• Title/Summary/Keyword: False Detection

Search Result 1,207, Processing Time 0.028 seconds

Moving Object Detection using Gaussian Pyramid based Subtraction Images in Road Video Sequences (가우시안 피라미드 기반 차영상을 이용한 도로영상에서의 이동물체검출)

  • Kim, Dong-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5856-5864
    • /
    • 2011
  • In this paper, we propose a moving object detection method in road video sequences acquired from a stationary camera. Our proposed method is based on the background subtraction method using Gaussian pyramids in both the background images and input video frames. It is more effective than pixel based subtraction approaches to reduce false detections which come from the mis-registration between current frames and the background image. And to determine a threshold value automatically in subtracted images, we calculate the threshold value using Otsu's method in each frame and then apply a scalar Kalman filtering to the threshold value. Experimental results show that the proposed method effectively detects moving objects in road video images.

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

  • Rathore, Shailendra;Sharma, Pradip Kumar;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.1014-1028
    • /
    • 2017
  • Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.

A Clustering-Based Fault Detection Method for Steam Boiler Tube in Thermal Power Plant

  • Yu, Jungwon;Jang, Jaeyel;Yoo, Jaeyeong;Park, June Ho;Kim, Sungshin
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.848-859
    • /
    • 2016
  • System failures in thermal power plants (TPPs) can lead to serious losses because the equipment is operated under very high pressure and temperature. Therefore, it is indispensable for alarm systems to inform field workers in advance of any abnormal operating conditions in the equipment. In this paper, we propose a clustering-based fault detection method for steam boiler tubes in TPPs. For data clustering, k-means algorithm is employed and the number of clusters are systematically determined by slope statistic. In the clustering-based method, it is assumed that normal data samples are close to the centers of clusters and those of abnormal are far from the centers. After partitioning training samples collected from normal target systems, fault scores (FSs) are assigned to unseen samples according to the distances between the samples and their closest cluster centroids. Alarm signals are generated if the FSs exceed predefined threshold values. The validity of exponentially weighted moving average to reduce false alarms is also investigated. To verify the performance, the proposed method is applied to failure cases due to boiler tube leakage. The experiment results show that the proposed method can detect the abnormal conditions of the target system successfully.

A Hybrid Soft Computing Technique for Software Fault Prediction based on Optimal Feature Extraction and Classification

  • Balaram, A.;Vasundra, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.348-358
    • /
    • 2022
  • Software fault prediction is a method to compute fault in the software sections using software properties which helps to evaluate the quality of software in terms of cost and effort. Recently, several software fault detection techniques have been proposed to classifying faulty or non-faulty. However, for such a person, and most studies have shown the power of predictive errors in their own databases, the performance of the software is not consistent. In this paper, we propose a hybrid soft computing technique for SFP based on optimal feature extraction and classification (HST-SFP). First, we introduce the bat induced butterfly optimization (BBO) algorithm for optimal feature selection among multiple features which compute the most optimal features and remove unnecessary features. Second, we develop a layered recurrent neural network (L-RNN) based classifier for predict the software faults based on their features which enhance the detection accuracy. Finally, the proposed HST-SFP technique has the more effectiveness in some sophisticated technical terms that outperform databases of probability of detection, accuracy, probability of false alarms, precision, ROC, F measure and AUC.

Damage detection of bridges based on spectral sub-band features and hybrid modeling of PCA and KPCA methods

  • Bisheh, Hossein Babajanian;Amiri, Gholamreza Ghodrati
    • Structural Monitoring and Maintenance
    • /
    • v.9 no.2
    • /
    • pp.179-200
    • /
    • 2022
  • This paper proposes a data-driven methodology for online early damage identification under changing environmental conditions. The proposed method relies on two data analysis methods: feature-based method and hybrid principal component analysis (PCA) and kernel PCA to separate damage from environmental influences. First, spectral sub-band features, namely, spectral sub-band centroids (SSCs) and log spectral sub-band energies (LSSEs), are proposed as damage-sensitive features to extract damage information from measured structural responses. Second, hybrid modeling by integrating PCA and kernel PCA is performed on the spectral sub-band feature matrix for data normalization to extract both linear and nonlinear features for nonlinear procedure monitoring. After feature normalization, suppressing environmental effects, the control charts (Hotelling T2 and SPE statistics) is implemented to novelty detection and distinguish damage in structures. The hybrid PCA-KPCA technique is compared to KPCA by applying support vector machine (SVM) to evaluate the effectiveness of its performance in detecting damage. The proposed method is verified through numerical and full-scale studies (a Bridge Health Monitoring (BHM) Benchmark Problem and a cable-stayed bridge in China). The results demonstrate that the proposed method can detect the structural damage accurately and reduce false alarms by suppressing the effects and interference of environmental variations.

Improving the Rapidity and Accuracy of Carbapenem-Resistant Enterobacteriaceae Detection by Shortening the Enrichment Duration

  • Miyoung, Lee
    • Microbiology and Biotechnology Letters
    • /
    • v.50 no.4
    • /
    • pp.584-591
    • /
    • 2022
  • Identifying carbapenem-resistant Enterobacteriaceae (CRE) is necessary to prevent nosocomial CRE infection outbreaks. Here, a rapid identification method with reduced enrichment time was developed without compromising accuracy. A total of 49 rectal swabs requested for CRE screening at the Department of Diagnostic Medicine at Hospital B in Busan, Korea, were included in this study. Specimens were inoculated on MacConkey and CHROMID Carba media either directly or following enrichment for 3, 6, and 24 h in 100 μl trypticase soy broth containing an ertapenem disk. The enriched cultures were further inoculated on CHROMID Carba or MacConkey media containing an ertapenem disk. In total, 19 CRE and 5 carbapenem-intermediate Enterobacteriaceae isolates were obtained from the 49 swabs. Among the 19 CRE isolates, carbapenemase-producing Enterobacteriaceae constituted 13 strains. Moreover, of the 19 CRE isolates, 16 (81.25%) and 17 (88.24%) were identified from the direct cultures on MacConkey and CHROMID Carba media, respectively. After 3 h of enrichment, the proportions of the CRE identified in the media were: MacConkey medium, 16/19 (81.25%); CHROMID Carba medium, 17/19 (88.24%); and MacConkey medium containing an ertapenem disk, 17/19 (88.24%). The detection rates after 6 h of enrichment were the same for all three media (19/19 strains, 100%), whereas those after 24 h of enrichment were 21, 22, and 24 strains, respectively, but included false positives. These findings suggest that a 6-h enrichment before inoculation on the CHROMID Carba medium is optimal for the rapid and accurate detection of CRE in clinical samples.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.

Vehicle detection and tracking algorithm based on improved feature extraction

  • Xiaole Ge;Feng Zhou;Shuaiting Chen;Gan Gao;Rugang Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2642-2664
    • /
    • 2024
  • In the process of modern traffic management, information technology has become an important part of intelligent traffic governance. Real-time monitoring can accurately and effectively track and record vehicles, which is of great significance to modern urban traffic management. Existing tracking algorithms are affected by the environment, viewpoint, etc., and often have problems such as false detection, imprecise anchor boxes, and ID switch. Based on the YOLOv5 algorithm, we improve the loss function, propose a new feature extraction module to obtain the receptive field at different scales, and do adaptive fusion with the SGE attention mechanism, so that it can effectively suppress the noise information during feature extraction. The trained model improves the mAP value by 5.7% on the public dataset UA-DETRAC without increasing the amount of calculations. Meanwhile, for vehicle feature recognition, we adaptively adjust the network structure of the DeepSort tracking algorithm. Finally, we tested the tracking algorithm on the public dataset and in a realistic scenario. The results show that the improved algorithm has an increase in the values of MOTA and MT etc., which generally improves the reliability of vehicle tracking.

The Study on the Verification of Speaker Change using GMM-UBM based KL distance (GMM-UBM 기반 KL 거리를 활용한 화자변화 검증에 대한 연구)

  • Cho, Joon-Beom;Lee, Ji-eun;Lee, Kyong-Rok
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.71-77
    • /
    • 2016
  • In this paper, we proposed a verification of speaker change utilizing the KL distance based on GMM-UBM to improve the performance of conventional BIC based Speaker Change Detection(SCD). We have verified Conventional BIC-based SCD using KL-distance based SCD which is robust against difference of information volume than BIC-based SCD. And we have applied GMM-UBM to compensate asymmetric information volume. Conventional BIC-based SCD was composed of two steps. Step 1, to detect the Speaker Change Candidate Point(SCCP). SCCP is positive local maximum point of dissimilarity d. Step 2, to determine the Speaker Change Point(SCP). If ${\Delta}BIC$ of SCCP is positive, it decides to SCP. We examined verification of SCP using GMM-UBM based KL distance D. If the value of D on each SCP is higher than threshold, we accepted that point to the final SCP. In the experimental condition MDR(Missed Detection Rate) is 0, FAR(False Alarm Rate) when the threshold value of 0.028 has been improved to 60.7%.

Face Detection Using Adaboost and Template Matching of Depth Map based Block Rank Patterns (Adaboost와 깊이 맵 기반의 블록 순위 패턴의 템플릿 매칭을 이용한 얼굴검출)

  • Kim, Young-Gon;Park, Rae-Hong;Mun, Seong-Su
    • Journal of Broadcast Engineering
    • /
    • v.17 no.3
    • /
    • pp.437-446
    • /
    • 2012
  • A face detection algorithms using two-dimensional (2-D) intensity or color images have been studied for decades. Recently, with the development of low-cost range sensor, three-dimensional (3-D) information (i.e., depth image that represents the distance between a camera and objects) can be easily used to reliably extract facial features. Most people have a similar pattern of 3-D facial structure. This paper proposes a face detection method using intensity and depth images. At first, adaboost algorithm using intensity image classifies face and nonface candidate regions. Each candidate region is divided into $5{\times}5$ blocks and depth values are averaged in each block. Then, $5{\times}5$ block rank pattern is constructed by sorting block averages of depth values. Finally, candidate regions are classified as face and nonface regions by matching the constructed depth map based block rank patterns and a template pattern that is generated from training data set. For template matching, the $5{\times}5$ template block rank pattern is prior constructed by averaging block ranks using training data set. The proposed algorithm is tested on real images obtained by Kinect range sensor. Experimental results show that the proposed algorithm effectively eliminates most false positives with true positives well preserved.