• Title/Summary/Keyword: False-Information

Search Result 1,361, Processing Time 0.027 seconds

Reduction of Dynamic False Contour Using Motion Estimation Method in PDP (움직임 예측을 통한 PDP 내에서의 의사 윤곽 제거 기법 연구)

  • 안상준;김창수;이상욱
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.23-26
    • /
    • 2003
  • In this work. we propose an algorithm for detecting and compensating dynamic false contours in plasma display panels (PDPs). First, we detect the candidate pixels, which are likely to be corrupted by false contours, and merge those pixels into several regions. Second, we estimate the motion vectors of the selected regions. Finally, based on the motion information. we modify the luminance values of the pixels in the regions to alleviate the effects of false contours. Simulation results demonstrate that the proposed algorithm efficiently reduces dynamic false contours at low computational complexity.

  • PDF

A Study on the Countermeasure Against the Disinformation: the Possibility of Citizen Participation (허위정보(disinformation)에 대한 대응 탐색: 시민참여 가능성을 중심으로)

  • Chung, Yeonwoo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.226-239
    • /
    • 2020
  • The study seeks to present ways to form and express political opinions while monitoring, regulating and critically accepting the production and distribution of false information and platforms, which are spread channels, through the participation of citizens. First, it logically identified the unfairness of legal regulations on false information. In other words, it is often practically impossible to judge whether false information is false or not, and even false information can sometimes fall within the category of freedom of expression protection. It also revealed that voluntary regulation by platform operators was limited. As an alternative, it was theoretically clear whether civil society should participate in the maintenance and development of democratic public debate sites and create social discourse. The specific method is to find and classify false information and share it with citizens to raise awareness. Second, it forms an autonomous cooperative system with platform operators and others. Third, develop critical media capacity of citizens. Fourth, it responds to producers and platform operators of false information while engaging in community activities as a direct practitioner.

Classification of False Alarms based on the Decision Tree for Improving the Performance of Intrusion Detection Systems (침입탐지시스템의 성능향상을 위한 결정트리 기반 오경보 분류)

  • Shin, Moon-Sun;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.473-482
    • /
    • 2007
  • Network-based IDS(Intrusion Detection System) gathers network packet data and analyzes them into attack or normal. They raise alarm when possible intrusion happens. But they often output a large amount of low-level of incomplete alert information. Consequently, a large amount of incomplete alert information that can be unmanageable and also be mixed with false alerts can prevent intrusion response systems and security administrator from adequately understanding and analyzing the state of network security, and initiating appropriate response in a timely fashion. So it is important for the security administrator to reduce the redundancy of alerts, integrate and correlate security alerts, construct attack scenarios and present high-level aggregated information. False alarm rate is the ratio between the number of normal connections that are incorrectly misclassified as attacks and the total number of normal connections. In this paper we propose a false alarm classification model to reduce the false alarm rate using classification analysis of data mining techniques. The proposed model can classify the alarms from the intrusion detection systems into false alert or true attack. Our approach is useful to reduce false alerts and to improve the detection rate of network-based intrusion detection systems.

A Sub-field Rearrangement Driving Method for Reducing Dynamic False Contour in Plasma Display Panels

  • Lee, Seung-Yong;Choi, Byong-Deok
    • Journal of Information Display
    • /
    • v.7 no.1
    • /
    • pp.30-34
    • /
    • 2006
  • A sub-field rearrangement driving method has been proposed to reduce a DFC (Dynamic False Contour) phenomenon in plasma display panels. The proposed driving method expresses 256 gray levels with 16 sub-fields, while conventional one uses only 8 sub-fields. Notwithstanding the increase in the number of sub-fields, the display time is similar to the conventional 8 sub-fields driving method by appropriate choosing selective writing and selective erasing for sub-fields.

A Design of false alarm analysis framework of intrusion detection system by using incremental mining method (점진적 마이닝 기법을 적용한 침입탐지 시스템의 오 경보 분석 프레임워크 설계)

  • Kim Eun-Hee;Ryu Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.295-302
    • /
    • 2006
  • An intrusion detection system writes a lot of alarms against attack behaviors in real time. These alarms contain not only actual attack alarms, but also false alarms that are mistakes made by the intrusion detection system. False alarms are the main reason that reduces the efficiency of the intrusion detection system, and we propose framework for false alarms analysis in the paper. Also, we apply an incremental data mining method for pattern analysis of false alarms increasing continuously. The framework consists of GUI, DB Manager, Alert Preprocessor, and False Alarm Analyzer. We analyze the false alarms increasingly through the experiment of the proposed framework and show that false alarms are reduced by applying the analyzed false alarm rules in the intrusion detection system.

A Real Time Scan Detection System against Attacks based on Port Scanning Techniques (포트 스캐닝 기법 기반의 공격을 탐지하기 위한 실시간 스캔 탐지 시스템 구현)

  • 송중석;권용진
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.171-178
    • /
    • 2004
  • Port scanning detection systems should rather satisfy a certain level of the requirement for system performance like a low rate of “False Positive” and “False Negative”, and requirement for convenience for users to be easy to manage the system security with detection systems. However, public domain Real Time Scan Detection Systems have high rate of false detection and have difficulty in detecting various scanning techniques. In addition, as current real time scan detection systems are based on command interface, the systems are poor at user interface and thus it is difficult to apply them to the system security management. Hence, we propose TkRTSD(Tcl/Tk Real Time Scan Detection System) that is able to detect various scan attacks based on port scanning techniques by applying a set of new filter rules, and minimize the rate of False Positive by applying proposed ABP-Rules derived from attacker's behavioral patterns. Also a GUI environment for TkRTSD is implemented by using Tcl/Tk for user's convenience of managing network security.

Automatic False-Alarm Labeling for Sensor Data

  • Adi, Taufik Nur;Bae, Hyerim;Wahid, Nur Ahmad
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A false alarm, which is an incorrect report of an emergency, could trigger an unnecessary action. The predictive maintenance framework developed in our previous work has a feature whereby a machine alarm is triggered based on sensor data evaluation. The sensor data evaluator performs three essential evaluation steps. First, it evaluates each sensor data value based on its threshold (lower and upper bound) and labels the data value as "alarm" when the threshold is exceeded. Second, it calculates the duration of the occurrence of the alarm. Finally, in the third step, a domain expert is required to assess the results from the previous two steps and to determine, thereby, whether the alarm is true or false. There are drawbacks of the current evaluation method. It suffers from a high false-alarm ratio, and moreover, given the vast amount of sensor data to be assessed by the domain expert, the process of evaluation is prolonged and inefficient. In this paper, we propose a method for automatic false-alarm labeling that mimics how the domain expert determines false alarms. The domain expert determines false alarms by evaluating two critical factors, specifically the duration of alarm occurrence and identification of anomalies before or while the alarm occurs. In our proposed method, Hierarchical Temporal Memory (HTM) is utilized to detect anomalies. It is an unsupervised approach that is suitable to our main data characteristic, which is the lack of an example of the normal form of sensor data. The result shows that the technique is effective for automatic labeling of false alarms in sensor data.

Likelihood Based Confidence Intervals for the Difference of Proportions in Two Doubly Sampled Data with a Common False-Positive Error Rate

  • Lee, Seung-Chun
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.5
    • /
    • pp.679-688
    • /
    • 2010
  • Lee (2010) developed a confidence interval for the difference of binomial proportions in two doubly sampled data subject to false-positive errors. The confidence interval seems to be adequate for a general double sampling model subject to false-positive misclassification. However, in many applications, the false-positive error rates could be the same. On this note, the construction of asymptotic confidence interval is considered when the false-positive error rates are common. The coverage behaviors of nine likelihood based confidence intervals are examined. It is shown that the confidence interval based Rao score with the expected information has good performance in terms of coverage probability and expected width.

Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms

  • Tishita, Tasnina A.;Akhter, Sumiya;Islam, Md. Imdadul;Amin, M. Ruhul
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.459-470
    • /
    • 2014
  • In this paper, the average probability of the symbol error rate (SER) and throughput are studied in the presence of joint spectrum sensing and data transmission in a cognitive relay network, which is in the environment of an optimal power allocation strategy. In this investigation, the main component in calculating the secondary throughput is the inclusion of the spatial false alarms, in addition to the conventional false alarms. It has been shown that there exists an optimal secondary power amplification factor at which the probability of SER has a minimum value, whereas the throughput has a maximum value. We performed a Monte-Carlo simulation to validate the analytical results.

AUTOMATIC MOTION DETECTION USING FALSE BACKGROUND ELIMINATION

  • Seo, Jin Keun;Lee, Sukho
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.17 no.1
    • /
    • pp.47-54
    • /
    • 2013
  • This work deals with automatic motion detection for with surveillance tracking that aims to provide high-lighting movable objects which is discriminated from moving backgrounds such as moving trees, etc. For this aim, we perform a false background region detection together with an initial foreground detection. The false background detection detects the moving backgrounds, which become eliminated from the initial foreground detection. This false background detection is done by performing the bimodal segmentation on a deformed image, which is constructed using the information of the dominant colors in the background.