• Title/Summary/Keyword: False Detection

Search Result 1,207, Processing Time 0.024 seconds

Sentinel Node Biopsy Examination for Breast Cancer in a Routine Laboratory Practice: Results of a Pilot Study

  • Khoo, Joon-Joon;Ng, Chen-Siew;Sabaratnam, Subathra;Arulanantham, Sarojah
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.3
    • /
    • pp.1149-1155
    • /
    • 2016
  • Background: Examination of sentinel lymph node (SLN) biopsies provides accurate nodal staging for breast cancer and plays a key role in patient management. Procurement of SLNs and the methods used to process specimens are equally important. Increasing the level of detail in histopathological examination of SLNs increases detection of metastatic tumours but will also increase the burden of busy laboratories and thus may not be carried out routinely. Recommendation of a reasonable standard in SLN examination is required to ensure high sensitivity of results while maintaining a manageable practice workload. Materials and Methods: Twenty-four patients with clinically node-negative breast cancer were recruited. Combined radiotracer and blue dye methods were used for identification of SLNs. The nodes were thinly sliced and embedded. Serial sectioning and immunohistochemical (IHC) staining against AE1/AE3 were performed if initial H&E sections of the blocks were negative. Results: SLNs were successfully identified in all patients. Ten cases had nodal metastases with 7 detected in SLNs and 3 detected only in axillary nodes (false negative rate, FNR=30%). Some 5 out of 7 metastatic lesions in the SLNs (71.4%) were detected in initial sections of the thinly sliced tissue. Serial sectioning detected the remaining two cases with either micrometastases or isolated tumour cells (ITC). Conclusions: Thin slicing of tissue to 3-5mm thickness and serial sectioning improved the detection of micro and macro-metastases but the additional burden of serial sectioning gave low yield of micrometastases or ITC and may not be cost effective. IHC validation did not further increase sensitivity of detection. Therefore its use should only be limited to confirmation of suspicious lesions. False negative cases where SLNs were not involved could be due to skipped metastases to non-sentinel nodes or poor technique during procurement, resulting in missed detection of actual SLNs.

Performance Improvement of a Variability-index CFAR Detector for Heterogeneous Environment (비균질 환경에 강인한 검출기를 위한 변동 지수 CFAR의 성능 향상)

  • Shin, Jong-Woo;Kim, Wan-Jin;Do, Dae-Won;Lee, Dong-Hun;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.3
    • /
    • pp.37-46
    • /
    • 2012
  • In RADAR and SONAR detection systems, noise environment can be classified into homogeneous and heterogeneous environment. Especially heterogeneous environments are modelled as target masking and clutter edge. Since the variability-index (VI) CFAR, a composed CFAR algorithm, dynamically selects one of the mean-level algorithms based on the VI and the MR (mean ratio) test, it is robust to various environments. However, the VI CFAR still suffers from lowered detection probabilities in heterogeneous environments. To overcome these problems, we propose an improved VI CFAR processor where TM (trimmed mean) CFAR and a sub-windowing technique are introduced to minimize the degradation of the detection probabilities appeared in heterogeneous environments. Computer simulation results show that the proposed method has the better performance in terms of detection probability and false alarm probability compared to the VI CFAR and single CFAR algorithms.

Detection of Mass on Dense Mammogram (고밀도 유방영상에서 종양의 추출)

  • Yu, Seung-Hwa;No, Seung-Mu;Park, Jong-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.6
    • /
    • pp.721-734
    • /
    • 2001
  • This paper proposed automated methods for the detection of breast mass. We analysed characteristic of the mass by using the features on mammograms. The homogeneity was used to distinguish mass and abnormal homogeneous tissue from the Cooper's ligament and multiple threshold method was used to deal with the high density candidates. By using the 8-connectivity, the first step candidates were selected. We generated the dualistic images of each candidate in which we regard the gray value as topographic height information. From these candidates, the second candidates were selected by comparing the circularity and the distribution rates. The final detection was done with the method in which we generated the template of each candidate and compared each other. From these methods, we grade the order from the candidate. We applied the algorithm to the 136 mammograms and compared to the radiologist's outlines of the leisions. The detection resulted that the sensitivity of the proposed methods was 93.38% and 97.63% FP(False positive) which we can segmented mass in the first grade in the 124 cases.

  • PDF

Optimal Scheduling of Detection and Tracking Parameters in Phased Array Radars (위상배열 레이다 검출 및 추적 매개변수의 최적 스케쥴링)

  • Jung, Young-Hun;Kim, Hyun-Soo;Hong, Sun-Mog
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.7
    • /
    • pp.50-61
    • /
    • 1999
  • \In this paper, we consider the optimal scheduling of detection and tracking parameters in phased array radars to minimize the radar energy required for track maintenance in a cluttered environment. We develop a mathematical model of target detection induced by a search process in phased array radars. In the mathematical development, we take into account the effect of unwanted measurements that may have originated from clutter or false alarms in the detection process. We use and analytic approximation of the modified Riccati equation of the probabilistic data association (PDA) filter to take into account the effect of clutter interference in tracking. Based on the search process and the tracking models, we formulate the optimal scheduling problem into a nonlinear optimal control problem. We solve a constrained nonlinear optimization problem to obtain the solution of the optimal control problem.

  • PDF

Development and Evaluation of Automatic Incident Detection Algorithm using Modified Flow-Occupancy Diagram (수정교통량-점유율 관계도를 이용한 돌발상황 자동검지알고리즘 개발 및 평가)

  • Kim, Sang-Gu;Kim, Young-Chun
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.229-239
    • /
    • 2008
  • Most algorithms for detecting incidents have been developed under the premise that congestion must happen whenever an incident occurs. For that reason, the performance of these algorithms could not be guaranteed in cases where congestion did not happen due to traffic operations with low flows despite the occurrence of an incident. The objective of this paper is to develop an automatic incident detection algorithm using a new diagram that can reliably detect the incident under various conditions of traffic operations including a low volume state. Compared with the McMaster Algorithm, the proposed algorithm in this paper was evaluated with three different cases in which the incidents occur in traffic operations with a low volume state, a relatively high volume state, and a recurrent congestion state. It is shown that the new algorithm has a capability to identify the flow characteristics of incidents for all the three cases and is much better than McMaster algorithm in terms of detection rate and false alarm rate.

Adaptive Anomaly Movement Detection Approach Based On Access Log Analysis (접근 기록 분석 기반 적응형 이상 이동 탐지 방법론)

  • Kim, Nam-eui;Shin, Dong-cheon
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.45-51
    • /
    • 2018
  • As data utilization and importance becomes important, data-related accidents and damages are gradually increasing. Especially, insider threats are the most harmful threats. And these insider threats are difficult to detect by traditional security systems, so rule-based abnormal behavior detection method has been widely used. However, it has a lack of adapting flexibly to changes in new attacks and new environments. Therefore, in this paper, we propose an adaptive anomaly movement detection framework based on a statistical Markov model to detect insider threats in advance. This is designed to minimize false positive rate and false negative rate by adopting environment factors that directly influence the behavior, and learning data based on statistical Markov model. In the experimentation, the framework shows good performance with a high F2-score of 0.92 and suspicious behavior detection, which seen as a normal behavior usually. It is also extendable to detect various types of suspicious activities by applying multiple modeling algorithms based on statistical learning and environment factors.

  • PDF

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

A New Association Rule Mining based on Coverage and Exclusion for Network Intrusion Detection (네트워크 침입 탐지를 위한 Coverage와 Exclusion 기반의 새로운 연관 규칙 마이닝)

  • Tae Yeon Kim;KyungHyun Han;Seong Oun Hwang
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.77-87
    • /
    • 2023
  • Applying various association rule mining algorithms to the network intrusion detection task involves two critical issues: too large size of generated rule set which is hard to be utilized for IoT systems and hardness of control of false negative/positive rates. In this research, we propose an association rule mining algorithm based on the newly defined measures called coverage and exclusion. Coverage shows how frequently a pattern is discovered among the transactions of a class and exclusion does how frequently a pattern is not discovered in the transactions of the other classes. We compare our algorithm experimentally with the Apriori algorithm which is the most famous algorithm using the public dataset called KDDcup99. Compared to Apriori, the proposed algorithm reduces the resulting rule set size by up to 93.2 percent while keeping accuracy completely. The proposed algorithm also controls perfectly the false negative/positive rates of the generated rules by parameters. Therefore, network analysts can effectively apply the proposed association rule mining to the network intrusion detection task by solving two issues.

A Selection of Threshold for the Generalized Hough Transform: A Probabilistic Approach (일반화된 허프변환의 임계값 선택을 위한 확률적 접근방식)

  • Chang, Ji Y.
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.161-171
    • /
    • 2014
  • When the Hough transform is applied to identify an instance of a given model, the output is typically a histogram of votes cast by a set of image features into a parameter space. The next step is to threshold the histogram of counts to hypothesize a given match. The question is "What is a reasonable choice of the threshold?" In a standard implementation of the Hough transform, the threshold is selected heuristically, e.g., some fraction of the highest cell count. Setting the threshold too low can give rise to a false alarm of a given shape(Type I error). On the other hand, setting the threshold too high can result in mis-detection of a given shape(Type II error). In this paper, we derive two conditional probability functions of cell counts in the accumulator array of the generalized Hough transform(GHough), that can be used to select a scientific threshold at the peak detection stage of the Ghough.

A Hybrid Model of Network Intrusion Detection System : Applying Packet based Machine Learning Algorithm to Misuse IDS for Better Performance (Misuse IDS의 성능 향상을 위한 패킷 단위 기계학습 알고리즘의 결합 모형)

  • Weon, Ill-Young;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.301-308
    • /
    • 2004
  • Misuse IDS is known to have an acceptable accuracy but suffers from high rates of false alarms. We show a behavior based alarm reduction with a memory-based machine learning technique. Our extended form of IBL, (XIBL) examines SNORT alarm signals if that signal is worthy sending signals to security manager. An experiment shows that there exists an apparent difference between true alarms and false alarms with respect to XIBL behavior This gives clear evidence that although an attack in the network consists of a sequence of packets, decisions over Individual packet can be used in conjunction with misuse IDS for better performance.