• Title/Summary/Keyword: False Report

Search Result 169, Processing Time 0.029 seconds

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

Measuring of Effectiveness of Tracking Based Accident Detection Algorithm Using Gaussian Mixture Model (가우시안 배경혼합모델을 이용한 Tracking기반 사고검지 알고리즘의 적용 및 평가)

  • Oh, Ju-Taek;Min, Jun-Young
    • International Journal of Highway Engineering
    • /
    • v.14 no.3
    • /
    • pp.77-85
    • /
    • 2012
  • Most of Automatic Accident Detection Algorithm has a problem of detecting an accident as traffic congestion. Actually, center's managers deal with accidents depend on watching CCTV or accident report by drivers even though they run the Automatic Accident Detection system. It is because of the system's detecting errors such as detecting non-accidents as accidents, and it makes decreasing in the system's overall reliability. It means that Automatic Accident Detection Algorithm should not only have high detection probability but also have low false alarm probability, and it has to detect accurate accident spot. The study tries to verify and evaluate the effectiveness of using Gaussian Mixture Model and individual vehicle tracking to adapt Accident Detection Algorithm to Center Management System by measuring accident detection probability and false alarm probability's frequency in the real accident.

False Positive of F-18 FDG-PET/CT due to Activated Charcoal Granuloma from Intraperitoneal Chemotherapy: A Case Report (복강 내 화학요법에 이용된 활성화 탄소 육아종에 의한 F-18 FDG PET/CT의 위양성 소견: 증례)

  • Lee, Se-Youl;Kim, Chan-Young;Yang, Doo-Hyun
    • Journal of Gastric Cancer
    • /
    • v.6 no.4
    • /
    • pp.291-294
    • /
    • 2006
  • F-18 FDG-PET/CT could be used to evaluate the surveillance of recurrent stomach cancer, but some cases reported as false-positives. The authors found an activated charcoal granuloma from intraperitoneal chemotherapy by using a curative resection and mitomycin C for stomach cancer. A mass behind the right colon that showed on CT 6 months after an operation in a 46-year-old male patient had no progression in size, but 36 months after the operation, an increase was seen on F-18 FDG-PET/CT, and a metastatic tumor was suspected. The tumor was resected by an explorative laparotomy and was diagnosed as being an activated charcoal granuloma based on the histologic finding. Based on this case, we should be reminded of the possibility of a false-positive on analysis of F-18 FDG-PET/CT caused by an activated charcoal granuloma in a patient who has intraperitoneal chemotherapy.

  • PDF

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

Traumatic descending aortic aneurysm -Report of one case- (외상성 하행대동맥류 수술치험 1례)

  • 이신영
    • Journal of Chest Surgery
    • /
    • v.24 no.5
    • /
    • pp.505-509
    • /
    • 1991
  • Rupture or laceration of the aorta is a more common result of nonpenetrating traumatic injury than is generally appreciated. If the lesion is promptly diagnosed, a appropriate surgical treatment may be life-saving. Diagnosis may be difficult and at times the rupture may remain clinically silent for variable period.< A 34 - year old male patient had sustained steering wheel injury to his chest during automobile accident 8 weeks prior to admission. The diagnosis of traumatic aneurysm of the aorta was delayed as he was asymptomatic. Surgical repair of false aneurysm of the descending aorta was successfully performed by partial cardiopulmonary bypass through the femoral artery and vein.

  • PDF

TREATMENT OF INJURED PERMANENT TEETH FROM TRAUMA : A CASE REPORT (외상에 대한 영구치 손상의 치험례)

  • Kim, Jun-Hye;Hahn, Se-Hyun
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.21 no.2
    • /
    • pp.496-503
    • /
    • 1994
  • Three cases of treated permanenet teeth are presented. A horizontal root fracture was treated by endodontic treatment in which coronal segment only was done. A replanted incisor is ankylosed because of false restorative method and long extraoral period. Resorption of traumatized bone can be seen in the third case. The prognosis of traumatized incisor depends on proper restoration, adequate amergency treatment and periodic follow-up check.

  • PDF

Traumatic Arteriovenous Fistula (외상성 동정맥루 1례 보고)

  • 오세웅
    • Journal of Chest Surgery
    • /
    • v.20 no.4
    • /
    • pp.847-850
    • /
    • 1987
  • Traumatic arteriovenous fistula is relatively uncommon. The proper designation for what is called a false aneurysm is pulsating hematoma, which occurs when there is a small laceration of the wall of a large artery will continuing leakage of blood from the artery into surrounding tissues. The extent of growth of the pulsating hematoma depends on the strength of the surrounding fascial tissues. We experienced one case of arteriovenous fistula with hematoma, due to operative injuries, and operated successfully, and report the case.

  • PDF

Derivative Function: Beliefs, Engineers as Calculus Teachers

  • Chavez, Miguel Diaz
    • Proceedings of the Korea Society of Mathematical Education Conference
    • /
    • 2010.04a
    • /
    • pp.249-259
    • /
    • 2010
  • This report is intended to document beliefs that engineers working as senior high school teachers have in Mexico. Documents come from the analysis of answers provided for two tasks contained in a questionnaire: one of them is marking statements as true or false in relation to the derivative function; the second one is about solving different problems: calculation of derivative of piecewise functions and the calculation of maximum and minimum of a polynomial function. Results show the strengths, quasi-logical relations and grouping which are verified in their system of beliefs and knowledge.

  • PDF

Bentall's Operation -5 Case Report- (Teflon felt를 이용한 Bentall 술식 치험 5례)

  • 정철하
    • Journal of Chest Surgery
    • /
    • v.27 no.2
    • /
    • pp.153-156
    • /
    • 1994
  • Bentall`s operation for repair of annuloaortic ectasia has been associated with postoperative bleeding and with false aneurysm of the anastomotic site between the coronary orifice and composite graft.Among 5 cases, 2 cases have been operated direct anastomosis between coronary artery and vascular graft.Remained 3 cases have been operated with doughnutlike Teflon felt buttress.The technique of sandwiching the freed button of aortic wall bearing the coronary artery ostium between an outer Teflon felt doughnutlike buttress and the inner composite graft provides a leak-proof anastomosis.We experienced one case reoperation for bleeding at coronary anastomotic site above method.

  • PDF

Probabilistic Filtering Method for Efficient Sensor Network Security (효율적인 센서 네트워크 보안을 위한 확률적인 필터링 기법)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.382-389
    • /
    • 2012
  • The fabricated report attack will not only cause false alarms that waste real-world response efforts such as sending response teams to the event location, but also drains the finite amount of energy in a wireless sensor network. In this paper, we propose a probabilistic filtering method for sensor network security (PFSS) to deal with filtering for the fabricated report. On the basis of filtering scheme, PFSS combines cluster-based organization and probabilistic verification node assignment using distance of from cluster head to base station for energy efficiency and hot spot problem. Through both analysis and simulation, we demonstrate that PFSS could achieve efficient protection against fabricated report attack while maintaining a sufficiently high filtering power.