• Title/Summary/Keyword: False communication

Search Result 283, Processing Time 0.025 seconds

Multi-Sensor Multi-Target Passive Locating and Tracking

  • Liu, Mei;Xu, Nuo;Li, Haihao
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.2
    • /
    • pp.200-207
    • /
    • 2007
  • The passive direction finding cross localization method is widely adopted in passive tracking, therefore there will exist masses of false intersection points. Eliminating these false intersection points correctly and quickly is a key technique in passive localization. A new method is proposed for passive locating and tracking multi-jammer target in this paper. It not only solves the difficulty of determining the number of targets when masses of false intersection points existing, but also solves the initialization problem of elastic network. Thus this method solves the problem of multi-jammer target correlation and the elimination of static false intersection points. The method which dynamically establishes multiple hypothesis trajectory trees solves the problem of eliminating the remaining false intersection points. Simulation results show that computational burden of the method is lower, the elastic network can more quickly find all or most of the targets and have a more probability of locking the real targets. This method can eliminate more false intersection points.

Algorithm Design to Judge Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.50-58
    • /
    • 2019
  • The clear and specific objective of this study is to design a false news discriminator algorithm for news articles transmitted on a text-based basis and an architecture that builds it into a system (H/W configuration with Hadoop-based in-memory technology, Deep Learning S/W design for bigdata and SNS linkage). Based on learning data on actual news, the government will submit advanced "fake news" test data as a result and complete theoretical research based on it. The need for research proposed by this study is social cost paid by rumors (including malicious comments) and rumors (written false news) due to the flood of fake news, false reports, rumors and stabbings, among other social challenges. In addition, fake news can distort normal communication channels, undermine human mutual trust, and reduce social capital at the same time. The final purpose of the study is to upgrade the study to a topic that is difficult to distinguish between false and exaggerated, fake and hypocrisy, sincere and false, fraud and error, truth and false.

A Look-Up Table Based Error Diffusion Algorithm for Dynamic False Contour Reduction of Plasma Display Panels

  • Lee, Ho-Seop;Kim, Choon-Woo
    • Journal of Information Display
    • /
    • v.2 no.2
    • /
    • pp.32-38
    • /
    • 2001
  • PDP(plasma display panel) represents the gray levels by the pulse number modulation technique that results in undesirable dynamic false contours on moving images. This paper proposes a LUT(Look-up table) based error diffusion algorithm for reduction of the dynamic false contours. A quantitative measure of the dynamic false contours is defined first. The measure of the dynamic false contours is calculated through simulation of every gray level combination of two consecutive frames. Based on the calculated measures, a modified gray level for a pair of gray levels of two consecutive frames is chosen to reduce the dynamic false contours. The chosen gray levels serve as contents of a gray level conversion LUT. Given a pair of gray levels of two consecutive frames, the gray level of current frame is modified based on the gray level conversion LUT. The new gray level is displayed on PDP. An error diffusion algorithm is, then, applied to compensate for the differences in the gray levels.

  • PDF

Government Public Relations Practitioners' Perceptions toward Media Relations and False Reports: A comparative Study between the Noh Moo Hyun and Lee Myung Bak Governments (정부 홍보담당자들의 언론 관계와 오보에 대한 인식 조사: 노무현 정부와 이명박 정부 홍보담당자 비교 연구)

  • Lim, Yu-Jin;Kim, Yung-Wook
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.119-139
    • /
    • 2011
  • This study investigated the general perception of government public relations practitioners in the Noh Moo Hyun and Lee Myung Bak administrations toward media relations and false reports. It examined whether these government public relations practitioners' perceptions are different according to changing government public relations circumstances. This study also investigated how the perceptions of public relations practitioners toward media relations in two different governments affect the overall perception toward false reports. The results showed that the two groups had different perspectives toward media relations, false reports and the causes of false reports. Moreover, the perspectives toward media relations influenced their opinions about false reports. However, they had similar opinions about the way of preventing false reports.

  • PDF

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

Video Flame Detection with Periodicity Analysis Based False Alarm Rejection (주기 신호 검출을 통한 거짓 경보 제거 기능을 갖춘 비디오 화염 감지 기법)

  • Lee, Sang-Hak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.479-485
    • /
    • 2011
  • A video flame detection method analyze the temporal and spatial characteristics of the regions which have the flame-like color and moving objects in the input video. The video flame detector should be able to reduce a false alarm rate without the degradation of flame detection capability. The conventional methods can reject the false alarm caused by the car lights and some electric lights. However they make the false alarm caused by the warning lights, neon sign, and some periodic flickering lights which have the flame-like color and temporal features. This paper propose the video flame detection method with periodicity analysis based false alarm rejection. The proposed method can detect the periodicity of the flickering electric lights and can reject the false alarm caused by the periodic electric lights. The computer simulation showed that the proposed method did not make the false alarm in the test video with the periodic electric lights. But the conventional methods made a false alarm in the same test video.

A Study on Efficient Threshold Level for False Alarm Probability Decrease (오 경보 확률 감소를 위한 효율적인 임계치에 대한 연구)

  • Lee, Kwan-Hyeong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.140-146
    • /
    • 2015
  • We have studied an efficient threshold level for desired target detection in radar system in the paper. A desired target searching detection method detects desired target according to changing for false alarm probability. This time, false alarm probability is close relation to threshold level. Low threshold level can improve detection for desired target, but detect noise signal. Therefor, This method is not good one. In this paper, we propose efficient threshold level method in order to estimation for desired target. Through simulation, we are analysis and performance to compare general method with proposal method. We show that proposed method is more good proof than general method.

A Study on the Fingerprint Verification based on Image (영상 기반 지문인증에 관한 연구)

  • Chae, Seung-Hoon;Pan, Sung-Bum;Moon, Dae-Sung;Moon, Ki-Young;Chung, Yong-Hwa
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.237-238
    • /
    • 2007
  • Fingerprint verification based on minutiae mostly has used because it stores a few data and is good for speed. However personal verification errors are caused by extracted from false minutiae. Therefore, in this paper, we propose a new methodology performing together based on image and minutiae. As the result of performing with image and minutiae, false accept rate and false reject rate are improved.

  • PDF

Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids

  • Bae, Junhyung;Lee, Seonghun;Kim, Young-Woo;Kim, Jong-Hae
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.19-28
    • /
    • 2017
  • False data injection attacks have recently been introduced as one of important issues related to cyber-attacks on electric power grids. These attacks aim to compromise the readings of multiple power meters in order to mislead the operation and control centers. Recent studies have shown that if a malicious attacker has complete knowledge of the power grid topology and branch admittances, s/he can adjust the false data injection attack such that the attack remains undetected and successfully passes the bad data detection tests that are used in power system state estimation. In this paper, we investigate that a practical false data injection attack is essentially a cyber-attack with uncertain information due to the attackers lack of knowledge with respect to the power grid parameters because the attacker has limited physical access to electric facilities and limited resources to compromise meters. We mathematically formulated a method of identifying the most vulnerable locations to false data injection attack. Furthermore, we suggest minimum topology changes or phasor measurement units (PMUs) installation in the given power grids for mitigating such attacks and indicate a new security metrics that can compare different power grid topologies. The proposed metrics for performance is verified in standard IEEE 30-bus system. We show that the robustness of grids can be improved dramatically with minimum topology changes and low cost.