• Title/Summary/Keyword: False Negative Rate

Search Result 162, Processing Time 0.028 seconds

Comparison of Methods for the Detection of Anti-HBs for Hepatitis B Vaccination Program in Korea (보건예방사업을 위한 B형간염 표면항체 검사방법 비교)

  • Lee, Jeong-Nyeo;Urm, Sang-Hwa;Lee, Jong-Tae;Chun, Jin-Ho;Sohn, Hae-Sook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.33 no.2
    • /
    • pp.226-230
    • /
    • 2000
  • Objectives : The purpose of this study was to suggest a proper method for the detection of heaptitis B surface antibody(anti-HBs) in a screening program for hepatitis B vaccination. Methods : Sensivitity, specificity and predictive values were compared between Immunochromatographic assay (ICA) and passive hemagglutination(PHA) in 978 subjects(565 males, 413 females, 19-78 years ranging in age, mean 46.5 years old). EIA was used as a standard method for the detection of HBsAb. Results : Sensitivity in the detection of anti-HBs of PHA and ICA was 88.7%, and 94.9%, specificity was 94.3% and 96.6%, negative predictive value was 96.5%, and 98.0%, and positive predictive value was 82.3%, and 91.3%,, respectively. False negative rate(11.3%) of PHA was higher than that(5.1%) of ICA. The higher the titer of anti-HBs in EIA was, the lower the false negative rate was. There was no false negative result in the cases with $101mIU/{\beta}c$ or more in EIA Conclusion : We suggest that ICA should be the choice of screening method in the detection of anti-HBs in Hepatitis B vaccination program.

  • PDF

The Design and Implementation of Anomaly Traffic Analysis System using Data Mining

  • Lee, Se-Yul;Cho, Sang-Yeop;Kim, Yong-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.316-321
    • /
    • 2008
  • Advanced computer network technology enables computers to be connected in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, which makes it vulnerable to previously unidentified attack patterns and variations in attack and increases false negatives. Intrusion detection and analysis technologies are thus required. This paper investigates the asymmetric costs of false errors to enhance the performances the detection systems. The proposed method utilizes the network model to consider the cost ratio of false errors. By comparing false positive errors with false negative errors, this scheme achieved better performance on the view point of both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of anomaly traffic detection is enhanced by considering the costs of false errors.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Causes of False Negative Bedside Head Impulse Test (나안 두부충동검사에서 위음성의 원인분석)

  • Kim, Dae-Young;Choi, Yoon-Gi;Kyung, Tae-Suk;Hwang, Jun-Ha;Kim, Hyun Ji;Lee, Seung Chul;Kim, Kyu-Sung
    • Korean Journal of Otorhinolaryngology-Head and Neck Surgery
    • /
    • v.60 no.3
    • /
    • pp.107-111
    • /
    • 2017
  • Background and Objectives The bedside head impulse test (bHIT) in bare eyes often overlooks possible vestibular losses by missing the corrective saccade. This is why it is necessary to compare bHIT against video head impulse test (vHIT), which is more accurate in identifying vestibular losses than the bedside test. Subjects and Method A total of 51 vHIT positive ears underwent the study, and out of those, 47 were diagnosed with dizziness. bHIT and vHIT were performed for patients, and the occurrence rate of overt saccade (OS) was calculated. Results Among the 51 vHIT positive ears, 33 (64.7%) were bHIT positive ears and 18 ears (35.3%) were bHIT negative. Patterns of positive vHIT were classified as A: no corrective saccade, B: covert saccade (CS) only, C: OS only, and D: CS with OS (CS+OS), which were 45 out of 51 ears (88%). The occurrence rate of OS was higher in the bHIT positive group than in the bHIT negative group (p=0.05), and higher in the CS negative group (CS-) than in the CS positive group (CS+) (p<0.001). Conclusion Possible causes of false negative results of bHIT are seen as following: the absence of corrective (covert and overt) saccade, the occurrence of CS only, and missing the OS during the bHIT (probably due to low occurrence rate of OS). The occurrence of CS should be considered as an important factor in false negative bHIT when lowering the occurrence rate of OS.

An Automatic Portscan Detection System with Adaptive Threshold Setting

  • Kim, Sang-Kon;Lee, Seung-Ho;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.74-85
    • /
    • 2010
  • For the purpose of compromising hosts, attackers including infected hosts initially perform a portscan using IP addresses in order to find vulnerable hosts. Considerable research related to portscan detection has been done and many algorithms have been proposed and implemented in the network intrusion detection system (NIDS). In order to distinguish portscanners from remote hosts, most portscan detection algorithms use a fixed threshold that is manually managed by the network manager. Because the threshold is a constant, even though the network environment or the characteristics of traffic can change, many false positives and false negatives are generated by NIDS. This reduces the efficiency of NIDS and imposes a high processing burden on a network management system (NMS). In this paper, in order to address this problem, we propose an automatic portscan detection system using an fast increase slow decrease (FISD) scheme, that will automatically and adaptively set the threshold based on statistical data for traffic during prior time periods. In particular, we focus on reducing false positives rather than false negatives, while the threshold is adaptively set within a range between minimum and maximum values. We also propose a new portscan detection algorithm, rate of increase in the number of failed connection request (RINF), which is much more suitable for our system and shows better performance than other existing algorithms. In terms of the implementation, we compare our scheme with other two simple threshold estimation methods for an adaptive threshold setting scheme. Also, we compare our detection algorithm with other three existing approaches for portscan detection using a real traffic trace. In summary, we show that FISD results in less false positives than other schemes and RINF can fast and accurately detect portscanners. We also show that the proposed system, including our scheme and algorithm, provides good performance in terms of the rate of false positives.

Validation of MODIS fire product over Sumatra and Borneo using High Resolution SPOT Imagery

  • LIEW, Soo-Chin;SHEN, Chaomin;LOW, John;Lim, Agnes;KWOH, Leong-Keong
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1149-1151
    • /
    • 2003
  • We performed a validation study of the MODIS active fire detection algorithm using high resolution SPOT image as the reference data set. Fire with visible smoke plumes are detected in the SPOT scenes, while the hotspots in MODIS data are detected using NASA's new version 4 fire detection algorithm. The detection performance is characterized by the commission error rate (false alarms) and the omission error rate (undetected fires). In the Sumatra and Kalimantan study area, the commission rate and the omission rate are 27% and 34% respectively. False alarms are probably due to recently burnt areas with warm surfaces. False negative detection occur where there are long smoke plumes and where fires occur in densely vegetated areas.

  • PDF

Efficacy of intraoperative neuromonitoring (IONM) and intraoperative indocyanine green videoangiography (ICG-VA) during unruptured anterior choroidal artery aneurysm clipping surgery

  • Chanbo Eun;Seung Joo Lee;Jung Cheol Park;Jae Sung Ahn;Byung Duk Kwun;Wonhyoung Park
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.25 no.2
    • /
    • pp.150-159
    • /
    • 2023
  • Objective: The aim of this study was to investigate the efficacy of intraoperative indocyanine green videoangiography (ICG-VA) and intraoperative neuromonitoring (IONM) to prevent postoperative ischemic complications during microsurgical clipping of unruptured anterior choroidal artery (AChA) aneurysms. Methods: We retrospectively reviewed the clinical and radiological records of all patients who had undergone microsurgical clipping for unruptured AChA aneurysms at our institution between April 2001 and December 2019. We compared the postoperative complication rate of the group for which intraoperative ICG-VA and IONM were utilized (group B; n=324) with that of the group for which intraoperative ICG-VA and IONM were not utilized (group A; n=72). Results: There were no statistically significant differences in demographic data between the two groups. Statistically significant differences were observed in the rate of overall complications (p=0.014) and postoperative ischemic complications related to AChA territory (p=0.039). All the cases (n=4) in group B who had postoperative infarctions related to AChA territory showed false-negative results of intraoperative ICG-VA and IONM. Conclusions: Preserving the patency of the AChA is essential to minimize postoperative complications. Intraoperative monitoring tools including ICG-VA and IONM can greatly contribute to lowering complication rates. However, their pitfalls and false-negative results should always be considered.

A novel watermarking scheme for authenticating individual data integrity of WSNs

  • Guangyong Gao;Min Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.938-957
    • /
    • 2023
  • The limited computing power of sensor nodes in wireless sensor networks (WSNs) and data tampering during wireless transmission are two important issues. In this paper, we propose a scheme for independent individual authentication of WSNs data based on digital watermarking technology. Digital watermarking suits well for WSNs, owing to its lower computational cost. The proposed scheme uses independent individual to generate a digital watermark and embeds the watermark in current data item. Moreover, a sink node extracts the watermark in single data and compares it with the generated watermark, thereby achieving integrity verification of data. Inherently, individual validation differs from the grouping-level validation, and avoids the lack of grouping robustness. The improved performance of individual integrity verification based on proposed scheme is validated through experimental analysis. Lastly, compared to other state-of-the-art schemes, our proposed scheme significantly reduces the false negative rate by an average of 5%, the false positive rate by an average of 80% of data verification, and increases the correct verification rate by 50% on average.

Comparison of Efficacy in Abnormal Cervical Cell Detection between Liquid-based Cytology and Conventional Cytology

  • Tanabodee, Jitraporn;Thepsuwan, Kitisak;Karalak, Anant;Laoaree, Orawan;Krachang, Anong;Manmatt, Kittipong;Anontwatanawong, Nualpan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.16
    • /
    • pp.7381-7384
    • /
    • 2015
  • This study was conducted to 1206 women who had cervical cancer screening at Chonburi Cancer Hospital. The spilt-sample study aimed to compare the efficacy of abnormal cervical cells detection between liquid-based cytology (LBC) and conventional cytology (CC). The collection of cervical cells was performed by broom and directly smeared on a glass slide for CC then the rest of specimen was prepared for LBC. All slides were evaluated and classified by The Bethesda System. The results of the two cytological tests were compared to the gold standard. The LBC smear significantly decreased inflammatory cell and thick smear on slides. These two techniques were not difference in detection rate of abnormal cytology and had high cytological diagnostic agreement of 95.7%. The histologic diagnosis of cervical tissue was used as the gold standard in 103 cases. Sensitivity, specificity, positive predictive value, negative predictive value, false positive, false negative and accuracy of LBC at ASC-US cut off were 81.4, 75.0, 70.0, 84.9, 25.0, 18.6 and 77.7%, respectively. CC had higher false positive and false negative than LBC. LBC had shown higher sensitivity, specificity, PPV, NPV and accuracy than CC but no statistical significance. In conclusion, LBC method can improve specimen quality, more sensitive, specific and accurate at ASC-US cut off and as effective as CC in detecting cervical epithelial cell abnormalities.

Diagnostic Usefulness of Fine Needle Aspiration Cytology on Lymphadenopathy (림프절종대의 세침흡인 세포검사의 진단적 유용성 - 림프절의 세침흡인 세포검사 1,216예의 분석 -)

  • Kim, Dong-Won;Jin, So-Young;Lee, Dong-Hwa;Lee, Chan-Soo
    • The Korean Journal of Cytopathology
    • /
    • v.8 no.1
    • /
    • pp.11-19
    • /
    • 1997
  • Clinical lymphadenopathies are subjected to fine needle aspiration cytology(FNAC) for diagnosing not only benign lesions but also malignant ones, as the first diagnostic procedure. While the diagnostic reliability in metastatic carcinoma is high, it is difficult to differentiate malignant lymphoma from reactive conditions. We evaluated the diagnostic reliability of FNAC in lymphadenopathy, and discuss the diagnostic limitation and its place in clinical practice in this study, Over 8 years from January 1988, FNAC of 1,216 lymphadenopathies were analyzed and among them 170 cases were compared with histopathology. The results are as follows. 1. Of ail the cases, 890 cases(73.2%) were diagnosed cytologically as benign, 312 cases(25.7%) as malignant, and 14 cases(1.1%) as unsatisfactory material. Reactive hyperplasia was diagnosed in 585 cases(65.7%) of the benign lesions, and among the malignant diseases, metastatic carcinoma was diagnosed in 248 cases(79.5%), and malignant lymphoma in 62 cases(19.9%). 2. The overall diagnostic accuracy was 89.2%, and no false positive case and 9 false negative results were observed among 170 cases which were proven by histopathology. Six cases of sampling error of false negative diagnoses included 3 of metastatic carcinomas and 3 of malignant lymphomas. The causes were difference between aspiration and biopsy site, poor fixation, or scanty cellularity with bloody smear. All 3 cases of misinterpretation error were malignant lympliomas, one of mixed type on biopsy which was diagnosed as reactive hyperplasia cytologically. In summary, FNAC technique is thought to be useful in the initial diagnosis of lymphadenopathies as well as in the follow-up of patients with known malignancy. Although the results of malignant lymphoma was less accurate than other malignant lesions, the application of strict cytologic criteria or lymphoid marker studies of aspiration material will reduce the false negative rate.

  • PDF