• Title/Summary/Keyword: False alarm selection

Search Result 17, Processing Time 0.021 seconds

Performance Analysis of Spectrum Sensing using CSI with False Alarm Selection (채널상태정보에 따른 False alarm 선택 스펙트럼 센싱 성능 분석)

  • Lee, Mi Sun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.4
    • /
    • pp.1-5
    • /
    • 2013
  • CR(Cognitive Radio) technology is maximized frequency reuse using unused frequency band. Conventional cooperative spectrum sensing has fixed false alarms. so all cooperative user has equal threshold. This problem is caused degradation of detection probability. so we propose and analysis the system model that false alarm differential setting through CSI(channel state information) for resonable threshold. Simulation results show improvement of detection probability.

Design and development of enhanced criticality alarm system for nuclear applications

  • Srinivas Reddy, Padi;Kumar, R. Amudhu Ramesh;Mathews, M. Geo;Amarendra, G.
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.690-697
    • /
    • 2018
  • Criticality alarm systems (CASs) are mandatory in nuclear plants for prompt alarm in the event of any criticality incident. False criticality alarms are not desirable as they create a panic environment for radiation workers. The present article describes the design enhancement of the CAS at each stage and provides maximum availability, preventing false criticality alarms. The failure mode and effect analysis are carried out on each element of a CAS. Based on the analysis, additional hardware circuits are developed for early fault detection. Two different methods are developed, one method for channel loop functionality test and another method for dose alarm test using electronic transient pulse. The design enhancement made for the external systems that are integrated with a CAS includes the power supply, criticality evacuation hooter circuit, radiation data acquisition system along with selection of different soft alarm set points, and centralized electronic test facility. The CAS incorporating all improvements are assembled, installed, tested, and validated along with rigorous surveillance procedures in a nuclear plant for a period of 18,000 h.

Closely Spaced Target Detection using Intensity Sorting-based Context Awareness

  • Kim, Sungho;Won, Jin-Ju
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.6
    • /
    • pp.1839-1845
    • /
    • 2016
  • Detecting remote targets is important to active protection system (APS) or infrared search and track (IRST) applications. In normal situation, the well-known constant false alarm rate (CFAR) detector works properly. However, decoys in APS or closely spaced targets in IRST degrade the detection capability by increasing background noise level in the CFAR detector. This paper presents a context aware CFAR detector by the intensity sorting and selection of background region to reduce the effect of neighboring targets that lead to incorrect estimation of background statistics. The existence of neighboring targets can be recognized by intensity sorting where neighboring targets usually show highest ranks. The proposed background statistics (mean, standard deviation) estimation method from median local pixels can be aware of the background context and reduce the effects of the neighboring targets, which increase the signal-to-clutter ratio. The experimental results on the synthetic APS sequence, real adjacent target sequence, and remote pedestrian sequence validated that the proposed method produced an enhanced detection rate with the same false alarm rate compared with the hysteresis-CFAR (H-CFAR) detection.

TOA Estimation Technique for IR-UWB Based on Homogeneity Test

  • Djeddou, Mustapha;Zeher, Hichem;Nekachtali, Younes;Drouiche, Karim
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.757-766
    • /
    • 2013
  • This paper deals with the estimation of the time of arrival (TOA) of ultra-wideband signals under IEEE 802.15.4a channel models. The proposed approach is based on a randomness test and consists of determining whether an autoregressive (AR) process modeling an energy frame is random or not by using a distance to measure the randomness. The proposed method uses a threshold that is derived analytically according to a preset false alarm probability. To highlight the effectiveness of the developed approach, simulation setups as well as real data experiments are conducted to assess the performance of the new TOA estimation algorithm. Thereby, the proposed method is compared with the cell averaging constant false alarm rate technique, the threshold comparison algorithm, and the technique based on maximum energy selection with search back. The obtained results are promising, considering both simulations and collected real-life data.

Development of a Target Detection Algorithm using Spectral Pattern Observed from Hyperspectral Imagery (초분광영상의 분광반사 패턴을 이용한 표적탐지 알고리즘 개발)

  • Shin, Jung-Il;Lee, Kyu-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1073-1080
    • /
    • 2011
  • In this study, a target detection algorithm was proposed for using hyperspectral imagery. The proposed algorithm is designed to have minimal processing time, low false alarm rate, and flexible threshold selection. The target detection procedure can be divided into two steps. Initially, candidates of target pixel are extracted using matching ratio of spectral pattern that can be calculated by spectral derivation. Secondly, spectral distance is computed only for those candidates using Euclidean distance. The proposed two-step method showed lower false alarm rate than the Euclidean distance detector applied over the whole image. It also showed much lower processing time as compared to the Mahalanobis distance detector.

Optimum Selection of Equalizer Taps Losing Noise Power Estimation (잡음 전력 추정을 이용한 등화기 탭의 최적 선택 방법)

  • 성원진;신동준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.1971-1977
    • /
    • 2001
  • Multipath Rayleigh fading channels for mobile radio transmission can be represented by the linear filter model, and depending on the delay path characteristics, only a selected number of taps may have significance in the receiver structure design. By using tap-selective equalization, reduction in both processing complexity and power consumption can be obtained. In this paper, we present an optimal tap selection method for a given channel model, and demonstrate the performance improvement over an existing method. We show the method performs the CFAR (Constant False Alarm Rate) detection when the noise power information is available, and derive exact expressions of the error probability for the case of noise power estimation. Using the derived formulas and simulation results, it is demonstrated that the error probability quickly approaches to the optimal performance as the number samples used for the noise power estimation increases.

  • PDF

A Study on the Causes of False Alarm by NFPA921 in Semiconductor Factory (반도체공장의 NFPA921에 의한 비화재보 원인조사 방안)

  • Sang-Hyuk Hong;Ha-Sung Kong
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.4
    • /
    • pp.87-94
    • /
    • 2023
  • This study analyzed and identified various causes of caustic alarms of 163 fire detectors that occurred from January 2019 to December 2021 at domestic semiconductor manufacturing plants equipped with about 30,000 fire detectors, and proposed a new non-fire prevention cause investigation plan by applying the NFPA 921 scientific methodology. The results of the study are as follows. First, in terms of necessary recognition and problem definition, an analog detector and an integrated monitoring system were proposed to quickly determine the location and installation space information of the fire detector. Second, in order to prevent speculative causes and errors in various analyses in terms of data analysis and hypothesis establishment, non-fire reports were classified into five by factor and defined, and the causes of occurrence by factor were classified and proposed. Finally, in terms of hypothesis verification and final hypothesis selection, a non-fire prevention improvement termination process and a final hypothesis verification sheet were proposed to prevent the cause from causing re-error.

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

The Secure Path Cycle Selection Method for Improving Energy Efficiency in Statistical En-route Filtering Based WSNs (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율을 향상시키기 위한 보안 경로 주기 선택 기법)

  • Nam, Su-Man;Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2011
  • Sensor nodes are easily exposed to malicious attackers by physical attacks. The attacker can generate various attacks using compromised nodes in a sensor network. The false report generating application layers injects the network by the compromised node. If a base station has the injected false report, a false alarm also occurs and unnecessary energy of the node is used. In order to defend the attack, a statistical en-route filtering method is proposed to filter the false report that goes to the base station as soon as possible. A path renewal method, which improves the method, is proposed to maintain a detection ability of the statistical en-route filtering method and to consume balanced energy of the node. In this paper, we proposed the secure path cycle method to consume effective energy for a path renewal. To select the secure path cycle, the base station determines through hop counts and the quantity of report transmission by an evaluation function. In addition, three methods, which are statistical en-route filter, path selection method, and path renewal method, are evaluated with our proposed method for efficient energy use. Therefore, the proposed method keeps the secure path and makes the efficiency of energy consumption high.