• Title/Summary/Keyword: False Detection

Search Result 1,207, Processing Time 0.036 seconds

Development of IR Thermal Camera Detector based on Smartphone Interlocking for Hidden Camera Crime Prevention (몰래카메라 범죄방지를 위한 스마트폰 연동 기반의 IR 열카메라 탐지기 개발)

  • Kang, Young-Gil;Cho, Pil-Gu;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • The performance of hidden camera cameras is improving day by day due to miniaturization and advanced technology integration according to the speed of technological development of smartphones. As this external networking computing environment is advanced and diversified, exposure to hidden cameras in addition to general safety cameras is also increasing. On the other hand, the technology for detecting and preventing hidden cameras is not keeping up with the development and speed of these hidden cameras. Therefore, in this study, the heat of the hidden camera was detected using infrared thermal detection technology based on general image and thermal image synthesis technology, and the reflectance of each wavelength according to the difference in ambient temperature was analyzed to reduce the false positive rate.

Deep Learning based Frame Synchronization Using Convolutional Neural Network (합성곱 신경망을 이용한 딥러닝 기반의 프레임 동기 기법)

  • Lee, Eui-Soo;Jeong, Eui-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.501-507
    • /
    • 2020
  • This paper proposes a new frame synchronization technique based on convolutional neural network (CNN). The conventional frame synchronizers usually find the matching instance through correlation between the received signal and the preamble. The proposed method converts the 1-dimensional correlator ouput into a 2-dimensional matrix. The 2-dimensional matrix is input to a convolutional neural network, and the convolutional neural network finds the frame arrival time. Specifically, in additive white gaussian noise (AWGN) environments, the received signals are generated with random arrival times and they are used for training data of the CNN. Through computer simulation, the false detection probabilities in various signal-to-noise ratios are investigated and compared between the proposed CNN-based technique and the conventional one. According to the results, the proposed technique shows 2dB better performance than the conventional method.

Development of GK2A Convective Initiation Algorithm for Localized Torrential Rainfall Monitoring (국지성 집중호우 감시를 위한 천리안위성 2A호 대류운 전조 탐지 알고리즘 개발)

  • Park, Hye-In;Chung, Sung-Rae;Park, Ki-Hong;Moon, Jae-In
    • Atmosphere
    • /
    • v.31 no.5
    • /
    • pp.489-510
    • /
    • 2021
  • In this paper, we propose an algorithm for detecting convective initiation (CI) using GEO-KOMPSAT-2A/advanced meteorological imager data. The algorithm identifies clouds that are likely to grow into convective clouds with radar reflectivity greater than 35 dBZ within the next two hours. This algorithm is developed using statistical and qualitative analysis of cloud characteristics, such as atmospheric instability, cloud top height, and phase, for convective clouds that occurred on the Korean Peninsula from June to September 2019. The CI algorithm consists of four steps: 1) convective cloud mask, 2) cloud object clustering and tracking, 3) interest field tests, and 4) post-processing tests to remove non-convective objects. Validation, performed using 14 CI events that occurred in the summer of 2020 in Korean Peninsula, shows a total probability of detection of 0.89, false-alarm ratio of 0.46, and mean lead-time of 39 minutes. This algorithm can be useful warnings of rapidly developing convective clouds in future by providing information about CI that is otherwise difficult to predict from radar or a numerical prediction model. This CI information will be provided in short-term forecasts to help predict severe weather events such as localized torrential rainfall and hail.

Detection of Red Pepper Powders Origin based on Machine Learning (머신러닝 기반 고춧가루 원산지 판별기법)

  • Ryu, Sungmin;Park, Minseo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.355-360
    • /
    • 2022
  • As the increase cost of domestic red pepper and the increase of imported red pepper, damage cases such as false labeling of the origin of red pepper powder are issued. Accordingly we need to determine quickly and accurately for the origin of red pepper powder. The used method for presently determining the origin has the limitation in that it requires a lot of cost and time by experimentally comparing and analyzing the components of red pepper powder. To resolve the issues, this study proposes machine learning algorithm to classifiy domestic and imported red pepper powder. We have built machine learning model with 53 components contained in red pepper powder and validated. Through the proposed model, it was possible to identify which ingredients are importantly used in determining the origin. In the near future, it is expected that the cost of determining the origin can be further reduced by expanding to various foods as well as red pepper powder.

Two-Phase Approach for Data Quality Management for Slope Stability Monitoring (경사면의 안정성 모니터링 데이터의 품질관리를 위한 2 단계 접근방안)

  • Junhyuk Choi;Yongjin Kim;Junhwi Cho;Woocheol Jeong;Songhee Suk;Song Choi;Yongseong Kim;Bongjun Ji
    • Journal of the Korean Geosynthetics Society
    • /
    • v.22 no.1
    • /
    • pp.67-74
    • /
    • 2023
  • In order to monitor the stability of slopes, research on data-based slope failure prediction and early warning is increasing. However, most papers overlook the quality of data. Poor data quality can cause problems such as false alarms. Therefore, this paper proposes a two-step hybrid approach consisting of rules and machine learning models for quality control of data collected from slopes. The rule-based has the advantage of high accuracy and intuitive interpretation, and the machine learning model has the advantage of being able to derive patterns that cannot be explicitly expressed. The hybrid approach was able to take both of these advantages. Through a case study, the performance of using the two methods alone and the case of using the hybrid approach was compared, and the hybrid method was judged to have high performance. Therefore, it is judged that using a hybrid method is more appropriate than using the two methods alone for data quality control.

A Study on Improving Precision Rate in Security Events Using Cyber Attack Dictionary and TF-IDF (공격키워드 사전 및 TF-IDF를 적용한 침입탐지 정탐률 향상 연구)

  • Jongkwan Kim;Myongsoo Kim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.9-19
    • /
    • 2022
  • As the expansion of digital transformation, we are more exposed to the threat of cyber attacks, and many institution or company is operating a signature-based intrusion prevention system at the forefront of the network to prevent the inflow of attacks. However, in order to provide appropriate services to the related ICT system, strict blocking rules cannot be applied, causing many false events and lowering operational efficiency. Therefore, many research projects using artificial intelligence are being performed to improve attack detection accuracy. Most researches were performed using a specific research data set which cannot be seen in real network, so it was impossible to use in the actual system. In this paper, we propose a technique for classifying major attack keywords in the security event log collected from the actual system, assigning a weight to each key keyword, and then performing a similarity check using TF-IDF to determine whether an actual attack has occurred.

Inferior Vena Cava Stenosis Following Orthotopic Liver Transplantation: Differentiating Points from False Positives (뇌사자 간이식 후 발생한 하대정맥 협착: 위양성과의 감별점)

  • Yeonsoo Choi;Jin Hyeok Kim;Ung Bae Jeon;Joo Yeon Jang;Tae Un Kim;Hwaseong Ryu
    • Journal of the Korean Society of Radiology
    • /
    • v.84 no.3
    • /
    • pp.713-718
    • /
    • 2023
  • Orthotopic liver transplantation has become the treatment of choice for patients with end-stage liver disease. Various early or delayed vascular complications, including arterial pseudoaneurysm, thrombosis, or stenosis, and venous stenosis or occlusion, may lead to graft failure. Early detection and prompt management of such complications are essential to achieve successful transplantation and prevent the need for retransplantation. This report presents differentiating points, using computed tomography and digital subtraction angiography findings and measurement of pressure gradient across the stenotic lesion, that require immediate intervention in patients with inferior vena cava stenosis after orthotopic liver transplantation.

The Role of Camera-Based Coincidence Positron Emission Tomography in Nodal Staging of Non-Small Cell Lung Cancer (비소세포폐암의 림프절 병기 결정에서 Coincidence PET의 역할)

  • Lee, Sun-Min;Choi, Young-Hwa;Oh, Yoon-Jung;Cheong, Seong-Cheoll;Park, Kwang-Joo;Hwang, Sung-Chul;Lee, Yi-Hyeong;Park, Chan-H;Hahn, Myung-Ho
    • Tuberculosis and Respiratory Diseases
    • /
    • v.47 no.5
    • /
    • pp.642-649
    • /
    • 1999
  • Background: It is very important to determine an accurate staging of the non-small cell lung cancer(NSCLC) for an assessment of operability and it's prognosis. However, it is difficult to evaluate tumor involvement of mediastinal lymph nodes accurately utilizing noninvasive imaging modalities. PET is one of the sensitive and specific imaging modality. Unfortunately PET is limited use because of prohibitive cost involved with it's operation. Recently hybrid SPECT/PET(single photon emission computed tomography/positron emission tomography) camera based PET imaging was introduced with relatively low cost. We evaluated the usefulness of coincidence detection(CoDe) PET in the detection of metastasis to the mediastinal lymph nodes in patients with NSCLC. Methods: Twenty one patients with NSCLC were evaluated by CT or MRI and they were considered operable. CoDe PET was performed in all 21 patients prior to surgery. Tomographic slices of axial, coronal and sagittal planes were visually analysed. At surgery, mediastinal lymph nodes were removed and histological diagnosis was performed. CoDe PET findings were correlated with histological findings. Results: Twenty of 21 primary tumor masses were detected by the CoDe PET. Thirteen of 21 patients was correctly diagnosed mediastinal lymph node metastasis by the CoDe PET. Pathological N0 was 14 cases and the specificity of N0 of CoDe PET was 64.3%. Sensitivity, specificity, positive predictive value, negative predictive value and accuracy of N1 node was 83.3%, 73.3%, 55.6%, 91.7%, and 76.2% respectively. Sensitivity, specificity, positive predictive value, negative predictive value and accuracy of N2 node was 60.0%, 87.5%, 60.0%,87.5%, and 90.0% respectively. There were 3 false negative cases but the size of the 3 nodes were less than 1cm. The size of true positive nodes were 1.1cm, 1.0cm, 0.5cm respectively. There were 1 false positive among the 12 lymph nodes which were larger than 1cm. False positive cases consisted of 1 tuberculosis case, 1 pneumoconiosis case and 1 anthracosis case. Conclusion: CoDe PET has relatively high negative predictive value in the enlarged lymph node in staging of mediastinal nodes in patients with NSCLC. Therefore CoDe PET is useful in ruling out metastasis of enlarged N3 nodes. However, further study is needed including more number of patients in the future.

  • PDF

Empirical Forecast of Corotating Interacting Regions and Geomagnetic Storms Based on Coronal Hole Information (코로나 홀을 이용한 CIR과 지자기 폭풍의 경험적 예보 연구)

  • Lee, Ji-Hye;Moon, Yong-Jae;Choi, Yun-Hee;Yoo, Kye-Hwa
    • Journal of Astronomy and Space Sciences
    • /
    • v.26 no.3
    • /
    • pp.305-316
    • /
    • 2009
  • In this study, we suggest an empirical forecast of CIR (Corotating Interaction Regions) and geomagnetic storm based on the information of coronal holes (CH). For this we used CH data obtained from He I $10830{\AA}$ maps at National Solar Observatory-Kitt Peak from January 1996 to November 2003 and the CIR and storm data that Choi et al. (2009) identified. Considering the relationship among coronal holes, CIRs, and geomagnetic storms (Choi et al. 2009), we propose the criteria for geoeffective coronal holes; the center of CH is located between $N40^{\circ}$ and $S40^{\circ}$ and between $E40^{\circ}$ and $W20^{\circ}$, and its area in percentage of solar hemispheric area is larger than the following areas: (1) case 1: 0.36%, (2) case 2: 0.66%, (3) case 3: 0.36% for 1996-2000, and 0.66% for 2001-2003. Then we present contingency tables between prediction and observation for three cases and their dependence on solar cycle phase. From the contingency tables, we determined several statistical parameters for forecast evaluation such as PODy (the probability of detection yes), FAR (the false alarm ratio), Bias (the ratio of "yes" predictions to "yes" observations) and CSI (critical success index). Considering the importance of PODy and CSI, we found that the best criterion is case 3; CH-CIR: PODy=0.77, FAR=0.66, Bias=2.28, CSI=0.30. CH-storm: PODy=0.81, FAR=0.84, Bias=5.00, CSI=0.16. It is also found that the parameters after the solar maximum are much better than those before the solar maximum. Our results show that the forecasting of CIR based on coronal hole information is meaningful but the forecast of goemagnetic storm is challenging.

A study on the developmental plan of Alarm Monitoring Service (기계경비의 발전적 대응방안에 관한 연구)

  • Chung, Tae-Hwang;So, Seung-Young
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.145-168
    • /
    • 2010
  • Since Alarm Monitoring Service was introduced in Korea in 1981, the market has been increasing and is expected to increase continually. Some factors such as the increase of social security need and the change of safety consciousness, increase of persons who live alone could be affected positively on Alarm Monitoring Service industry. As Alarm Monitoring Service come into wide use, the understanding of electronic security service is spread and consumer's demand is difficult, so consideration about new developmental plan is need to respond to the change actively. Electronic security system is consist of various kinds of element, so every element could do their role equally. Alarm Monitoring Service should satisfy consumer's various needs because it is not necessary commodity, also electronic security device could be easily operated and it's appearance has to have a good design. To solve the false alarm problem, detection sensor's improvement should be considered preferentially and development of new type of sensor that operate dissimilarly to replace former sensor is needed. On the other hand, to settle the matter that occurred by response time, security company could explain the limit on Alarm Monitoring System to consumer honestly and ask for an understanding. If consumer could be joined into security activity by security agent's explanation, better security service would be provided with mutual confidence. To save response time the consideration on the introduction of GIS(Global Information System) is needed rather than GPS(Global Positioning System). Although training program for security agents is important, several benefits for security agents should be considered together. The development of new business model is required for preparation against market stagnation and the development of new commodity to secure consumer for housing service rather than commercial facility service. for the purpose of those, new commodity related to home-network system and video surveillance system could be considered, also new added service with network between security company and consumer for a basis is to be considered.

  • PDF