• Title/Summary/Keyword: False target

Search Result 195, Processing Time 0.025 seconds

On using Bayes Risk for Data Association to Improve Single-Target Multi-Sensor Tracking in Clutter (Bayes Risk를 이용한 False Alarm이 존재하는 환경에서의 단일 표적-다중센서 추적 알고리즘)

  • 김경택;최대범;안병하;고한석
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.159-162
    • /
    • 2001
  • In this Paper, a new multi-sensor single-target tracking method in cluttered environment is proposed. Unlike the established methods such as probabilistic data association filter (PDAF), the proposed method intends to reflect the information in detection phase into parameters in tracking so as to reduce uncertainty due to clutter. This is achieved by first modifying the Bayes risk in Bayesian detection criterion to incorporate the likelihood of measurements from multiple sensors. The final estimate is then computed by taking a linear combination of the likelihood and the estimate of measurements. We develop the procedure and discuss the results from representative simulations.

  • PDF

Learning-based Improvement of CFAR Algorithm for Increasing Node-level Event Detection Performance in Acoustic Sensor Networks (음향 센서 네트워크에서의 노드 레벨 이벤트 탐지 성능향상을 위한 학습 기반 CFAR 알고리즘 개선)

  • Kim, Youngsoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.5
    • /
    • pp.243-249
    • /
    • 2020
  • Event detection in wireless sensor networks is a key requirement in many applications. Acoustic sensors are one of the most frequently used sensors for event detection in sensor networks, but they are sensitive and difficult to handle because they vary greatly depending on the environment and target characteristics of the sensor field. In this paper, we propose a learning-based improvement of CFAR algorithm for increasing node-level event detection performance in acoustic sensor networks, and verify the effectiveness of the designed algorithm by comparing and evaluating the event detection performance with other algorithms. Our experimental results demonstrate the superiority of the proposed algorithm by increasing the detection accuracy by more than 45.16% by significantly reducing false positives by 7.97 times while slightly increasing the false negative compared to the existing algorithm.

Optical HPEJTC system for removing false alarm and missing in the multitarget correlation (다중 표적 상관에 기인한 상관오류와 유실 제거를 위한 광 HPEJTC 시스템)

  • 이상이;류충상;김은수
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.3
    • /
    • pp.58-67
    • /
    • 1995
  • In this paper, we present a new HPEJTC system which is capable of real-time multi-target recognition and tracking with better discrimination by extracting the phase signal of reference function from the JTPS of the conventional optical JTC retaining the amplitude signal of the input function. In order to test the correlation discrimination performance of the HPEJTC system, some experiments are carried out on the scenarios susceptible to the false alarms and missing in which many similar targets are periodically loacted. And, the proposed HPEJTC is analyzed to be the real function version of the POF and finally the possibility of the real-time implementation of the POF is suggested, because it can be implemented by using spatial light modulator, CCD detector and some other optical components.

  • PDF

A Study on False Positive Alert reduction using HVIDB of Target Host (HVIDB를 이용한 해당 호스트의 오탐율 경고 발생 감소에 관한 연구)

  • 김태훈;이금석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.481-483
    • /
    • 2004
  • NIDS(Network Intrusion Detection System)는 공격 탐지 과정에서 대량의 로그가 발생하게 되는데 일반적인 침입탐지 시스템에서 탐지되어 하루에 남는 로그만으로도 시스템에 막대한 양을 차지한다 이러한 문제점은 관리자에게 많은 부담을 줄뿐만 아니라 그렇게 남겨진 로그에는 오탐율(False Positive) 비율이 높기 때문에 관리자가 실제로 위협적인 침입을 식별하고, 침입 행위에 대한 빠른 대응을 어렵게 만든다. 그러므로 NIDS와 특정 호스트가 가지고 있는 보안상 취약한 부분을 비교하여 판단할 수 있는 침입탐지시스템을 선택, 운용하는 것은 관리측면이나 대응측면에서 매우 중요한 일이라고 할 수 있다. 본 논문에서는 NIDS와 해당 호스트 취약점 정보를 이용해 작성된 데이터베이스(HVIDB : Host Vulnerability Information Database)를 이용하여 호스트의 취약성에 관한 로그만을 최종 경고해줌으로써 오탐율의 양을 감소시키고 호스트 보안성의 향상과 관리자가 로그분석 등의 IDS 업무를 효과적으로 할 수 있는 모델을 제시한다.

  • PDF

Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System (계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법)

  • DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.239-245
    • /
    • 2023
  • Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can easily bypass the monitoring mechanism and then illegally access files of a target system. It means that whitelist-based ransomware solutions are still vulnerable.

Identification of Caenorhabditis elegans MicroRNA Targets Using a Kernel Method

  • Lee, Wha-Jin;Nam, Jin-Wu;Kim, Sung-Kyu;Zhang, Byoung-Tak
    • Genomics & Informatics
    • /
    • v.3 no.1
    • /
    • pp.15-23
    • /
    • 2005
  • Background MicroRNAs (miRNAs) are a class of noncoding RNAs found in various organisms such as plants and mammals. However, most of the mRNAs regulated by miRNAs are unknown. Furthermore, miRNA targets in genomes cannot be identified by standard sequence comparison since their complementarity to the target sequence is imperfect in general. In this paper, we propose a kernel-based method for the efficient prediction of miRNA targets. To help in distinguishing the false positives from potentially valid targets, we elucidate the features common in experimentally confirmed targets. Results The performance of our prediction method was evaluated by five-fold cross-validation. Our method showed 0.64 and 0.98 in sensitivity and in specificity, respectively. Also, the proposed method reduced the number of false positives by half compared with TargetScan. We investigated the effect of feature sets on the classification of miRNA targets. Finally, we predicted miRNA targets for several miRNAs in the Caenorhabditis elegans (C. elegans) 3' untranslated region (3' UTR) database. Condusions The targets predicted by the suggested method will help in validating more miRNA targets and ultimately in revealing the role of small RNAs in the regulation of genomes. Our algorithm for miRNA target site detection will be able to be improved by additional experimental­knowledge. Also, the increase of the number of confirmed targets is expected to reveal general structural features that can be used to improve their detection.

Research on an Engagement Level Underwater Weapon System Model with Neyman-Pearson Detector (Neyman-Pearson 표적 탐지기를 적용한 수중 무기체계 교전수준 모델 개발 연구)

  • Cho, Hyunjin;Kim, Wan-Jin;Kim, Sanghun;Yang, Hocheol;Lee, Hee Kwang
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.89-95
    • /
    • 2019
  • This paper introduces the simulation concepts and technical approach of underwater weapon system performance analysis simulator, especially focused on probabilistic target detection concepts. We calculated the signal excess (SE) value using SONAR equation, then derived the probability density function(PDF) for target presence($H_1$) or absence($H_0$) cases, respectively. With the Neyman-Pearson detector criterion, we got the probability of detection($P_D$) while satisfying the given probability of false alarm($P_{FA}$). At every instance of simulation, target detection is decided in the probabilistic perspective. With the proposed detection implementation, we improved the model fidelity so that it could support the tactical decision during the operation.

Small Target Detection with Clutter Rejection using Stochastic Hypothesis Testing

  • Kang, Suk-Jong;Kim, Do-Jong;Ko, Jung-Ho;Bae, Hyeon-Deok
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1559-1565
    • /
    • 2007
  • The many target-detection methods that use forward-looking infrared (FUR) images can deal with large targets measuring $70{\times}40$ pixels, utilizing their shape features. However, detection small targets is difficult because they are more obscure and there are many target-like objects. Therefore, few studies have examined how to detect small targets consisting of fewer than $30{\times}10$ pixels. This paper presents a small target detection method using clutter rejection with stochastic hypothesis testing for FLIR imagery. The proposed algorithm consists of two stages; detection and clutter rejection. In the detection stage, the mean of the input FLIR image is first removed and then the image is segmented using Otsu's method. A closing operation is also applied during the detection stage in order to merge any single targets detected separately. Then, the residual of the clutters is eliminated using statistical hypothesis testing based on the t-test. Several FLIR images are used to prove the performance of the proposed algorithm. The experimental results show that the proposed algorithm accurately detects small targets (Jess than $30{\times}10$ pixels) with a low false alarm rate compared to the center-surround difference method using the receiver operating characteristics (ROC) curve.

  • PDF

A Study on Detection of Underwater Ferromagnetic Target for Harbor Surveillance (항만 감시를 위한 수중 강자성 표적 탐지에 관한 연구)

  • Kim, Minho;Joo, Unggul;Lim, Changsum;Yoon, Sanggi;Moon, Sangtaeck
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.350-357
    • /
    • 2015
  • Many countries have been developing and operating an underwater surveillance system in order to protect their oceanic environment from infiltrating hostile marine forces which intend to lay mines, conduct reconnaissance and destroy friendly ships anchored at the harbor. One of the most efficient methods to detect unidentified submarine approaching harbor is sensing variation of magnetism of target by magnetic sensors. This measurement system has an advantage of high possibility of detection and low probability of false alarm, compared to acoustic sensors, although it has relatively decreased detection range. The contents of this paper mainly cover the analysis of possible effectiveness of magnetic sensors. First of all, environmental characteristics of surveillance area and magnetic information of simulated targets has been analyzed. Subsequently, a signal processing method of separating target from geomagnetic field and methods of estimating target location has been proposed.

Actual Status of and Measure for False Alarm of Electronic Security in Korea (한국 기계경비업무의 오경보 대응책)

  • Park, Dong-Kyun;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.33-60
    • /
    • 2012
  • False alarm of Electronic security causes various serious side effects such as decrease of electronic security guard's morale caused by unnecessary mobilization, increase of fatigue caused by workload increase, increase of electronic security company owner's management burden and decrease of electronic security service utilization rate caused by customer's distrust. Therefore, the study considered the Korean regulation related with false alarm of electronic security and proposed actual status of false alarm and measure for it. The study proposed systematic resolution assignments and political assignments in relation with the measure for false alarm. Systematic resolution assignments are as follows. First, electronic security company should construct electronic security system accurately from the initial step of security consulting and security planning related with target facility. Second, it is necessary to encourage installation and operation of video monitoring system. Third, sensor wiring should be separated. Fourth, the measures for false alarm depending on main system causes should be prepared. It is necessary to encourage the installation of 'arming disarming alarm sound' generator. In addition, the measures for false arm depending on the characteristics of sensor should be prepared and standardized. Fifth, system maintenance should be reinforced. Political assignments related with the measures for false alarm are as follows. First, it is necessary to reinforce education & training. Individual nurturing & education process should be run by electronic security company or the education focusing on the measure for false alarm should be performed in job training defined in "Security Industry Act". Second, it is necessary to establish and reinforce legal regulation and establish device. If police authority standardizes the documents related with false alarm, provides their forms and requires them for periodical reports or documents, it is expected that good measures for false alarm will be prepared on the basis of actual data in the future. Third, cooperation organization to discuss the measures for false alarm like 'Conference for False Alarm of Electronic Security' should be organized and operated. Fourth, interest and role of electronic security company and electronic security supervisor should be enlarged.

  • PDF