• 제목/요약/키워드: False alarms

Search Result 196, Processing Time 0.029 seconds

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Do, Joo-Hwan;Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.139-147
    • /
    • 2009
  • In this paper, optimum design of energy-aware distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, an energy constraint, and the distance between two sensor nodes affect the system detection performances.

Study on the operating range of stand-alone sensor in consideration of the impacts of combustion products on residents (연소생성물이 거주자에 미치는 영향을 고려한 단독경보형감지기의 작동범위에 대한 연구)

  • Lee, Jong-Hwa;Kim, Si-Kuk;Jee, Seung-Wook;Kim, Pil-Young;Lee, Chun-Ha
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.1
    • /
    • pp.23-31
    • /
    • 2012
  • Recent research on stand-alone focused on the improvement and development of functions for solving problems such as the limited operating time of stand-alone installed at dwelling and their low reliability caused by false alarms, but it is more urgent to study on the operating range of stand-alone sensor in consideration of the impacts of combustion products on residents because the primary goal of fire safety is minimizing casualties. This study purposed to propose the optimized operating range of stand-alone sensor in consideration of the impacts of combustion products on residents. For this purpose, we made a mathematical approach to the change of temperature over the lapse of time in compartment fires similar to house fires, and established the standards of the body's response against heat and smoke based on literature review. In addition, we surveyed domestic and foreign technological standards for stand-alone sensor, and converted them to standards for residents of the body's response against heat and smoke using mathematical model equations and analyzed them comparatively.

Face Recognition on complex backgrounds using Neural Network (복잡한 배경에서 신경망을 이용한 얼굴인식)

  • Han, Jun-Hee;Nam, Kee-Hwan;Park, Ho-Sik;Lee, Young-Sik;Jung, Yeon-Gil;Ra, Sang-Dong;Bae, Cheol-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1149-1152
    • /
    • 2005
  • Detecting faces in images with complex backgrounds is a difficult task. Our approach, which obtains state of the art results, is based on a generative neural network model: the Constrained Generative Model (CGM). To detect side view faces and to decrease the number of false alarms, a conditional mixture of networks is used. To decrease the computational time cost, a fast search algorithm is proposed. The level of performance reached, in terms of detection accuracy and processing time, allows to apply this detector to a real word application: the indexation of face images on the Web.

  • PDF

A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention (사용자 의도 기반 응용계층 DDoS 공격 탐지 알고리즘)

  • Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.39-52
    • /
    • 2011
  • An application-layer attack can effectively achieve its objective with a small amount of traffic, and detection is difficult because the traffic type is very similar to that of legitimate users. We have discovered a unique characteristic that is produced by a difference in client intention: Both a legitimate user and DDoS attacker establish a session through a 3-way handshake over the TCP/IP layer. After a connection is established, they request at least one HTTP service by a Get request packet. The legitimate HTTP user waits for the server's response. However, an attacker tries to terminate the existing session right after the Get request. These different actions can be interpreted as a difference in client intention. In this paper, we propose a detection algorithm for application layer DDoS attacks based on this difference. The proposed algorithm was simulated using traffic dump files that were taken from normal user networks and Botnet-based attack tools. The test results showed that the algorithm can detect an HTTP-Get flooding attack with almost zero false alarms.

A semi-supervised interpretable machine learning framework for sensor fault detection

  • Martakis, Panagiotis;Movsessian, Artur;Reuland, Yves;Pai, Sai G.S.;Quqa, Said;Cava, David Garcia;Tcherniak, Dmitri;Chatzi, Eleni
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.251-266
    • /
    • 2022
  • Structural Health Monitoring (SHM) of critical infrastructure comprises a major pillar of maintenance management, shielding public safety and economic sustainability. Although SHM is usually associated with data-driven metrics and thresholds, expert judgement is essential, especially in cases where erroneous predictions can bear casualties or substantial economic loss. Considering that visual inspections are time consuming and potentially subjective, artificial-intelligence tools may be leveraged in order to minimize the inspection effort and provide objective outcomes. In this context, timely detection of sensor malfunctioning is crucial in preventing inaccurate assessment and false alarms. The present work introduces a sensor-fault detection and interpretation framework, based on the well-established support-vector machine scheme for anomaly detection, combined with a coalitional game-theory approach. The proposed framework is implemented in two datasets, provided along the 1st International Project Competition for Structural Health Monitoring (IPC-SHM 2020), comprising acceleration and cable-load measurements from two real cable-stayed bridges. The results demonstrate good predictive performance and highlight the potential for seamless adaption of the algorithm to intrinsically different data domains. For the first time, the term "decision trajectories", originating from the field of cognitive sciences, is introduced and applied in the context of SHM. This provides an intuitive and comprehensive illustration of the impact of individual features, along with an elaboration on feature dependencies that drive individual model predictions. Overall, the proposed framework provides an easy-to-train, application-agnostic and interpretable anomaly detector, which can be integrated into the preprocessing part of various SHM and condition-monitoring applications, offering a first screening of the sensor health prior to further analysis.

Two-Phase Approach for Data Quality Management for Slope Stability Monitoring (경사면의 안정성 모니터링 데이터의 품질관리를 위한 2 단계 접근방안)

  • Junhyuk Choi;Yongjin Kim;Junhwi Cho;Woocheol Jeong;Songhee Suk;Song Choi;Yongseong Kim;Bongjun Ji
    • Journal of the Korean Geosynthetics Society
    • /
    • v.22 no.1
    • /
    • pp.67-74
    • /
    • 2023
  • In order to monitor the stability of slopes, research on data-based slope failure prediction and early warning is increasing. However, most papers overlook the quality of data. Poor data quality can cause problems such as false alarms. Therefore, this paper proposes a two-step hybrid approach consisting of rules and machine learning models for quality control of data collected from slopes. The rule-based has the advantage of high accuracy and intuitive interpretation, and the machine learning model has the advantage of being able to derive patterns that cannot be explicitly expressed. The hybrid approach was able to take both of these advantages. Through a case study, the performance of using the two methods alone and the case of using the hybrid approach was compared, and the hybrid method was judged to have high performance. Therefore, it is judged that using a hybrid method is more appropriate than using the two methods alone for data quality control.

Extraversion and Recognition for Emotional Words: Effects of Valence, Frequency, and Task-difficulty (외향성과 정서단어의 재인 기억: 정서가, 빈도, 과제 난이도 효과)

  • Kang, Eunjoo
    • Korean Journal of Cognitive Science
    • /
    • v.25 no.4
    • /
    • pp.385-416
    • /
    • 2014
  • In this study, memory for emotional words was compared between extraverts and introverts, employing signal detection analysis to distinguish differences in discriminative memory and response bias. Subjects were presented with a study list of emotional words in an encoding session, followed by a recognition session. Effects of task difficulty were examined by varying the nature of the encoding task and the intervals between study and test. For an easy task, with a retention interval of 5 minutes (Study I), introverts exhibited better memory (i.e., higher d') than extraverts, particularly for low-frequency words, and response biases did not differ between these two groups. For a difficult task, with a one-month retention period (Study II), performance was poor overall, and only high-frequency words were remembered; also extraverts adopted a more liberal criterion for 'old' responses (i.e., more hits and more false alarms) for positive emotional-valence words. These results suggest that as task difficulty drives down performance, effects of internal control processes become more apparent, revealing differences in response biases for positive words between extraverts and introverts. These results show that extraversion can distort memory performance for words, depending on their emotional valence.

Characterizing Information Processing in Visual Search According to Probability of Target Prevalence (표적 출현확률에 따른 시각탐색 정보처리 특성)

  • Park, Hyung-Bum;Son, Han-Gyeol;Hyun, Joo-Seok
    • Korean Journal of Cognitive Science
    • /
    • v.26 no.3
    • /
    • pp.357-375
    • /
    • 2015
  • In our daily life, the probability of target prevalence in visual search varies from very low to high. However, most laboratory studies of visual search used a fixed probability of target prevalence at 50%. The present study examined the properties of information processing during visual search where the probability of target prevalence was manipulated to vary from low (20%), medium (50%), to high (80%). The search items were made of simple shape stimuli, and search accuracy, signal detection measures, and reaction times (RTs) were analyzed for characterizing the effect of target prevalence on the information processing strategies for visual search. The analyses showed that the rates of misses increased whereas those of false alarms decreased in the search condition of low target prevalence, whereas the pattern was reversed in the high prevalence condition. Signal detection measures revealed that the target prevalence shifted response criterion (c) without affecting sensitivity (d'). In addition, RTs for correct rejection responses in the target-absent trials became delayed as the prevalence increased, whereas those for hits in the target-present trials were relatively constant regardless of the prevalence. The RT delay in the target-absent trials indicates that increased target prevalence made the 'quitting threshold' for search termination more conservative. These results support an account that the target prevalence effect in visual search arises from a shift of decision criteria and the subsequent changes in search information processing, while rejecting the account of a speed-accuracy tradeoff.

Extraction of Network Threat Signatures Using Latent Dirichlet Allocation (LDA를 활용한 네트워크 위협 시그니처 추출기법)

  • Lee, Sungil;Lee, Suchul;Lee, Jun-Rak;Youm, Heung-youl
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Network threats such as Internet worms and computer viruses have been significantly increasing. In particular, APTs(Advanced Persistent Threats) and ransomwares become clever and complex. IDSes(Intrusion Detection Systems) have performed a key role as information security solutions during last few decades. To use an IDS effectively, IDS rules must be written properly. An IDS rule includes a key signature and is incorporated into an IDS. If so, the network threat containing the signature can be detected by the IDS while it is passing through the IDS. However, it is challenging to find a key signature for a specific network threat. We first need to analyze a network threat rigorously, and write a proper IDS rule based on the analysis result. If we use a signature that is common to benign and/or normal network traffic, we will observe a lot of false alarms. In this paper, we propose a scheme that analyzes a network threat and extracts key signatures corresponding to the threat. Specifically, our proposed scheme quantifies the degree of correspondence between a network threat and a signature using the LDA(Latent Dirichlet Allocation) algorithm. Obviously, a signature that has significant correspondence to the network threat can be utilized as an IDS rule for detection of the threat.

Optimization of Post-Processing for Subsequence Matching in Time-Series Databases (시계열 데이터베이스에서 서브시퀀스 매칭을 위한 후처리 과정의 최적화)

  • Kim, Sang-Uk
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.555-560
    • /
    • 2002
  • Subsequence matching, which consists of index searching and post-processing steps, is an operation that finds those subsequences whose changing patterns are similar to that of a given query sequence from a time-series database. This paper discusses optimization of post-processing for subsequence matching. The common problem occurred in post-processing of previous methods is to compare the candidate subsequence with the query sequence for discarding false alarms whenever each candidate subsequence appears during index searching. This makes a sequence containing candidate subsequences to be accessed multiple times from disk, and also have a candidate subsequence to be compared with the query sequence multiple times. These redundancies cause the performance of subsequence matching to degrade seriously. In this paper, we propose a new optimal method for resolving the problem. The proposed method stores ail the candidate subsequences returned by index searching into a binary search tree, and performs post-processing in a batch fashion after finishing the index searching. By this method, we are able to completely eliminate the redundancies mentioned above. For verifying the performance improvement effect of the proposed method, we perform extensive experiments using a real-life stock data set. The results reveal that the proposed method achieves 55 times to 156 times speedup over the previous methods.