young;Lee, Dong-Wha
    • The Korean Journal of Cytopathology
    • /
    • v.7 no.2
    • /
    • pp.111-121
    • /
    • 1996
  • Fine needle aspiration cytology(FNAC) is preferred because of simplicity, safety, and reliability in the evaluation of patients with thyroid nodule or hyperplasia. However, there are a few limitations such as false-negative or false-positive cases and non-diagnostic material. To evaluate the usefulness of FNAC in thyroid lesions, we reviewed 704 FNAC cases of thyroid nodules from 1988 to 1994 at Soonchunhyang University Hospital. The results are as follows. 1. Among 704 FNAC cases of thyroid gland, 571(81.1%) cases were benign, 12(1.7%) were suspicious, 71(10.1%) were malignancy, and 50(7.1%) were material insufficiency. The cytologic diagnoses of the benign lesions included 168 cases of follicular neoplasm, 139 cases of adenomatous goiter, 162 cases of follicular lesion such as follicular neoplasm or adenomatous goiter, 61 cases of Hashimoto's thyroiditis, 13 cases of subacute thyroiditis, and 28 cases of colloidal nodule or benign nodule. The malignant lesions included 68 cases of papillary carcinona, two medullary carcinomas and a case of metastatic colon cancer. 2. The average number of cytologic smear slides was $4.12{\pm}1.81$ in material insufficiency and $5.63{\pm}1.79$ in diagnostic cases. This difference was statistically significant(p<0.00001). 3. Histological assessment of 150 cases revealed 2 false negative and 1 false positive cases. The false negative cases were a case of marked sclerosis in papillary carcinoma and an occult case of papillary carcinoma. The false positive case resulted from pseudo-ground glass nuclei due to marked dry artifact. 4. Comparison between the FNAC and the histologic diagnosis revealed that FNAC had a sensitivity of 93.5%, a specificity of 99.2%, a false negative rate of 6.6%, a false positive rate of 0.8%, and an overall diagnostic accuracy of 98.0%. Therefore, FNAC of thyroid gland is a very reliable diagnostic method with excellent accuracy rate.

  • PDF

A Combination of Signature-based IDS and Machine Learning-based IDS using Alpha-cut and Beta pick (Alpha-cut과 Beta-pick를 이용한 시그너쳐 기반 침입탐지 시스템과 기계학습 기반 침입탐지 시스템의 결합)

  • Weon, Ill-Young;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.609-616
    • /
    • 2005
  • Signature-based Intrusion Detection has many false positive and many difficulties to detect new and changed attacks. Alpha-cut is introduced which reduces false positive with a combination of signature-based IDS and machine learning-based IDS in prior paper [1]. This research is a study of a succession of Alpha-cut, and we introduce Beta-rick in which attacks can be detected but cannot be detected in single signature-based detection. Alpha-cut is a way of increasing detection accuracy for the signature based IDS, Beta-pick is a way which decreases the case of treating attack as normality. For Alpha-cut and Beta-pick we use XIBL as a learning algorithm and also show the difference of result of Sd.5. To describe the value of proposed method we apply Alpha-cut and Beta-pick to signature-based IDS and show the decrease of false alarms.

Classification of False Alarms based on the Decision Tree for Improving the Performance of Intrusion Detection Systems (침입탐지시스템의 성능향상을 위한 결정트리 기반 오경보 분류)

  • Shin, Moon-Sun;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.473-482
    • /
    • 2007
  • Network-based IDS(Intrusion Detection System) gathers network packet data and analyzes them into attack or normal. They raise alarm when possible intrusion happens. But they often output a large amount of low-level of incomplete alert information. Consequently, a large amount of incomplete alert information that can be unmanageable and also be mixed with false alerts can prevent intrusion response systems and security administrator from adequately understanding and analyzing the state of network security, and initiating appropriate response in a timely fashion. So it is important for the security administrator to reduce the redundancy of alerts, integrate and correlate security alerts, construct attack scenarios and present high-level aggregated information. False alarm rate is the ratio between the number of normal connections that are incorrectly misclassified as attacks and the total number of normal connections. In this paper we propose a false alarm classification model to reduce the false alarm rate using classification analysis of data mining techniques. The proposed model can classify the alarms from the intrusion detection systems into false alert or true attack. Our approach is useful to reduce false alerts and to improve the detection rate of network-based intrusion detection systems.

A Fuzzy Logic-Based False Report Detection Method in Wireless Sensor Networks (무선 센서 네트워크에서 퍼지 로직 기반의 허위 보고서 탐지 기법)

  • Kim, Mun-Su;Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.27-34
    • /
    • 2008
  • Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in the sensor network without adequate protection may be compromised by adversaries. Such compromised nodes are vulnerable to the attacks like false reports injection attacks and false data injection attacks on legitimate reports. In false report injection attacks, an adversary injects false report into the network with the goal of deceiving the sink or the depletion of the finite amount of energy in a battery powered network. In false data injection attacks on legitimate reports, the attacker may inject a false data for every legitimate report. To address such attacks, the probabilistic voting-based filtering scheme (PVFS) has been proposed by Li and Wu. However, each cluster head in PVFS needs additional transmission device. Therefore, this paper proposes a fuzzy logic-based false report detection method (FRD) to mitigate the threat of these attacks. FRD employs the statistical en-route filtering scheme as a basis and improves upon it. We demonstrate that FRD is efficient with respect to the security it provides, and allows a tradeoff between security and energy consumption, as shown in the simulation.

  • PDF

An Automatic Portscan Detection System with Adaptive Threshold Setting

  • Kim, Sang-Kon;Lee, Seung-Ho;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.74-85
    • /
    • 2010
  • For the purpose of compromising hosts, attackers including infected hosts initially perform a portscan using IP addresses in order to find vulnerable hosts. Considerable research related to portscan detection has been done and many algorithms have been proposed and implemented in the network intrusion detection system (NIDS). In order to distinguish portscanners from remote hosts, most portscan detection algorithms use a fixed threshold that is manually managed by the network manager. Because the threshold is a constant, even though the network environment or the characteristics of traffic can change, many false positives and false negatives are generated by NIDS. This reduces the efficiency of NIDS and imposes a high processing burden on a network management system (NMS). In this paper, in order to address this problem, we propose an automatic portscan detection system using an fast increase slow decrease (FISD) scheme, that will automatically and adaptively set the threshold based on statistical data for traffic during prior time periods. In particular, we focus on reducing false positives rather than false negatives, while the threshold is adaptively set within a range between minimum and maximum values. We also propose a new portscan detection algorithm, rate of increase in the number of failed connection request (RINF), which is much more suitable for our system and shows better performance than other existing algorithms. In terms of the implementation, we compare our scheme with other two simple threshold estimation methods for an adaptive threshold setting scheme. Also, we compare our detection algorithm with other three existing approaches for portscan detection using a real traffic trace. In summary, we show that FISD results in less false positives than other schemes and RINF can fast and accurately detect portscanners. We also show that the proposed system, including our scheme and algorithm, provides good performance in terms of the rate of false positives.

Identifying the Difference between Actual Reporting Voices and False Reporting Voices for Development of the False Report Discrimination System (허위 신고 판별 시스템 개발을 위한 실제 신고 음성과 허위 신고 음성의 차이 규명)

  • Lee, Bum Joo;Cho, Dong Uk;Park, Young;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.848-854
    • /
    • 2017
  • Recently, false reports to governmental offices such as police stations have not been decreased. As a result, if a violent crime or a fire occurs that needs to be promptly responded to and reacted to these accidents in real time, it may lead to serious results such as loss of life. Also, the waste of police enforcement and administration due to false reporting can cause serious problems. In this paper, we try to clarify the difference between the actual and false reports based on the actual sound sources which were reported to the police stations. In addition, we will intend to develop a false report discrimination system that can identifies false reports and actual reports based on this.

Government Public Relations Practitioners' Perceptions toward Media Relations and False Reports: A comparative Study between the Noh Moo Hyun and Lee Myung Bak Governments (정부 홍보담당자들의 언론 관계와 오보에 대한 인식 조사: 노무현 정부와 이명박 정부 홍보담당자 비교 연구)

  • Lim, Yu-Jin;Kim, Yung-Wook
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.119-139
    • /
    • 2011
  • This study investigated the general perception of government public relations practitioners in the Noh Moo Hyun and Lee Myung Bak administrations toward media relations and false reports. It examined whether these government public relations practitioners' perceptions are different according to changing government public relations circumstances. This study also investigated how the perceptions of public relations practitioners toward media relations in two different governments affect the overall perception toward false reports. The results showed that the two groups had different perspectives toward media relations, false reports and the causes of false reports. Moreover, the perspectives toward media relations influenced their opinions about false reports. However, they had similar opinions about the way of preventing false reports.

  • PDF