• 제목/요약/키워드: False Positives

Search Result 170, Processing Time 0.031 seconds

Fusion of Local and Global Detectors for PHD Filter-Based Multi-Object Tracking (검출기 융합에 기반을 둔 확률가정밀도 (PHD) 필터를 적용한 다중 객체 추적 방법)

  • Yoon, Ju Hong;Hwang, Youngbae;Choi, Byeongho;Yoon, Kuk-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.9
    • /
    • pp.773-777
    • /
    • 2016
  • In this paper, a novel multi-object tracking method to track an unknown number of objects is proposed. To handle multiple object states and uncertain observations efficiently, a probability hypothesis density (PHD) filter is adopted and modified. The PHD filter is capable of reducing false positives, managing object appearances and disappearances, and estimating the multiple object trajectories in a unified framework. Although the PHD filter is robust in cluttered environments, it is vulnerable to false negatives. For this reason, we propose to exploit local observations in an RFS of the observation model. Each local observation is generated by using an online trained object detector. The main purpose of the local observation is to deal with false negatives in the PHD filtering procedure. The experimental results demonstrated that the proposed method robustly tracked multiple objects under practical situations.

Cloud-Type Classification by Two-Layered Fuzzy Logic

  • Kim, Kwang Baek
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.13 no.1
    • /
    • pp.67-72
    • /
    • 2013
  • Cloud detection and analysis from satellite images has been a topic of research in many atmospheric and environmental studies; however, it still is a challenging task for many reasons. In this paper, we propose a new method for cloud-type classification using fuzzy logic. Knowing that visible-light images of clouds contain thickness related information, while infrared images haves height-related information, we propose a two-layered fuzzy logic based on the input source to provide us with a relatively clear-cut threshold in classification. Traditional noise-removal methods that use reflection/release characteristics of infrared images often produce false positive cloud areas, such as fog thereby it negatively affecting the classification accuracy. In this study, we used the color information from source images to extract the region of interest while avoiding false positives. The structure of fuzzy inference was also changed, because we utilized three types of source images: visible-light, infrared, and near-infrared images. When a cloud appears in both the visible-light image and the infrared image, the fuzzy membership function has a different form. Therefore we designed two sets of fuzzy inference rules and related classification rules. In our experiment, the proposed method was verified to be efficient and more accurate than the previous fuzzy logic attempt that used infrared image features.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

QSO Selections Using Time Variability and Machine Learning

  • Kim, Dae-Won;Protopapas, Pavlos;Byun, Yong-Ik;Alcock, Charles;Khardon, Roni
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.64-64
    • /
    • 2011
  • We present a new quasi-stellar object (QSO) selection algorithm using a Support Vector Machine, a supervised classification method, on a set of extracted time series features including period, amplitude, color, and autocorrelation value. We train a model that separates QSOs from variable stars, non-variable stars, and microlensing events using 58 known QSOs, 1629 variable stars, and 4288 non-variables in the MAssive Compact Halo Object (MACHO) database as a training set. To estimate the efficiency and the accuracy of the model, we perform a cross-validation test using the training set. The test shows that the model correctly identifies ~80% of known QSOs with a 25% false-positive rate. The majority of the false positives are Be stars. We applied the trained model to the MACHO Large Magellanic Cloud (LMC) data set, which consists of 40 million lightcurves, and found 1620 QSO candidates. During the selection, none of the 33,242 known MACHO variables were misclassified as QSO candidates. In order to estimate the true false-positive rate, we crossmatched the candidates with astronomical catalogs including the Spitzer Surveying the Agents of a Galaxy's Evolution (SAGE) LMC catalog and a few X-ray catalogs. The results further suggest that the majority of the candidates, more than 70%, are QSOs.

  • PDF

Accuracy of Body Mass Index-defined Obesity Status in US Firefighters

  • Jitnarin, Nattinee;Poston, Walker S.C.;Haddock, Christopher K.;Jahnke, Sara A.;Day, Rena S.
    • Safety and Health at Work
    • /
    • v.5 no.3
    • /
    • pp.161-164
    • /
    • 2014
  • Obesity is a significant problem affecting United States (US) firefighters. While body mass index (BMI) is widely used to diagnose obesity, its use for this occupational group has raised concerns about validity. We examined rates and types of misclassification of BMI-based obesity status compared to body fat percentage (BF%) and waist circumference (WC). Male career firefighters (N = 994) from 20 US departments completed all three body composition assessments. Mean BMI, BF%, and WC were $29kg/m^2$, 23%, and 97 cm, respectively. Approximately 33% and 15% of BF%- and WC-defined obese participants were misclassified as non-obese (false negatives) using BMI, while 8% and 9% of non-obese participants defined by BF% and WC standards were identified as obese (false positives) using BMI. When stratified by race/ethnicity, Pacific Islanders showed high rates of false positive misclassification. Precision in obesity classification would be improved by using WC along with BMI to determine firefighters' weight status.

Techniques for Improving Host-based Anomaly Detection Performance using Attack Event Types and Occurrence Frequencies

  • Juyeon Lee;Daeseon Choi;Seung-Hyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.89-101
    • /
    • 2023
  • In order to prevent damages caused by cyber-attacks on nations, businesses, and other entities, anomaly detection techniques for early detection of attackers have been consistently researched. Real-time reduction and false positive reduction are essential to promptly prevent external or internal intrusion attacks. In this study, we hypothesized that the type and frequency of attack events would influence the improvement of anomaly detection true positive rates and reduction of false positive rates. To validate this hypothesis, we utilized the 2015 login log dataset from the Los Alamos National Laboratory. Applying the preprocessed data to representative anomaly detection algorithms, we confirmed that using characteristics that simultaneously consider the type and frequency of attack events is highly effective in reducing false positives and execution time for anomaly detection.

Preoperative Meniscus: Pitfalls and Traps to Avoid (수술 전 반월연골: 피해야 할 함정들)

  • Hye Jin Yoo;Kyung Nam Ryu;Ji Seon Park;Wook Jin;So Young Park;Hye Jin Kang;Hyun Soo Kim;Gene Hyuk, Kwon
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.3
    • /
    • pp.582-596
    • /
    • 2022
  • To accurately interpret knee MRI, it is important not only to know the basic meniscal anatomy but also to distinguish it from that under pathological conditions. Thus, it would be helpful to know the normal meniscus variants (false positives) that could be mistaken for meniscal tears, and tears that could easily be missed and incorrectly diagnosed as normal (false negatives). False positives include synovial recesses, meniscal flounce, the relationship between the popliteus tendon and lateral meniscus, transverse ligament, the anterior root of the meniscus, and meniscofemoral ligament. False negatives include focal radial tears, flap tears, posterior root tears, meniscocapsular separation, and discoid meniscal tears. In this pictorial essay, we reviewed the imaging data obtained in the aforementioned cases.

Selection probability of multivariate regularization to identify pleiotropic variants in genetic association studies

  • Kim, Kipoong;Sun, Hokeun
    • Communications for Statistical Applications and Methods
    • /
    • v.27 no.5
    • /
    • pp.535-546
    • /
    • 2020
  • In genetic association studies, pleiotropy is a phenomenon where a variant or a genetic region affects multiple traits or diseases. There have been many studies identifying cross-phenotype genetic associations. But, most of statistical approaches for detection of pleiotropy are based on individual tests where a single variant association with multiple traits is tested one at a time. These approaches fail to account for relations among correlated variants. Recently, multivariate regularization methods have been proposed to detect pleiotropy in analysis of high-dimensional genomic data. However, they suffer a problem of tuning parameter selection, which often results in either too many false positives or too small true positives. In this article, we applied selection probability to multivariate regularization methods in order to identify pleiotropic variants associated with multiple phenotypes. Selection probability was applied to individual elastic-net, unified elastic-net and multi-response elastic-net regularization methods. In simulation studies, selection performance of three multivariate regularization methods was evaluated when the total number of phenotypes, the number of phenotypes associated with a variant, and correlations among phenotypes are different. We also applied the regularization methods to a wild bean dataset consisting of 169,028 variants and 17 phenotypes.

URL Normalization for Web Applications (웹 어플리케이션을 위한 URL 정규화)

  • Hong, Seok-Hoo;Kim, Sung-Jin;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.716-722
    • /
    • 2005
  • In the m, syntactically different URLs could represent the same resource. The URL normalization is a process that transform a URL, syntactically different and represent the same resource, into canonical form. There are on-going efforts to define standard URL normalization. The standard URL normalization designed to minimize false negative while strictly avoiding false positive. This paper considers the four URL normalization issues beyond ones specified in the standard URL normalization. The idea behind our work is that in the URL normalization we want to minimize false negatives further while allowing false positives in a limited level. Two metrics are defined to analyze the effect of each step in the URL normalization. Over 170 million URLs that were collected in the real web pages, we did an experiment, and interesting statistical results are reported in this paper.

False Positive of F-18 FDG-PET/CT due to Activated Charcoal Granuloma from Intraperitoneal Chemotherapy: A Case Report (복강 내 화학요법에 이용된 활성화 탄소 육아종에 의한 F-18 FDG PET/CT의 위양성 소견: 증례)

  • Lee, Se-Youl;Kim, Chan-Young;Yang, Doo-Hyun
    • Journal of Gastric Cancer
    • /
    • v.6 no.4
    • /
    • pp.291-294
    • /
    • 2006
  • F-18 FDG-PET/CT could be used to evaluate the surveillance of recurrent stomach cancer, but some cases reported as false-positives. The authors found an activated charcoal granuloma from intraperitoneal chemotherapy by using a curative resection and mitomycin C for stomach cancer. A mass behind the right colon that showed on CT 6 months after an operation in a 46-year-old male patient had no progression in size, but 36 months after the operation, an increase was seen on F-18 FDG-PET/CT, and a metastatic tumor was suspected. The tumor was resected by an explorative laparotomy and was diagnosed as being an activated charcoal granuloma based on the histologic finding. Based on this case, we should be reminded of the possibility of a false-positive on analysis of F-18 FDG-PET/CT caused by an activated charcoal granuloma in a patient who has intraperitoneal chemotherapy.

  • PDF