• Title/Summary/Keyword: False Detection

Search Result 1,207, Processing Time 0.032 seconds

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

TsCNNs-Based Inappropriate Image and Video Detection System for a Social Network

  • Kim, Youngsoo;Kim, Taehong;Yoo, Seong-eun
    • Journal of Information Processing Systems
    • /
    • v.18 no.5
    • /
    • pp.677-687
    • /
    • 2022
  • We propose a detection algorithm based on tree-structured convolutional neural networks (TsCNNs) that finds pornography, propaganda, or other inappropriate content on a social media network. The algorithm sequentially applies the typical convolutional neural network (CNN) algorithm in a tree-like structure to minimize classification errors in similar classes, and thus improves accuracy. We implemented the detection system and conducted experiments on a data set comprised of 6 ordinary classes and 11 inappropriate classes collected from the Korean military social network. Each model of the proposed algorithm was trained, and the performance was then evaluated according to the images and videos identified. Experimental results with 20,005 new images showed that the overall accuracy in image identification achieved a high-performance level of 99.51%, and the effectiveness of the algorithm reduced identification errors by the typical CNN algorithm by 64.87 %. By reducing false alarms in video identification from the domain, the TsCNNs achieved optimal performance of 98.11% when using 10 minutes frame-sampling intervals. This indicates that classification through proper sampling contributes to the reduction of computational burden and false alarms.

Design and Implementation of Fire Detection System Using New Model Mixing

  • Gao, Gao;Lee, SangHyun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.260-267
    • /
    • 2021
  • In this paper, we intend to use a new mixed model of YoloV5 and DeepSort. For fire detection, we want to increase the accuracy by automatically extracting the characteristics of the flame in the image from the training data and using it. In addition, the high false alarm rate, which is a problem of fire detection, is to be solved by using this new mixed model. To confirm the results of this paper, we tested indoors and outdoors, respectively. Looking at the indoor test results, the accuracy of YoloV5 was 75% at 253Frame and 77% at 527Frame, and the YoloV5+DeepSort model showed the same accuracy at 75% at 253 frames and 77% at 527 frames. However, it was confirmed that the smoke and fire detection errors that appeared in YoloV5 disappeared. In addition, as a result of outdoor testing, the YoloV5 model had an accuracy of 75% in detecting fire, but an error in detecting a human face as smoke appeared. However, as a result of applying the YoloV5+DeepSort model, it appeared the same as YoloV5 with an accuracy of 75%, but it was confirmed that the false positive phenomenon disappeared.

A deep learning approach to permanent tooth germ detection on pediatric panoramic radiographs

  • Kaya, Emine;Gunec, Huseyin Gurkan;Aydin, Kader Cesur;Urkmez, Elif Seyda;Duranay, Recep;Ates, Hasan Fehmi
    • Imaging Science in Dentistry
    • /
    • v.52 no.3
    • /
    • pp.275-281
    • /
    • 2022
  • Purpose: The aim of this study was to assess the performance of a deep learning system for permanent tooth germ detection on pediatric panoramic radiographs. Materials and Methods: In total, 4518 anonymized panoramic radiographs of children between 5 and 13 years of age were collected. YOLOv4, a convolutional neural network (CNN)-based object detection model, was used to automatically detect permanent tooth germs. Panoramic images of children processed in LabelImg were trained and tested in the YOLOv4 algorithm. True-positive, false-positive, and false-negative rates were calculated. A confusion matrix was used to evaluate the performance of the model. Results: The YOLOv4 model, which detected permanent tooth germs on pediatric panoramic radiographs, provided an average precision value of 94.16% and an F1 value of 0.90, indicating a high level of significance. The average YOLOv4 inference time was 90 ms. Conclusion: The detection of permanent tooth germs on pediatric panoramic X-rays using a deep learning-based approach may facilitate the early diagnosis of tooth deficiency or supernumerary teeth and help dental practitioners find more accurate treatment options while saving time and effort

Four Segmentalized CBD Method Using Maximum Contrast Value to Improve Detection in the Presence of Reverberation (최대 컨트라스트 값을 이용한 4분할 CBD의 잔향 감소기법)

  • Choi, Jun-Hyeok;Yoon, Kyung-Sik;Lee, Soo-Hyung;Kwon, Bum-Soo;Lee, Kyun-Kyung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.8
    • /
    • pp.761-767
    • /
    • 2009
  • The detection of target echoes in a sonar image is usually difficult since reverberation is originated by the returns reflected around the boundary and volumes. Under the scenario of the target presence around the reverberation, the detection performance of existing algorithms is degraded. Since they have a similar statistical features. But proposed detector gives improvement existing algorithms Under this scenario. In this paper, 4 segmentation contrast box algorithm using maximum contrast value is proposed based on statistical segmentation, which gives better detection performance in the sense of reducing false alarms. The simulations validate the effectiveness of the proposed algorithm.

Improvement of Decarboxylating Agar Medium for Screening Biogenic Amine-Producting Bacteria in Kimchi

  • Mah, Jae-Hyung;Shin, Soon-Young;Lee, Heung-Shick;Cho, Hong-Yon;Hwang, Han-Joon
    • Journal of Microbiology and Biotechnology
    • /
    • v.11 no.3
    • /
    • pp.491-496
    • /
    • 2001
  • A modification of decarboxylating agar medium as described by niven was performed to improve the detection method of biogenic amine-producing bacteria and to eliminate the false-positive. A total of 120 bacterial strains isolated from kimchi were used to evaluate different dicarboxylating agar media and for screening biogenic amines. Potential false-positives ranged from approximately 66 to 79% of the strains tested in the already well-known media. In our improved medium, none of the 120 strains showed the potential false-positives. There was a good agreement (81.7%-87.5%) between the results obtained by the improved medium and by HPLC analysis. Consequently, this medium was greatly improved in screening biogenic amine-producing bacteria and discarding false-positives. Of the 120 kimchi isolates, 14.2, 18.3, 37.5, and 0.8% were found by HPLC to be the producers of histamine, tyramine, putrescine (as a form of spermine), and cadaverine, respectively. The proportion of biogenic amine producer during kimchi fermentation increased to a maximum at an immature period and decreased thereafter.

  • PDF

Intelligent Shoes for Detecting Blind Falls Using the Internet of Things

  • Ahmad Abusukhon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2377-2398
    • /
    • 2023
  • In our daily lives, we engage in a variety of tasks that rely on our senses, such as seeing. Blindness is the absence of the sense of vision. According to the World Health Organization, 2.2 billion people worldwide suffer from various forms of vision impairment. Unfortunately, blind people face a variety of indoor and outdoor challenges on a daily basis, limiting their mobility and preventing them from engaging in other activities. Blind people are very vulnerable to a variety of hazards, including falls. Various barriers, such as stairs, can cause a fall. The Internet of Things (IoT) is used to track falls and send a warning message to the blind caretakers. One of the gaps in the previous works is that they were unable to differentiate between falls true and false. Treating false falls as true falls results in many false alarms being sent to the blind caretakers and thus, they may reject the IoT system. As a means of bridging this chasm, this paper proposes an intelligent shoe that is able to precisely distinguish between false and true falls based on three sensors, namely, the load scale sensor, the light sensor, and the Flex sensor. The proposed IoT system is tested in an indoor environment for various scenarios of falls using four models of machine learning. The results from our system showed an accuracy of 0.96%. Compared to the state-of-the-art, our system is simpler and more accurate since it avoids sending false alarms to the blind caretakers.

Performance Improvement of Double Talk Detection before Convergence of the Echo Canceller by Using Linear Predictive Coding Filter Gain of the Primary Input Signal (주입력신호의 LPC 필터 이득을 이용한 반향제거기의 수렴전 동시통화검출 성능 개선)

  • Yoo, Jae-Ha
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.628-633
    • /
    • 2014
  • This paper proposes a performance improvement method of the conventional double talk detection method which can operate before convergence of the echo canceller. The proposed method estimates the coefficients of the linear predictive coding(LPC) filter by using the primary input signal. The time-varying threshold for double talk detection is determined based on the LPC filter gain of the primary input signal level. The proposed method can reduce not only false detection rate which means wrong detection of single talk as double talk but also double talk detection delay. Computer simulation was performed using a long-term real speech signals. It is shown that the proposed method improves the conventional method in terms of lowering the false detection rate and shortening the detection delay.

Sequence based Intrusion Detection using Similarity Matching of the Multiple Sequence Alignments (다중서열정렬의 유사도 매칭을 이용한 순서기반 침입탐지)

  • Kim Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.115-122
    • /
    • 2006
  • The most methods for intrusion detection are based on the misuse detection which accumulates hewn intrusion information and makes a decision of an attack against any behavior data. However it is very difficult to detect a new or modified aoack with only the collected patterns of attack behaviors. Therefore, if considering that the method of anomaly behavior detection actually has a high false detection rate, a new approach is required for very huge intrusion patterns based on sequence. The approach can improve a possibility for intrusion detection of known attacks as well as modified and unknown attacks in addition to the similarity measurement of intrusion patterns. This paper proposes a method which applies the multiple sequence alignments technique to the similarity matching of the sequence based intrusion patterns. It enables the statistical analysis of sequence patterns and can be implemented easily. Also, the method reduces the number of detection alerts and false detection for attacks according to the changes of a sequence size.

A Novel GNSS Spoofing Detection Technique with Array Antenna-Based Multi-PRN Diversity

  • Lee, Young-Seok;Yeom, Jeong Seon;Noh, Jae Hee;Lee, Sang Jeong;Jung, Bang Chul
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.3
    • /
    • pp.169-177
    • /
    • 2021
  • In this paper, we propose a novel global navigation satellite system (GNSS) spoofing detection technique through an array antenna-based direction of arrival (DoA) estimation of satellite and spoofer. Specifically, we consider a sophisticated GNSS spoofing attack scenario where the spoofer can accurately mimic the multiple pseudo-random number (PRN) signals since the spoofer has its own GNSS receiver and knows the location of the target receiver in advance. The target GNSS receiver precisely estimates the DoA of all PRN signals using compressed sensing-based orthogonal matching pursuit (OMP) even with a small number of samples, and it performs spoofing detection from the DoA estimation results of all PRN signals. In addition, considering the initial situation of a sophisticated spoofing attack scenario, we designed the algorithm to have high spoofing detection performance regardless of the relative spoofing signal power. Therefore, we do not consider the assumption in which the power of the spoofing signal is about 3 dB greater than that of the authentic signal. Then, we introduce design parameters to get high true detection probability and low false alarm probability in tandem by considering the condition for the presence of signal sources and the proximity of the DoA between authentic signals. Through computer simulations, we compare the DoA estimation performance between the conventional signal direction estimation method and the OMP algorithm in few samples. Finally, we show in the sophisticated spoofing attack scenario that the proposed spoofing detection technique using OMP-based estimated DoA of all PRN signals outperforms the conventional spoofing detection scheme in terms of true detection and false alarm probability.