• Title/Summary/Keyword: detection rate

Search Result 4,578, Processing Time 0.026 seconds

Dwell Time Optimization of Alert-Confirm Detection for Active Phased Array Radars

  • Kim, Eun Hee;Park, JoonYong
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.2
    • /
    • pp.107-114
    • /
    • 2019
  • Alert-confirm detection is a highly efficient method to improve phased array radar search performance. It comprises sequential detection in two steps: alert detection, in which a target is detected at a low detection threshold, and confirm detection, which is triggered by alert detection with a longer dwell time to minimize false alarms. This paper provides a design method for applying the alert-confirm detection to multifunctional radars. We find optimum dwell times and false alarm probabilities for each alert detection and confirm detection under the dual constraints of total false alarm probability and maximum allowable dwell time per position. These optimum values are expressed as a function of the mean new target appearance rate. The proposed alert-confirm detection increases the maximum detection range even with a shorter frame time than that of uniform scanning.

IKPCA-ELM-based Intrusion Detection Method

  • Wang, Hui;Wang, Chengjie;Shen, Zihao;Lin, Dengwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3076-3092
    • /
    • 2020
  • An IKPCA-ELM-based intrusion detection method is developed to address the problem of the low accuracy and slow speed of intrusion detection caused by redundancies and high dimensions of data in the network. First, in order to reduce the effects of uneven sample distribution and sample attribute differences on the extraction of KPCA features, the sample attribute mean and mean square error are introduced into the Gaussian radial basis function and polynomial kernel function respectively, and the two improved kernel functions are combined to construct a hybrid kernel function. Second, an improved particle swarm optimization (IPSO) algorithm is proposed to determine the optimal hybrid kernel function for improved kernel principal component analysis (IKPCA). Finally, IKPCA is conducted to complete feature extraction, and an extreme learning machine (ELM) is applied to classify common attack type detection. The experimental results demonstrate the effectiveness of the constructed hybrid kernel function. Compared with other intrusion detection methods, IKPCA-ELM not only ensures high accuracy rates, but also reduces the detection time and false alarm rate, especially reducing the false alarm rate of small sample attacks.

A Study on Drowsy Driving Detection using SURF (SURF를 이용한 졸음운전 검출에 관한 연구)

  • Choi, Na-Ri;Choi, Ki-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.131-143
    • /
    • 2012
  • In this paper, we propose a drowsy driver detection system with a novel eye state detection method that is adaptive to various vehicle environment such as glasses, light and so forth using SURF(Speed Up Robust Feature) which can extract quickly local features from images. Also the performance of eye state detection is improved as individual three eye-state templates of each driver can be made using Bayesian inference. The experimental results under various environment with average 98.1% and 96.1% detection rate in the daytime and at night respectively and those in the opened ZJU database with average 97.8% detection rate show that the proposed method outperforms the current state-of-the-art.

Analysis of Unwanted Fire Alarm Signal Pattern of Smoke / Temperature Detector in the IoT-Based Fire Detection System (IoT 기반 화재탐지시스템의 연기 및 온도감지기 비화재보 신호 패턴 분석)

  • Park, Seunghwan;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.2
    • /
    • pp.69-75
    • /
    • 2022
  • Fire-alarm systems are safety equipment that facilitate rapid evacuation and early suppression in case of fire. It is highly desirable that fire-alarm systems have low false-alarm rates and are thus reliable. Until now, researchers have attempted to improve detector performance by applying new technologies such as IoT. To this end, IoT-based fire-detection systems have been developed. However, due to scarcity of large-scale operational data, researchers have barely studied malfunctioning in fire-alarm systems or attempted to reduce false-alarm rates in these systems. In this study, we analyzed false-alarm rates of smoke/temperature detectors and unwanted fire-alarm signal patterns at K institution, where Korea's largest IoT-based fire-detection system operates. After analyzing the fire alarm occurrences at the institution for five years, we inferred that the IoT-based fire-detection system showed lower false-alarm rates compared to the automatic fire-detection equipment. We analyzed the detection pattern by dividing it into two parts: normal operation and unwanted fire alarms. When a specific signal pattern was filtered out, the false-alarm rate was reduced to 66.9% in the smoke detector and to 46.9% in the temperature detector.

Analysis of HBeAg and HBV DNA Detection in Hepatitis B Patients Treated with Antiviral Therapy (항 바이러스 치료중인 B형 간염환자에서 HBeAg 및 HBV DNA 검출에 관한 분석)

  • Cheon, Jun Hong;Chae, Hong Ju;Park, Mi Sun;Lim, Soo Yeon;Yoo, Seon Hee;Lee, Sun Ho
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.23 no.1
    • /
    • pp.35-39
    • /
    • 2019
  • Purpose Hepatitis B virus (hepatitis B virus, HBV) infection is a worldwide major public health problem and it is known as a major cause of chronic hepatitis, liver cirrhosis and liver cancer. And serologic tests of hepatitis B virus is essential for diagnosing and treating these diseases. In addition, with the development of molecular diagnostics, the detection of HBV DNA in serum diagnoses HBV infection and is recognized as an important indicator for the antiviral agent treatment response assessment. We performed HBeAg assay using Immunoradiometric assay (IRMA) and Chemiluminescent Microparticle Immunoassay (CMIA) in hepatitis B patients treated with antiviral agents. The detection rate of HBV DNA in serum was measured and compared by RT-PCR (Real Time - Polymerase Chain Reaction) method Materials and Methods HBeAg serum examination and HBV DNA quantification test were conducted on 270 hepatitis B patients undergoing anti-virus treatment after diagnosis of hepatitis B virus infection. Two serologic tests (IRMA, CMIA) with different detection principles were applied for the HBeAg serum test. Serum HBV DNA was quantitatively measured by real-time polymerase chain reaction (RT-PCR) using the Abbott m2000 System. Results The detection rate of HBeAg was 24.1% (65/270) for IRMA and 82.2% (222/270) for CMIA. Detection rate of serum HBV DNA by real-time RT-PCR is 29.3% (79/270). The measured amount of serum HBV DNA concentration is $4.8{\times}10^7{\pm}1.9{\times}10^8IU/mL$($mean{\pm}SD$). The minimum value is 16IU/mL, the maximum value is $1.0{\times}10^9IU/mL$, and the reference value for quantitative detection limit is 15IU/mL. The detection rates and concentrations of HBV DNA by group according to the results of HBeAg serological (IRMA, CMIA)tests were as follows. 1) Group I (IRMA negative, CMIA positive, N = 169), HBV DNA detection rate of 17.7% (30/169), $6.8{\times}10^5{\pm}1.9{\times}10^6IU/mL$ 2) Group II (IRMA positive, CMIA positive, N = 53), HBV DNA detection rate 62.3% (33/53), $1.1{\times}10^8{\pm}2.8{\times}10^8IU/mL$ 3) Group III (IRMA negative, CMIA negative, N = 36), HBV DNA detection rate 36.1% (13/36), $3.0{\times}10^5{\pm}1.1{\times}10^6IU/mL$ 4) Group IV(IRMA positive, CMIA negative, N = 12), HBV DNA detection rate 25% (3/12), $1.3{\times}10^3{\pm}1.1{\times}10^3IU/mL$ Conclusion HBeAg detection rate according to the serological test showed a large difference. This difference is considered for a number of reasons such as characteristics of the Ab used for assay kit and epitope, HBV of genotype. Detection rate and the concentration of the group-specific HBV DNA classified serologic results confirmed the high detection rate and the concentration in Group II (IRMA-positive, CMIA positive, N = 53).

A Novel Method to Estimate Heart Rate from ECG

  • Leu, Jenq-Shiun;Lo, Pei-Chen
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.4
    • /
    • pp.441-448
    • /
    • 2007
  • Heart rate variability (HRV) in electrocardiogram (ECG) is an important index for understanding the health status of heart and the autonomic nervous system. Most HRV analysis approaches are based on the proper heart rate (HR) data. Estimation of heart rate is thus a key process in the HRV study. In this paper, we report an innovative method to estimate the heart rate. This method is mainly based on the concept of periodicity transform (PT) and instantaneous period (IP) estimate. The method presented is accordingly called the "PT-IP method." It does not require ECG R-wave detection and thus possesses robust noise-immune capability. While the noise contamination, ECG time-varying morphology, and subjects' physiological variations make the R-wave detection a difficult task, this method can help us effectively estimate HR for medical research and clinical diagnosis. The results of estimating HR from empirical ECG data verify the efficacy and reliability of the proposed method.

Bacteriological Survey for Food/Food Contacting Surfaces in Large Grocery Stores in Korea

  • Park Mi-Yeon
    • Fisheries and Aquatic Sciences
    • /
    • v.7 no.2
    • /
    • pp.64-69
    • /
    • 2004
  • A bacteriological survey for 20 large grocery stores (M 1 to M20) in Korea was investigated for one year. The average detection rate of Esherichia coli was $22\%$ (166/763) for 7 kinds of ready-to-eat food through the year, where each grocery store and each type of food showed different detection rates. Eleven grocery stores showed lower detection rates, while 9 grocery stores showed a higher than average rate. Especially, M3 showed a rate that was twice as high as the average and one which was 7 times higher than M14, which had the lowest rate of $6\%$ E. coli detection. The detection rate for each type of food was: $38\%$ (41/109) for Kimbop, $31\%$ (34/109) for vegetable salad, $19\%$ (21/109) for bean-curd, $18\%$ (20/109) for the cooked materials used in making Kimbop, $17\%$ (19/109) for Hoe (sliced raw fish) and Sushi (Japanese vinegared rice delicacies), and $11\%$ (12/109) for cooked pork hock. During the summer, the E. coli detection rate averaged $43\%$ (71/166), which was twice as high as other seasons. Most (89/100) of the food contacting surfaces contained more than the critical limit $(1.3\;log_{10}\;CFU/10cm^2)$ of aerobic viable cell counts (AVC). The $log_{10}$ AVC and $log_{10}$ coliform count (CC) of 218 meat samples (beef, pork, and chicken) ranged between 4.6-7.1 CFU/g and 1.9-6.4 CFU/g, except for 41 meat samples $(19\%)$ which were found to contain no coliform. There was a definite correlation between the $log_{10}$ AVC and $log_{10}$ CC, and the values of $log_{10}$ CC made a more accurate straight than the $log_{10}$ AVC, which are variable. From these results, it is suggested that a detection rating of less than 2.1 CFU/g of $log_{10}$ CC (correspond to 5.0 CFU/g of $log_{10}$ AVC) is the critical point of freshness, and a rating of more than 6.3 CFU/g of $log_{10}$ CC (correspond to 7.0 CFU/g of $log_{10}$ AVC) can be considered an initial spoilage point.

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

  • Yan, Ruo-Yu;Zheng, Qing-Hua;Li, Hai-Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.428-451
    • /
    • 2010
  • Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly, a new type of unidirectional flow called IF flow is proposed. Merits and features of IF flows are analyzed in detail and then two efficient methods are introduced in our DDoS attacks detection and evaluation scheme. The first method uses residual variance ratio to detect DDoS attacks after Recursive Least Square (RLS) filter is applied to predict IF flows. The second method uses generalized likelihood ratio (GLR) statistical test to detect DDoS attacks after a Kalman filter is applied to estimate IF flows. Based on the two complementary methods, an evaluation formula is proposed to assess the seriousness of current DDoS attacks on router ports. Furthermore, the sensitivity of three types of traffic (IF flow, input link and output link) to DDoS attacks is analyzed and compared. Experiments show that IF flow has more power to expose anomaly than the other two types of traffic. Finally, two proposed methods are compared in terms of detection rate, processing speed, etc., and also compared in detail with Principal Component Analysis (PCA) and Cumulative Sum (CUSUM) methods. The results demonstrate that adaptive filter methods have higher detection rate, lower false alarm rate and smaller detection lag time.

A Unknown Phishing Site Detection Method in the Interior Network Environment (내부 네트워크에서 알려지지 않은 피싱사이트 탐지방안)

  • Park, Jeonguk;Cho, Gihwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.313-320
    • /
    • 2015
  • While various phishing attacks are getting to be increased in constant, their response methods still stay on the stage of responding after identifying an attack. To detect a phishing site ahead of an attack, a method has been suggested with utilizing the Referer header field of HTTP. However, it has a limitation to implement a traffic gathering system for each of prospective target hosts. This paper presents a unknown phishing site detection method in the Interior network environment. Whenever a user try to connect a phishing site, its traffic is pre-processed with considering of the characteristics of HTTP protocol and phishing site. The phishing site detection phase detects a suspicious site under phishing with analysing HTTP content. To validate the proposed method, some evaluations were conducted with 100 phishing URLs along with 100 normal URLs. The experimental results show that our method achieves higher phishing site detection rate than that of existing detection methods, as 66% detection rate for the phishing URLs, and 0% false negative rate for the normal URLs.

The Hybrid Model using SVM and Decision Tree for Intrusion Detection (SVM과 의사결정트리를 이용한 혼합형 침입탐지 모델)

  • Um, Nam-Kyoung;Woo, Sung-Hee;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.1-6
    • /
    • 2007
  • In order to operate a secure network, it is very important for the network to raise positive detection as well as lower negative detection for reducing the damage from network intrusion. By using SVM on the intrusion detection field, we expect to improve real-time detection of intrusion data. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. Therefore, we present the hybrid model between SVM and decision tree method to make up for the weak point. Accordingly, we see that intrusion detection rate, F-P error rate, F-N error rate are improved as 5.6%, 0.16%, 0.82%, respectively.