• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.027 seconds

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Performance Comparison of Transformer-based Intrusion Detection Model According to the Change of Character Encoding (문자 인코딩 방식의 변화에 따른 트랜스포머 기반 침입탐지 모델의 탐지성능 비교)

  • Kwan-Jae Kim;Soo-Jin Lee
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.41-49
    • /
    • 2024
  • A tokenizer, which is a key component of the Transformer model, lacks the ability to effectively comprehend numerical data. Therefore, to develop a Transformer-based intrusion detection model that can operate within a real-world network environment by training packet payloads as sentences, it is necessary to convert the hexadecimal packet payloads into a character-based format. In this study, we applied three character encoding methods to convert packet payloads into numeric or character format and analyzed how detection performance changes when training them on transformer architecture. The experimental dataset was generated by extracting packet payloads from PCAP files included in the UNSW-NB15 dataset, and the RoBERTa was used as the training model. The experimental results demonstrate that the ISO-8859-1 encoding scheme achieves the highest performance in both binary and multi-class classification. In addition, when the number of tokens is set to 512 and the maximum number of epochs is set to 15, the multi-class classification accuracy is improved to 88.77%.

Comparison analysis of YOLOv10 and existing object detection model performance

  • Joon-Yong Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.85-92
    • /
    • 2024
  • In this paper presents a comparative analysis of the performance between the latest object detection model, YOLOv10, and its previous versions. YOLOv10 introduces NMS-Free training, an enhanced model architecture, and an efficiency-centric design, resulting in outstanding performance. Experimental results using the COCO dataset demonstrate that YOLOv10-N maintains high accuracy of 39.5% and low latency of 1.84ms, despite having only 2.3M parameters and 6.7G floating-point operations (FLOPs). The key performance metrics used include the number of model parameters, FLOPs, average precision (AP), and latency. The analysis confirms the effectiveness of YOLOv10 as a real-time object detection model across various applications. Future research directions include testing on diverse datasets, further model optimization, and expanding application scenarios. These efforts aim to further enhance YOLOv10's versatility and efficiency.

BRCA1 Gene Exon 11 Mutations in Uighur and Han Women with Early-onset Sporadic Breast Cancer in the Northwest Region of China

  • Cao, Yu-Wen;Fu, Xin-Ge;Wan, Guo-Xing;Yu, Shi-Ying;Cui, Xiao-Bin;Li, Li;Jiang, Jin-Fang;Zheng, Yu-Qin;Zhang, Wen-Jie;Li, Feng
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.11
    • /
    • pp.4513-4518
    • /
    • 2014
  • The prevalence of BRCA1 gene mutations in breast cancer differs between diverse ethnic groups. Relatively little information is known about patterns of BRCA1 mutations in early-onset breast cancer in women of Uighur or Han descent, the major ethnic populations of the Xinjiang region in China. The aim of this study was to identify BRCA1 mutations in Uighur and Han patients with early-onset (age <35 years), and sporadic breast cancer for genetic predisposition to breast cancer. For detection of BRCA1 mutations, we used a polymerase chain reaction single-stranded conformation polymorphism approach, followed by direct DNA sequencing in 22 Uighur and 13 Han women with early-onset sporadic breast cancer, and 32 women with benign breast diseases. The prevalence of BRCA1 mutations in this population was 22.9% (8/35) among early-onset sporadic breast cancer cases. Of these, 31.8% (7/22) of Uighur patients and 7.69% (1/13) of Han patients were found to have BRCA1 mutations. In 7 Uighur patients with BRCA1 mutations, there were 11 unique sequence alterations in the BRCA1 gene, including 4 clearly disease-associated mutations on exon 11 and 3 variants of uncertain clinical significance on exon 11, meanwhile 4 neutral variants on intron 20 or 2. None of the 11 BRCA1 mutations identified have been previously reported in the Breast Cancer Information Core database. These findings reflect the prevalence of BRCA1 mutations in Uighur women with early-onset and sporadic breast cancer, which will allow for provision of appropriate genetic counseling and treatment for Uighur patients in the Xinjiang region.

A whole genome sequence association study of muscle fiber traits in a White Duroc×Erhualian F2 resource population

  • Guo, Tianfu;Gao, Jun;Yang, Bin;Yan, Guorong;Xiao, Shijun;Zhang, Zhiyan;Huang, Lusheng
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.5
    • /
    • pp.704-711
    • /
    • 2020
  • Objective: Muscle fiber types, numbers and area are crucial aspects associated with meat production and quality. However, there are few studies of pig muscle fibre traits in terms of the detection power, false discovery rate and confidence interval precision of whole-genome quantitative trait loci (QTL). We had previously performed genome scanning for muscle fibre traits using 183 microsatellites and detected 8 significant QTLs in a White Duroc×Erhualian F2 population. The confidence intervals of these QTLs ranged between 11 and 127 centimorgan (cM), which contained hundreds of genes and hampered the identification of QTLs. A whole-genome sequence imputation of the population was used for fine mapping in this study. Methods: A whole-genome sequences association study was performed in the F2 population. Genotyping was performed for 1,020 individuals (19 F0, 68 F1, and 933 F2). The whole-genome variants were imputed and 21,624,800 single nucleotide polymorphisms (SNPs) were identified and examined for associations to 11 longissimus dorsi muscle fiber traits. Results: A total of 3,201 significant SNPs comprising 7 novel QTLs showing associations with the relative area of fiber type I (I_RA), the fiber number per square centimeter (FN) and the total fiber number (TFN). Moreover, one QTL on pig chromosome 14 was found to affect both FN and TFN. Furthermore, four plausible candidate genes associated with FN (kinase non-catalytic C-lobe domain containing [KNDC1]), TFN (KNDC1), and I_RA (solute carrier family 36 member 4, contactin associated protein like 5, and glutamate metabotropic receptor 8) were identified. Conclusion: An efficient and powerful imputation-based association approach was utilized to identify genes potentially associated with muscle fiber traits. These identified genes and SNPs could be explored to improve meat production and quality via marker-assisted selection in pigs.

An Efficient Video Sequence Matching Algorithm (효율적인 비디오 시퀀스 정합 알고리즘)

  • 김상현;박래홍
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.5
    • /
    • pp.45-52
    • /
    • 2004
  • According tothe development of digital media technologies various algorithms for video sequence matching have been proposed to match the video sequences efficiently. A large number of video sequence matching methods have focused on frame-wise query, whereas a relatively few algorithms have been presented for video sequence matching or video shot matching. In this paper, we propose an efficientalgorithm to index the video sequences and to retrieve the sequences for video sequence query. To improve the accuracy and performance of video sequence matching, we employ the Cauchy function as a similarity measure between histograms of consecutive frames, which yields a high performance compared with conventional measures. The key frames extracted from segmented video shots can be used not only for video shot clustering but also for video sequence matching or browsing, where the key frame is defined by the frame that is significantly different from the previous fames. Several key frame extraction algorithms have been proposed, in which similar methods used for shot boundary detection were employed with proper similarity measures. In this paper, we propose the efficient algorithm to extract key frames using the cumulative Cauchy function measure and. compare its performance with that of conventional algorithms. Video sequence matching can be performed by evaluating the similarity between data sets of key frames. To improve the matching efficiency with the set of extracted key frames we employ the Cauchy function and the modified Hausdorff distance. Experimental results with several color video sequences show that the proposed method yields the high matching performance and accuracy with a low computational load compared with conventional algorithms.

Diagnostic Value of Interleukin 21 and Carcinoembryonic Antigen Levels in Malignant Pleural Effusions

  • Bunjhoo, Hansvin;Wang, Zheng-Yun;Chen, Hui-Long;Cheng, Sheng;Xiong, Wei-Ning;Xu, Yong-Jian;Cao, Yong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.7
    • /
    • pp.3495-3499
    • /
    • 2012
  • The aim of this study was to evaluate the diagnostic value of interleukin 21(IL-21) and carcinoembryonic antigen (CEA) in tuberculous pleural effusions (TPEs) and malignant pleural effusions (MPEs). Pleural effusion samples from 103 patients were classified on the basis of diagnosis as TPE (n=51) and MPE (n=52). The concentration of IL-21 was determined by ELISA. Lactate dehydrogenase (LDH), adenosine dehydrogenase (ADA) and CEA levels were also determined in all patients. A significant difference was observed in the levels of ADA and CEA (P<0.01), but not in the levels of LDH (P>0.05) between TPE and MPE. The concentration of IL-21 in MPE was significantly higher compared to TPE (P<0.01). With a threshold value of 4.32 pg/ml, IL-21 had a sensitivity of 76.9% (40/52) and a specificity of 80.4% (41/51). Combined detection of IL-21 and CEA had a sensitivity of 69.2% (36/52) and a specificity of 92.2% (47/51). These two markers can contribute to the differential diagnosis of MPEs.

A Machine Learning-Based Encryption Behavior Cognitive Technique for Ransomware Detection (랜섬웨어 탐지를 위한 머신러닝 기반 암호화 행위 감지 기법)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.55-62
    • /
    • 2023
  • Recent ransomware attacks employ various techniques and pathways, posing significant challenges in early detection and defense. Consequently, the scale of damage is continually growing. This paper introduces a machine learning-based approach for effective ransomware detection by focusing on file encryption and encryption patterns, which are pivotal functionalities utilized by ransomware. Ransomware is identified by analyzing password behavior and encryption patterns, making it possible to detect specific ransomware variants and new types of ransomware, thereby mitigating ransomware attacks effectively. The proposed machine learning-based encryption behavior detection technique extracts encryption and encryption pattern characteristics and trains them using a machine learning classifier. The final outcome is an ensemble of results from two classifiers. The classifier plays a key role in determining the presence or absence of ransomware, leading to enhanced accuracy. The proposed technique is implemented using the numpy, pandas, and Python's Scikit-Learn library. Evaluation indicators reveal an average accuracy of 94%, precision of 95%, recall rate of 93%, and an F1 score of 95%. These performance results validate the feasibility of ransomware detection through encryption behavior analysis, and further research is encouraged to enhance the technique for proactive ransomware detection.

Development of Urban Wildlife Detection and Analysis Methodology Based on Camera Trapping Technique and YOLO-X Algorithm (카메라 트래핑 기법과 YOLO-X 알고리즘 기반의 도시 야생동물 탐지 및 분석방법론 개발)

  • Kim, Kyeong-Tae;Lee, Hyun-Jung;Jeon, Seung-Wook;Song, Won-Kyong;Kim, Whee-Moon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.26 no.4
    • /
    • pp.17-34
    • /
    • 2023
  • Camera trapping has been used as a non-invasive survey method that minimizes anthropogenic disturbance to ecosystems. Nevertheless, it is labor-intensive and time-consuming, requiring researchers to quantify species and populations. In this study, we aimed to improve the preprocessing of camera trapping data by utilizing an object detection algorithm. Wildlife monitoring using unmanned sensor cameras was conducted in a forested urban forest and a green space on a university campus in Cheonan City, Chungcheongnam-do, Korea. The collected camera trapping data were classified by a researcher to identify the occurrence of species. The data was then used to test the performance of the YOLO-X object detection algorithm for wildlife detection. The camera trapping resulted in 10,500 images of the urban forest and 51,974 images of green spaces on campus. Out of the total 62,474 images, 52,993 images (84.82%) were found to be false positives, while 9,481 images (15.18%) were found to contain wildlife. As a result of wildlife monitoring, 19 species of birds, 5 species of mammals, and 1 species of reptile were observed within the study area. In addition, there were statistically significant differences in the frequency of occurrence of the following species according to the type of urban greenery: Parus varius(t = -3.035, p < 0.01), Parus major(t = 2.112, p < 0.05), Passer montanus(t = 2.112, p < 0.05), Paradoxornis webbianus(t = 2.112, p < 0.05), Turdus hortulorum(t = -4.026, p < 0.001), and Sitta europaea(t = -2.189, p < 0.05). The detection performance of the YOLO-X model for wildlife occurrence was analyzed, and it successfully classified 94.2% of the camera trapping data. In particular, the number of true positive predictions was 7,809 images and the number of false negative predictions was 51,044 images. In this study, the object detection algorithm YOLO-X model was used to detect the presence of wildlife in the camera trapping data. In this study, the YOLO-X model was used with a filter activated to detect 10 specific animal taxa out of the 80 classes trained on the COCO dataset, without any additional training. In future studies, it is necessary to create and apply training data for key occurrence species to make the model suitable for wildlife monitoring.

EE03 Development of an Automotive Anti-Theft System

  • Batra, Pulkit
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.1-10
    • /
    • 2015
  • Automotive Theft has been an obstinate problem around the world. Design and manufacture of anti-theft systems have become more and more complex due to the rise in complexity of theft in the system. Most of the anti-theft systems available in the market, are the alarm types which audibly deter some thieves away but do not prevent one's car from being stolen and even are not good enough to meet the growing complexity of theft in the country. This paper presents a simple and an efficient anti-theft system which provides improved security by the use of efficient access mechanisms and immobilization systems. This security system can immobilise an automobile and its key auto systems through remote control when it is stolen. It hence deters thieves from committing the theft. It also effectively prevents stealing of key auto systems for reselling by introducing four layers of security features written in the form of firmware and embedded on the Electronic Control Units (ECUs). The particulars of system design and operation are defined in the paper. The experimental outcomes show that this system is practicable and the owner can steadily control his vehicle within a few seconds.