• Title/Summary/Keyword: error detection rate

Search Result 579, Processing Time 0.024 seconds

Analysis of the Difference in Pilot Error by Using the Signal Detection Theory (신호탐지론을 활용한 조종사 Error 차이 분석)

  • Kwon, Oh-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.1
    • /
    • pp.51-57
    • /
    • 2010
  • This study was to analyze the difference in pilot error by using the Signal Detection Theory. The task was to detect the targeted aircraft(signal) which is different shape from many other aircraft(noise). From the two experiments, we differentiated the task difficulty followed by change in noise stimuli. Experiment 1 was to search the signal stimuli(fighter plane) while the noise stimuli(cargo plane) were increasing. The results from the Experiment 1 showed the tendency to decrease the hit rate by increasing the number of noise stimuli. However, the false alarm rate was not increased. The sensitivity(d') showed quite high. In Experiment 2, a disturbance stimulus(helicopter) was added to noise stimuli. The result was generally similar to those of Experiment 1. However, the hit rate was lower than that of Experiment 1.

A Modified Viterbi Algorithm for Word Boundary Detection Error Compensation (단어 경계 검출 오류 보정을 위한 수정된 비터비 알고리즘)

  • Chung, Hoon;Chung, Ik-Joo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.1E
    • /
    • pp.21-26
    • /
    • 2007
  • In this paper, we propose a modified Viterbi algorithm to compensate for endpoint detection error during the decoding phase of an isolated word recognition task. Since the conventional Viterbi algorithm explores only the search space whose boundaries are fixed to the endpoints of the segmented utterance by the endpoint detector, the recognition performance is highly dependent on the accuracy level of endpoint detection. Inaccurately segmented word boundaries lead directly to recognition error. In order to relax the degradation of recognition accuracy due to endpoint detection error, we describe an unconstrained search of word boundaries and present an algorithm to explore the search space with efficiency. The proposed algorithm was evaluated by performing a variety of simulated endpoint detection error cases on an isolated word recognition task. The proposed algorithm reduced the Word Error Rate (WER) considerably, from 84.4% to 10.6%, while consuming only a little more computation power.

TRUNCATED SOFTWARE RELIABILITY GROWTH MODEL

  • Prince Williams, D.R.;Vivekanandan, P.
    • Journal of applied mathematics & informatics
    • /
    • v.9 no.2
    • /
    • pp.761-769
    • /
    • 2002
  • Due to the large scale application of software systems, software reliability plays an important role in software developments. In this paper, a software reliability growth model (SRGM) is proposed. The testing time on the right is truncated in this model. The instantaneous failure rate, mean-value function, error detection rate, reliability of the software, estimation of parameters and the simple applications of this model are discussed .

An Error Control Line Code Based on an Extended Hamming Code (확대 Hamming 부호를 이용한 오류제어선로부호)

  • 김정구;정창기;이수인;주언경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.912-919
    • /
    • 1994
  • A new error control line code based on an extended Hamming code is proposed and its performance is analyzed in this paper. The proposed code is capable of single error correction and double error detection since its minimum Hamming distance is 4. In addition, the error detection capability can be oncreased due to the redundancy bit used for line coding. As a result, the proposed code shows lower code rate, but better spectral characteristics in low frequency region and lower residual bit error rate than the conventional error correction line code using Hamming (7, 4) code.

  • PDF

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Error-detection-coding-aided iterative hard decision interference cancellation for MIMO systems with HARQ

  • Park, Sangjoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1016-1030
    • /
    • 2018
  • In this paper, an error-detection-coding-aided iterative hard decision interference cancellation (EDC-IHIC) scheme for multiple-input multiple-output systems employing hybrid automatic repeat request (HARQ) for multi-packet transmission is developed and investigated. In the EDC-IHIC scheme, only packets identified as error-free by the EDC are submitted to the interference cancellation (IC) stage for cancellation from the received signals. Therefore, the possibility of error propagation, including inter-transmission error propagation, can be eliminated using EDC-IHIC. Because EDC must be implemented in systems that employ HARQ to determine packet retransmission, error propagation can be prevented without the need for additional redundancy. The results of simulations conducted herein verify that the EDC-IHIC scheme outperforms conventional hard decision IC schemes in terms of the packet error rate in various environments.

A study on the speckle noise removal and edge detection using gradient and symmetry (기울기와 유사성을 이용한 스페클 잡음 제거 및 경계선 검출에 관한 연구)

  • 홍승범;백종환
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.11
    • /
    • pp.138-147
    • /
    • 1997
  • The ultrasonic images are corrupted by the granular pattern noise - a speckle noise. The speckle exist in the type of coherent imaging systems, and the speckle is the signal independent and multiplicative noise. In this paepr, we derive two filters using the gradient and symmetry. One is a noise suppression filter which removes noise while preserves the edges. It is named the ASRF-GS (Adaptive Speckle Removal Filer - Gradient and Symmetry). And the other is a edge detection filter which obtains the thin edge map, called the EDUGS(Edge Detection Using Gradient and Symmetry). The performance of the proposed noise suppression filter is evaluated by the IMPV(SNR improvement) and the Speckle Index(SI), and the perforamnce of the edge detection is evaluated by the edge detection error rate. According to the evaluated method, The SI reduced about 0.035, The IMPV improved about 1.265(dB), and the edge detection error rate is about 17.5%.

  • PDF

A Study for Voltage Sag Detection Using Detection Characteristic Of Wavelet Transform (웨이블릿 변환의 검출 특성을 이용한 전압강하 검출에 관한 연구)

  • Jung, Seung-Bock;Kim, Jae-Chul;Seol, Kyu-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.172-174
    • /
    • 2005
  • Recently, a concern of power qualify increases because of electronic device development and well-being generation. Power quality problems such as voltage sag, harmonics, flicker etc. have adverse effects on electric devices. Therefore, power quality problems have been monitored. This paper studies a detection of voltage sag that is more severer than the others. A voltage sag has been monitored using rms or wavelet method. This paper proposes an advance detection method using wavelet. An error Of Start Point differs error of ending point. We use this difference. So, we respectively revise detection error. Also, we revise multiplying average error rate.

  • PDF

A Study on the Endpoint Detection Algorithm (끝점 검출 알고리즘에 관한 연구)

  • 양진우
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1984.12a
    • /
    • pp.66-69
    • /
    • 1984
  • This paper is a study on the Endpoint Detection for Korean Speech Recognition. In speech signal process, analysis parameter was classification from Zero Crossing Rate(Z.C.R), Log Energy(L.E), Energy in the predictive error(Ep) and fundamental Korean Speech digits, /영/-/구/ are selected as date for the Recognition of Speech. The main goal of this paper is to develop techniques and system for Speech input ot machine. In order to detect the Endpoint, this paper makes choice of Log Energy(L.E) from various parameters analysis, and the Log Energy is very effective parameter in classifying speech and nonspeech segments. The error rate of 1.43% result from the analysis.

  • PDF

An Ordered Successive Interference Cancellation Scheme in UWB MIMO Systems

  • An, Jin-Young;Kim, Sang-Choon
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.472-474
    • /
    • 2009
  • In this letter, an ordered successive interference cancellation (OSIC) scheme is applied for multiple-input multiple-output (MIMO) detection in ultra-wideband (UWB) communication systems. The error rate expression of an OSIC receiver on a log-normal multipath fading channel is theoretically derived in a closed form solution. Its bit error rate performance is analytically compared with that of a zero forcing receiver in the UWB MIMO detection scheme followed by RAKE combining.