• Title/Summary/Keyword: False Errors

Search Result 123, Processing Time 0.024 seconds

The Development of an Algorithm for the Correction of Errors in the Phase Current of the Protective Relay on Distribution System Interconnected with Distributed Generations (분산전원 연계선로에서 보호계전기의 상전류 오차보정 알고리즘 개발)

  • Shin, Dong-Yeol;Yun, Donghyun;Cha, HanJu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.11
    • /
    • pp.1604-1609
    • /
    • 2013
  • When the ground fault on the power side occurs on distribution system interconnected with distributed generations, the abnormal current is generated in the neutral conductor by the connection type and the iron core structure of transformers for the interconnection of distributed power supplies due to the unbalanced voltage of the system, and subsequently the false operation of the protective relay on the load side occurs. Herein, this paper proposes the method to correct errors in the phase current to prevent the false operation of the protective relay by applying p-q theory and presents the simulation result of the error correction algorithm using PSCAD/EMTDC.

False Belief Understanding and Justification Reasoning according to Information of Reality amongst Children Aged 3, 4 and 5 (현실에 대한 정보가 3, 4, 5세 유아의 틀린 믿음 과제 수행 및 정당화 추론에 미치는 영향)

  • Kim, Yumi;Yi, Soon Hyung
    • Korean Journal of Child Studies
    • /
    • v.36 no.5
    • /
    • pp.135-153
    • /
    • 2015
  • The purpose of this study was to investigate false belief understanding and justification reasoning according to information of reality amongst children aged 3, 4 and 5. Children aged 3 to 5 years (N = 176) participated in this study. Each child was interviewed individually and responded to questions designed to measure his/her false belief understanding. Every child responded to the false belief task under two different information conditions of reality(reality known vs reality unknown). For more specific analysis, children's reasoning responses were also recorded. The major findings of this study are as follows. Children could understand false belief more easily under reality unknown conditions. Specifically, the influences of information conditions were crucial to 3-year-olds but not to 4- and 5-year-olds. Although 3 year olds were able to avoid the systematical errors inherent in the false belief task, they still did not understand the false belief itself. This study provides specific aspects of false belief understanding and its relevance to general changes in cognitive development.

Likelihood Based Confidence Intervals for the Difference of Proportions in Two Doubly Sampled Data with a Common False-Positive Error Rate

  • Lee, Seung-Chun
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.5
    • /
    • pp.679-688
    • /
    • 2010
  • Lee (2010) developed a confidence interval for the difference of binomial proportions in two doubly sampled data subject to false-positive errors. The confidence interval seems to be adequate for a general double sampling model subject to false-positive misclassification. However, in many applications, the false-positive error rates could be the same. On this note, the construction of asymptotic confidence interval is considered when the false-positive error rates are common. The coverage behaviors of nine likelihood based confidence intervals are examined. It is shown that the confidence interval based Rao score with the expected information has good performance in terms of coverage probability and expected width.

An \alpha$-trimmed mean orientation extraction algorithm which is robust to scarred fingerprint (손상된 지문에 강건한 \alpha$-trimmed mean 방향성 추출 알고리즘)

  • 신종욱;윤병우;송종관
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.854-860
    • /
    • 2004
  • The result of fingerprint matching is different as the quality or the state of input fingerprint image. We can extract the false direction information when the quality of fingerprint is degraded by the noise or the scars of the ridges. The information of the direction is very important for the elimination of the false minutia, the measurement of the ridge distance, matching, finding of cores and deltas. We need the method which can compensate or correct the false information of directions because the false directions include serious errors in the fingerprint recognition. We propose a method which can compensate or correct the false direction of fingerprint with a \alpha$-trimmed mean filter followed by LPF to reconstruct the false direction information when fingerprints are corrupted by scars.

Performance Improvement of Fingerprint Verification using Image Matching (영상정합을 이용한 지문 인증 성능 향상)

  • Chae, Seung-Hoon;Pan, Sung-Bum;Moon, Dae-Sung;Moon, Ki-Young;Chung, Yong-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.53-60
    • /
    • 2008
  • Fingerprint verification method based on minutiae has been widely used for its speed and size stemming from utilizing only a few data, but it is vulnerable to some errors caused by the false minutiae extractions. A number of suggestions have been made to correct these problems. However, because it is very difficult to avoid all the external factors, such as noises that occur when fingerprints are collected, and all the internal factors that occur during the process of them, there is a limit in minimizing errors by improving the whole process. On the other hand, a fingerprint verification method based on images yields fewer errors because it makes direct comparison between images not using minutiae. Image-based fingerprint verification method has its limitations in aligning images with accuracy. Therefore, this paper proposes a new methodology to improve the performance utilizing both image-based and minutiae-based verification methods effectively. As the result of experimenting with both images and minutiae, the false accept rate and the false reject rate have been improved from 2.7% to 0.8% and from 6.5% to 5.5%, respectively.

  • PDF

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

Design and Implementation of Static Program Analyzer Finding All Buffer Overrun Errors in C Programs (C 프로그램의 버퍼 오버런(buffer overrun) 오류를 찾아 주는 정적 분석기의 설계와 구현)

  • Yi Kwang-Keun;Kim Jae-Whang;Jung Yung-Bum
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.5
    • /
    • pp.508-524
    • /
    • 2006
  • We present our experience of combining, in a realistic setting, a static analyzer with a statistical analysis. This combination is in order to reduce the inevitable false alarms from a domain-unaware static analyzer. Our analyzer named Airac(Array Index Range Analyzer for C) collects all the true buffer-overrun points in ANSI C programs. The soundness is maintained, and the analysis' cost-accuracy improvement is achieved by techniques that static analysis community has long accumulated. For still inevitable false alarms (e.g. Airac raised 970 buffer-overrun alarms in commercial C programs of 5.3 million lines and 737 among the 970 alarms were false), which are always apt for particular C programs, we use a statistical post analysis. The statistical analysis, given the analysis results (alarms), sifts out probable false alarms and prioritizes true alarms. It estimates the probability of each alarm being true. The probabilities are used in two ways: 1) only the alarms that have true-alarm probabilities higher than a threshold are reported to the user; 2) the alarms are sorted by the probability before reporting, so that the user can check highly probable errors first. In our experiments with Linux kernel sources, if we set the risk of missing true error is about 3 times greater than false alarming, 74.83% of false alarms could be filtered; only 15.17% of false alarms were mixed up until the user observes 50% of the true alarms.

A Robust Correlation-based Video Tracking (강인한 상관방식 추적기를 이용한 움직이는 물체 추적)

  • Park Dong-Jo;Cho Jae-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.7
    • /
    • pp.587-594
    • /
    • 2005
  • In this paper, a robust correlation-based video tracking is proposed to track a moving object in correlated image sequences. A correlation-based video tracking algorithm seeks to align the incoming target image with the reference target block image, but has critical problems, so called a false-peak problem and a drift phenomenon (correlator walk-off. The false-peak problem is generally caused by highly correlated background pixels with similar intensity of a moving target and the drift phenomenon occurs when tracking errors accumulate from frame to frame because of the nature of the correlation process. At first, the false-peaks problem for the ordinary correlation-based video tracking is investigated using a simple mathematical analysis. And, we will suggest a robust selective-attention correlation measure with a gradient preprocessor combined by a drift removal compensator to overcome the walk-off problem. The drift compensator adaptively controls the template block size according to the target size of interest. The robustness of the proposed method for practical application is demonstrated by simulating two real-image sequences.

A Study on the Fingerprint Verification based on Image (영상 기반 지문인증에 관한 연구)

  • Chae, Seung-Hoon;Pan, Sung-Bum;Moon, Dae-Sung;Moon, Ki-Young;Chung, Yong-Hwa
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.237-238
    • /
    • 2007
  • Fingerprint verification based on minutiae mostly has used because it stores a few data and is good for speed. However personal verification errors are caused by extracted from false minutiae. Therefore, in this paper, we propose a new methodology performing together based on image and minutiae. As the result of performing with image and minutiae, false accept rate and false reject rate are improved.

  • PDF

Interval Estimation of Population Proportion in a Double Sampling Scheme (이중표본에서 모비율의 구간추정)

  • Lee, Seung-Chun;Choi, Byong-Su
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.6
    • /
    • pp.1289-1300
    • /
    • 2009
  • The double sampling scheme is effective in reducing the sampling cost. However, the doubly sampled data is contaminated by two types of error, namely false-positive and false-negative errors. These would make the statistical analysis more difficult, and it would require more sophisticate analysis tools. For instance, the Wald method for the interval estimation of a proportion would not work well. In fact, it is well known that the Wald confidence interval behaves very poorly in many sampling schemes. In this note, the property of the Wald interval is investigated in terms of the coverage probability and the expected width. An alternative confidence interval based on the Agresti-Coull's approach is recommended.