• Title/Summary/Keyword: false-positive error

Search Result 72, Processing Time 0.023 seconds

Frozen Section -Application in the Surgical Pathology- (동결절편법(Frozen Section) -외과병리 영역에서의 적용에 대하여-)

  • Chai, Won-Hee;Lee, Tae-Sook;Hong, Suk-Jae
    • Journal of Yeungnam Medical Science
    • /
    • v.3 no.1
    • /
    • pp.179-183
    • /
    • 1986
  • The frozen section technique is a means of intraoperative pathological diagnosis, and a procedure of great value to the surgeon. This method should be accurate, rapid and reliable. This method serves useful purposes, such as determining the presence of tumor, its type(especially whether it is benign or malignant), the adequacy of a biopsy of a suspected lesion, and the conditions of the surgical margins. But, it bears many disadvantages, the most of which is the danger of incorrect diagnosis. We studied the indications, the limitations, and the accuracy of the frozen section method and the materials studies was total of frozen section during recent 3 years. The overall accuracy of the frozen section diagnosis of 809 cases was 98.1% with 0.5% of false negative, 0% of false positive, 0.5% of incorrect histological diagnosis or grading errors, and 0.9% of deferred cases. The tissues submitted were lymph node, gastrointestinal tract, skin subcutaneous tissues in decreasing oder of frequency. The false positive case is not present, while the false negative cases were 4.

  • PDF

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.

A Design of the SMBC for Improving Reliability of Blocking Spam Mail (스팸 메일 차단 신뢰도 향상을 위한 SMBC 플랫폼 설계)

  • Park Nho-Kyung;Han Sung-Ho;Seo Sang-Jin;Jin Hyun-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.730-735
    • /
    • 2005
  • While the E-mail is a important way of fast communication in these days. it is real that the E-mail is often misused as a commercial advertisement method and creates many social problems. Even though various filtering techniques for blocking spam mails have been developed, reliability of mail systems is decreased by misreading normal mails as spam mails, i.e. false-positive errors. In this paper, the SMBC(Spam Mail Blocking Center) platform employing spam mail recovery method based on privacy information is proposed and designed. The SMBC is designed in frame layer based on spam blocking system of proxy sewer and can be physically implemented in various topology so that flexible development with layered module is possible. Using privacy information makes the proposed SMBC platform minimize processing load and false-positive error rates so that it can improve mail system reliabilities.

An Adaptive Watermark Detection Algorithm for Vector Geographic Data

  • Wang, Yingying;Yang, Chengsong;Ren, Na;Zhu, Changqing;Rui, Ting;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.323-343
    • /
    • 2020
  • With the rapid development of computer and communication techniques, copyright protection of vector geographic data has attracted considerable research attention because of the high cost of such data. A novel adaptive watermark detection algorithm is proposed for vector geographic data that can be used to qualitatively analyze the robustness of watermarks against data addition attacks. First, a watermark was embedded into the vertex coordinates based on coordinate mapping and quantization. Second, the adaptive watermark detection model, which is capable of calculating the detection threshold, false positive error (FPE) and false negative error (FNE), was established, and the characteristics of the adaptive watermark detection algorithm were analyzed. Finally, experiments were conducted on several real-world vector maps to show the usability and robustness of the proposed algorithm.

Theoretical Considerations for the Agresti-Coull Type Confidence Interval in Misclassified Binary Data (오분류된 이진자료에서 Agresti-Coull유형의 신뢰구간에 대한 이론적 고찰)

  • Lee, Seung-Chun
    • Communications for Statistical Applications and Methods
    • /
    • v.18 no.4
    • /
    • pp.445-455
    • /
    • 2011
  • Although misclassified binary data occur frequently in practice, the statistical methodology available for the data is rather limited. In particular, the interval estimation of population proportion has relied on the classical Wald method. Recently, Lee and Choi (2009) developed a new confidence interval by applying the Agresti-Coull's approach and showed the efficiency of their proposed confidence interval numerically, but a theoretical justification has not been explored yet. Therefore, a Bayesian model for the misclassified binary data is developed to consider the Agresti-Coull confidence interval from a theoretical point of view. It is shown that the Agresti-Coull confidence interval is essentially a Bayesian confidence interval.

Delamination identification of laminated composite plates using measured mode shapes

  • Xu, Yongfeng;Chen, Da-Ming;Zhu, Weidong;Li, Guoyi;Chattopadhyay, Aditi
    • Smart Structures and Systems
    • /
    • v.23 no.2
    • /
    • pp.195-205
    • /
    • 2019
  • An accurate non-model-based method for delamination identification of laminated composite plates is proposed in this work. A weighted mode shape damage index is formulated using squared weighted difference between a measured mode shape of a composite plate with delamination and one from a polynomial that fits the measured mode shape of the composite plate with a proper order. Weighted mode shape damage indices associated with at least two measured mode shapes of the same mode are synthesized to formulate a synthetic mode shape damage index to exclude some false positive identification results due to measurement noise and error. An auxiliary mode shape damage index is proposed to further assist delamination identification, by which some false negative identification results can be excluded and edges of a delamination area can be accurately and completely identified. Both numerical and experimental examples are presented to investigate effectiveness of the proposed method, and it is shown that edges of a delamination area in composite plates can be accurately and completely identified when measured mode shapes are contaminated by measurement noise and error. In the experimental example, identification results of a composite plate with delamination from the proposed method are validated by its C-scan image.

The Role of Artificial Observations in Testing for the Difference of Proportions in Misclassified Binary Data

  • Lee, Seung-Chun
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.3
    • /
    • pp.513-520
    • /
    • 2012
  • An Agresti-Coull type test is considered for the difference of binomial proportions in two doubly sampled data subject to false-positive error. The performance of the test is compared with the likelihood-based tests. It is shown that the Agresti-Coull test has many desirable properties in that it can approximate the nominal significance level with compatible power performance.

Confidence Intervals for the Difference of Binomial Proportions in Two Doubly Sampled Data

  • Lee, Seung-Chun
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.3
    • /
    • pp.309-318
    • /
    • 2010
  • The construction of asymptotic confidence intervals is considered for the difference of binomial proportions in two doubly sampled data subject to false-positive error. The coverage behaviors of several likelihood based confidence intervals and a Bayesian confidence interval are examined. It is shown that a hierarchical Bayesian approach gives a confidence interval with good frequentist properties. Confidence interval based on the Rao score is also shown to have good performance in terms of coverage probability. However, the Wald confidence interval covers true value less often than nominal level.

Model Reduction with Abstraction : Case Study with Nemorize Game (추상화를 통한 모델의 축소 : 네모라이즈 게임 사례 연구)

  • Lee Jung-Lim;Kwon Gi-Hwon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.111-116
    • /
    • 2006
  • Given a state, it is essential to for the finite state model analysis (such as model checking) to decide whether or not the state is reachable. W a site of the model is small, the whole state space is to be explored exhaustively. However, it is very difficult or even impossible if a size of the model is large. In this case, the model can be reduced into a smaller one via abstraction which does not allow e false positive error. this paper, we devise such an abstraction and apply it to the Nemorize game solving. As a result, unsolved game due to the state explosion problem is solved with the proposed abstraction.

Performance Improvement of Infusion Detection System based on Hidden Markov Model through Privilege Flows Modeling (권한이동 모델링을 통한 은닉 마르코프 모델 기반 침입탐지 시스템의 성능 향상)

  • 박혁장;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.674-684
    • /
    • 2002
  • Anomaly detection techniques have teen devised to address the limitations of misuse detection approach for intrusion detection. An HMM is a useful tool to model sequence information whose generation mechanism is not observable and is an optimal modeling technique to minimize false-positive error and to maximize detection rate, However, HMM has the short-coming of login training time. This paper proposes an effective HMM-based IDS that improves the modeling time and performance by only considering the events of privilege flows based on the domain knowledge of attacks. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, as well as no loss of recognition performance.