• Title/Summary/Keyword: false current

Search Result 156, Processing Time 0.031 seconds

A study of Problems with False Exaggerating Advertisements and Consumer's Protection. (허위, 과장광고와 소비자보호문제에 관한 고찰)

  • 조기중
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.6 no.9
    • /
    • pp.97-110
    • /
    • 1983
  • As the economic society develops very exceedingly, the gap of production and consumption elarges gradually. So the current function to connect them and the function to communicate are needed. I think the advertisement take the charge of this role. This advertisement is so essential to today's economic society that its power influences variably both the economic society and the consumers. The enterprisers, advertising owners stick to the maximization of profits and neglect the principle of true advertisements. They but tise not the information for the consumers to choose reasonably but the false, exaggerating advertisement and unfair manifestation very frequently, which is the main trouble in the current problems of consumption. Therefore, on the one hand, in this study from protecting the consumers not to be involved in the false, exaggerating advertisements, the establishment of advertising ethics as advertising owner's self-control is discussed. On the other hand, the legal control regulation in Korea, involving Japan and U.S.A. are analyzed. The cases of false, exaggerating advertisements and unfair manifestation in Korea are also demonstrated. Finally, the proposals to improve the advertisements are made from the Point of government, enterprisers, and consumers.

  • PDF

A Look-Up Table Based Error Diffusion Algorithm for Dynamic False Contour Reduction of Plasma Display Panels

  • Lee, Ho-Seop;Kim, Choon-Woo
    • Journal of Information Display
    • /
    • v.2 no.2
    • /
    • pp.32-38
    • /
    • 2001
  • PDP(plasma display panel) represents the gray levels by the pulse number modulation technique that results in undesirable dynamic false contours on moving images. This paper proposes a LUT(Look-up table) based error diffusion algorithm for reduction of the dynamic false contours. A quantitative measure of the dynamic false contours is defined first. The measure of the dynamic false contours is calculated through simulation of every gray level combination of two consecutive frames. Based on the calculated measures, a modified gray level for a pair of gray levels of two consecutive frames is chosen to reduce the dynamic false contours. The chosen gray levels serve as contents of a gray level conversion LUT. Given a pair of gray levels of two consecutive frames, the gray level of current frame is modified based on the gray level conversion LUT. The new gray level is displayed on PDP. An error diffusion algorithm is, then, applied to compensate for the differences in the gray levels.

  • PDF

A Real Time Scan Detection System against Attacks based on Port Scanning Techniques (포트 스캐닝 기법 기반의 공격을 탐지하기 위한 실시간 스캔 탐지 시스템 구현)

  • 송중석;권용진
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.171-178
    • /
    • 2004
  • Port scanning detection systems should rather satisfy a certain level of the requirement for system performance like a low rate of “False Positive” and “False Negative”, and requirement for convenience for users to be easy to manage the system security with detection systems. However, public domain Real Time Scan Detection Systems have high rate of false detection and have difficulty in detecting various scanning techniques. In addition, as current real time scan detection systems are based on command interface, the systems are poor at user interface and thus it is difficult to apply them to the system security management. Hence, we propose TkRTSD(Tcl/Tk Real Time Scan Detection System) that is able to detect various scan attacks based on port scanning techniques by applying a set of new filter rules, and minimize the rate of False Positive by applying proposed ABP-Rules derived from attacker's behavioral patterns. Also a GUI environment for TkRTSD is implemented by using Tcl/Tk for user's convenience of managing network security.

Automatic False-Alarm Labeling for Sensor Data

  • Adi, Taufik Nur;Bae, Hyerim;Wahid, Nur Ahmad
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A false alarm, which is an incorrect report of an emergency, could trigger an unnecessary action. The predictive maintenance framework developed in our previous work has a feature whereby a machine alarm is triggered based on sensor data evaluation. The sensor data evaluator performs three essential evaluation steps. First, it evaluates each sensor data value based on its threshold (lower and upper bound) and labels the data value as "alarm" when the threshold is exceeded. Second, it calculates the duration of the occurrence of the alarm. Finally, in the third step, a domain expert is required to assess the results from the previous two steps and to determine, thereby, whether the alarm is true or false. There are drawbacks of the current evaluation method. It suffers from a high false-alarm ratio, and moreover, given the vast amount of sensor data to be assessed by the domain expert, the process of evaluation is prolonged and inefficient. In this paper, we propose a method for automatic false-alarm labeling that mimics how the domain expert determines false alarms. The domain expert determines false alarms by evaluating two critical factors, specifically the duration of alarm occurrence and identification of anomalies before or while the alarm occurs. In our proposed method, Hierarchical Temporal Memory (HTM) is utilized to detect anomalies. It is an unsupervised approach that is suitable to our main data characteristic, which is the lack of an example of the normal form of sensor data. The result shows that the technique is effective for automatic labeling of false alarms in sensor data.

The Development of an Algorithm for the Correction of Errors in the Phase Current of the Protective Relay on Distribution System Interconnected with Distributed Generations (분산전원 연계선로에서 보호계전기의 상전류 오차보정 알고리즘 개발)

  • Shin, Dong-Yeol;Yun, Donghyun;Cha, HanJu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.11
    • /
    • pp.1604-1609
    • /
    • 2013
  • When the ground fault on the power side occurs on distribution system interconnected with distributed generations, the abnormal current is generated in the neutral conductor by the connection type and the iron core structure of transformers for the interconnection of distributed power supplies due to the unbalanced voltage of the system, and subsequently the false operation of the protective relay on the load side occurs. Herein, this paper proposes the method to correct errors in the phase current to prevent the false operation of the protective relay by applying p-q theory and presents the simulation result of the error correction algorithm using PSCAD/EMTDC.

A Study on the Current Measurement Using birefringence Fiber (복굴절 광섬유를 이용한 전류측정에 관한 연구)

  • Jang Nam-Young;Choi Pyung-Suk;Eun Jae-Jeong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.2
    • /
    • pp.59-66
    • /
    • 2005
  • Accuracy of current measurement in fiber optic current sensor(FOCS), especially, unidirectional polarimetric fiber optic current sensor(PFOCS) is affected by the environment perturbations such as acoustic vibrations changes to the sensing fiber, and intrinsic perturbations such as the bending fiber that the sensing fiber wound around a current carrying wire. The perturbations affect the birefringence properties of sensing fiber in sensor head and cause false current readings. Thus, using compensation technique, reciprocal PFOCS, for unidirectional PFOCS the perturbations are suppressed. In this paper, we carried out the numerical analysis of performance in reciprocal PFOCS including the degree of polarization error, and false current of environmental and intrinsic perturbations on the sensing fiber. Also, we compared the effect of mirror with the faraday rotation mirror(FRM) in reciprocal PFOCS configuration. And the different optical source's wavelengths, 633nm and 1300nm is used. In the results, at 633nm, using mirror and FRM, the degree of polarization error is calculated to $2.3\%$ and $0.0196\%$, respectively. At $1300{\cal}nm$ using mirror and FRM the degree of polarization error is calculated to $9.97\%$ and $0.0196\%$, respectively. Also, compared with false current, the results is calculated to $9.82{\times}10^{-9}A$ and $1.4{\times}10^{-17}A$, respectively, and show that the reciprocal PFOCS is more robust configuration than unidiretionnal PFOCS for environmental and intrinsic perturbations.

  • PDF

Spectrum Sensing Techniques for Cognitive radio-A Review

  • Matin, Mohammad A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3638-3654
    • /
    • 2014
  • Cognitive Radio (CR) users need to sense the environment or channel at regular time interval for sharing the spectrum band of the primary users (PUs). Once find the spectrum idle, CR users start their transmission through it. Even while transmitting, they need to continue the sensing process so that they can leave the spectrum immediately whenever find a PU wanting to use the band. Therefore, detecting PUs is one of the main functions of cognitive radio before transmission and higher the detection probability ensures better protection to the primary users. However, it is not possible to attain a high detection probability (or a low miss detection probability) and low false alarm probability simultaneously as there is a tradeoff between false alarm probability ($P_{fa}$) and the probability of detection ($P_d$). In this paper, the author has provided a comprehensive study on different sensing techniques and discussed their advantages and disadvantages. Moreover, it is expected that, with this article, readers can have a through understanding of sensing techniques in CR and the current research trends in this area.

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.

Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid

  • Prasanna Srinivasan, V;Balasubadra, K;Saravanan, K;Arjun, V.S;Malarkodi, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2168-2187
    • /
    • 2021
  • The smart grid replaces the traditional power structure with information inventiveness that contributes to a new physical structure. In such a field, malicious information injection can potentially lead to extreme results. Incorrect, FDI attacks will never be identified by typical residual techniques for false data identification. Most of the work on the detection of FDI attacks is based on the linearized power system model DC and does not detect attacks from the AC model. Also, the overwhelming majority of current FDIA recognition approaches focus on FDIA, whilst significant injection location data cannot be achieved. Building on the continuous developments in deep learning, we propose a Deep Learning based Locational Detection technique to continuously recognize the specific areas of FDIA. In the development area solver gap happiness is a False Data Detector (FDD) that incorporates a Convolutional Neural Network (CNN). The FDD is established enough to catch the fake information. As a multi-label classifier, the following CNN is utilized to evaluate the irregularity and cooccurrence dependency of power flow calculations due to the possible attacks. There are no earlier statistical assumptions in the architecture proposed, as they are "model-free." It is also "cost-accommodating" since it does not alter the current FDD framework and it is only several microseconds on a household computer during the identification procedure. We have shown that ANN-MLP, SVM-RBF, and CNN can conduct locational detection under different noise and attack circumstances through broad experience in IEEE 14, 30, 57, and 118 bus systems. Moreover, the multi-name classification method used successfully improves the precision of the present identification.

Recent Issues related to the Medical Certificate and Prescriptions (진단서, 처방전과 관련된 최근의 쟁점)

  • Moon, Hyeon-Ho
    • The Korean Society of Law and Medicine
    • /
    • v.14 no.2
    • /
    • pp.49-80
    • /
    • 2013
  • The Issuance of false medical certificates on Criminal Law or the Medical Service Act are frequently applied to the insurance fraud cases related with the medical certificate, prescriptions. The meaning of medical certificate is not defined on the crime of Issuance of false medical certificates, but considering the rule of Paragraph 1 of Article 17 of the Medical Service Act, which punishes drawing up the medical certificate by anyone except the doctor who has directly examined, and the principle of legality, the medical certificate applied with the crime of Issuance of false medical certificates should (1) include the judgment after current medical ex-amination, (2) be written for the purpose of verifying the health status and (3) have a style that can be recognizable as medical document usually written by doctors. In addition, since there have been many argues on the range of application of the Paragraph 1 of Article 17 of the Medical Service Act, which generally regulates various kinds of documents such as medical certificates, prescriptions and others, which have different purpose and characters, the range of application of the clause above is needed to be interpreted strictly.

  • PDF