• 제목/요약/키워드: False positive

검색결과 869건 처리시간 0.025초

아동의 틀린 믿음 및 정서이해 능력과 인기도 및 친구관계의 관련성 (Reationships between Mindreading, Popularity, and Friendship in Preschool Children)

  • 신유림
    • 대한가정학회지
    • /
    • 제43권8호
    • /
    • pp.13-23
    • /
    • 2005
  • The purpose of this study was to examine the relationship between mind understanding, popularity, and friendship of preschool children. A total 1444-and 5-year old children participated in this study. The children were assessed on false belief, emotion understanding, language skill, and popularity in peer groups. Their teachers rated the children's friendship qualities. Significant differences in mind understanding based on social status and friendship status were found. Popularity, number of mutual friend, PPVT, and positive interaction between friends were found to be significant predictors of children's mind understanding.

발암물질의 조기검색법 개발에 관한 연구

  • 이병무;윤여표
    • 한국응용약물학회:학술대회논문집
    • /
    • 한국응용약물학회 1993년도 제2회 신약개발 연구발표회 초록집
    • /
    • pp.171-171
    • /
    • 1993
  • 발암물질의 조기검색법을 개발하고자 변이원성 물질의 스크리닝법으로 널리 사용되고 있는 Ames test 및 chromosomal aberration test를 본 연구에서 개발하고자 하는 DNA 및 Protein-adduct 형성시험법과 비교 연구하였다. 벤조피렌과 아플라톡신 B$_1$을 모델 발암물질로 하여 실시한 Ames test에서는 두 화합물 모두 양성을 나타냈으나 용량-반응 관계가 뚜렷하지 않았다. 또한 고농도에서는 시험물질의 독성체 의해 정상적인 Ames test의 수행이 어려됐다. Chromosomal aberration test에서도 Ames test와 비슷한 결과를 나타냈으며 특히 고농도에서 시험을 실시했을 경우 Ames test에서와 마찬가지로 세포독성의 현상이 관찰되었다. 그러나 본 연구에서 새로이 개발한 DNA 및 Protein-adduct형성 시험법은 저농도에서 고농도에 이르기까지 뚜렷한 용량-반응 관계를 나타냈으며 Ames test 및 chromosomal test에서 일어날 수 있는 false positive나 false negative의 결과를 가져다 줄 우려가 없다. 또한 시험시간이 1-2시간 정도 소요되므로 기존의 방법보다 시험시간을 약 40배 가량 단축시킬 수 있었다.

  • PDF

기하학적 텍스쳐 정보를 이용한 금속 패드 변색영상 분류 알고리즘 (Metal pad Discolored Image Classification Algorithm using Geometric Texture Information)

  • 최학남;김학일
    • 제어로봇시스템학회논문지
    • /
    • 제16권5호
    • /
    • pp.469-475
    • /
    • 2010
  • This paper presents a method of classifying discolored defects of metal pads using geometric texture for AFVI (Automated Final Vision Inspection) systems. In PCB manufacturing process, the metal pads on PCB can be oxidized and discolored partly due to various environmental factors. Nowadays the discolored defects are manually detected and rejected from the process. This paper proposes an efficient geometric texture feature, SUTF (Symmetry and Uniformity Texture Feature) based on the symmetric and uniform textural characteristics of the surface of circular metal pads for automating AFVI systems. In practical experiments with real samples acquired from a production line, 30 discolored images and 1232 roughness images are tested. The experimental results demonstrate that the proposed method using SUTFs provides better performance compared to Gabor feature with 0% FNR (False Negative Rate) and 1.46% FPR (False Positive Rate). The performance of the proposed method shows its applicability in the real manufacturing systems.

SAR 자동표적인식 시스템에서의 탐지특징 결합 방법 개선 방안 (Improved Fusion Method of Detection Features in SAR ATR System)

  • 차민준;김형명
    • 한국군사과학기술학회지
    • /
    • 제13권3호
    • /
    • pp.461-469
    • /
    • 2010
  • In this paper, we have proposed an improved fusion method of detection features which can enhance the detection probability under the given false alarm rate in the prescreening stage of SAR ATR(Synthetic Aperture Radar Automatic Target Recognition) system. Since the detection features have the positive correlation, the detection performance can be improved if the joint probability distribution of detection features is considered in the fusion process. The detection region is designed as a simple piecewise linear function which can be represented by few parameters. The parameters for the detection region can be derived by training the sample SAR images to maximize the detection probability with the given false alarm rate. Simulation result shows that the detection performance of the proposed method is improved for all combinations of detection features.

Port Scanning 기법 기반의 공격을 탐지하기 위한 실시간 스캔 탐지 시스템 구현 (Implementation of Real Time Scan Detector System against Attacks of Applying on Port Scanning Techniques)

  • 송중석;권용진
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 봄 학술발표논문집 Vol.30 No.1 (A)
    • /
    • pp.380-382
    • /
    • 2003
  • 현재 네트워크 보안 취약점을 자동으로 검색해주는 다양한 도구들이 인터넷에 공개되어 있어 이러한 도구들을 이용한 취약점 정보수집 및 네트워크 검색공격으로 비롯된 해킹사고가 크게 증가하고 있다. 이와 같은 검색 공격에 대한 탐지 시스템은 "False-Positive(실제 공격이 아닌데 공격이라고 탐지)"와 "False-Negative(실제 공격인데 공격이 아니라고 탐지)"를 줄이는 것이 중요하다. 그러나 현재 공개되어 있는 실시간 스캔 탐지 시스템은 오탐율이 높을 분만 아니라 다양한 스캔 기법에 대해서 탐지를 할 수 없는 것이 사실이다. 본 논문에서는 다양한 포트스캐닝 기법기반의 공격에 대해서 탐지 가능하고 오탐율을 최소화한 실시간 스캔 탐지 시스템을 구현한다.실시간 스캔 탐지 시스템을 구현한다.

  • PDF

유방 세침흡인 세포검사의 진단적 함정: 위양성과 위음성 (Diagnostic Pitfalls in Breast Fine Needle Aspiration Cytology: False Positive and False Negative)

  • 박경미
    • 대한세포병리학회지
    • /
    • 제18권2호
    • /
    • pp.112-118
    • /
    • 2007
  • Fine needle aspiration cytology (FNAC) has become a highly preferred, minimally invasive diagnostic tool of choice in the diagnosis of a palpable breast mass owing to its sensitivity, specificity, cost-effectiveness, and expediency. Although breast needle biopsies have been widely employed recently due to the increased detection rate of non-palpable early lesions, the importance of the use of FNAC cannot be underestimated. It comprises part of the diagnostic triad for the breast along with a physical examination and mammography, which together contribute to an increasing diagnostic accuracy. The differential diagnosis of a benign and malignant lesion is of the utmost importance in the diagnosis of breast lesions, and therefore the understanding of the possible diagnostic pitfalls is of great importance.

Efficient Abnormal Traffic Detection Software Architecture for a Seamless Network

  • Lee, Dong-Cheul;Rhee, Byung-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.313-329
    • /
    • 2011
  • To provide a seamless network to customers, Internet service providers must promptly detect and control abnormal traffic. One approach is to shorten the traffic information measurement cycle. However, performance degradation is inevitable if traffic measurement servers merely shorten the cycle and measure all traffic. This paper presents a software architecture that can measure traffic more frequently without degrading performance by estimating the level of abnormal traffic. The algorithm in the architecture estimates the values of the interface group objects in MIB by using the IP group objects thereby reducing the number of measurements and the size of measured data. We evaluated this architecture on part of Internet service provider's IP network. When the traffic was measured 5 times more than before, the CPU usage and TPS of the proposed scheme was 7% and 41% less than that of the original scheme while the false positive rate and false negative rate were 3.2% and 2.7% respectively.

A novel watermarking scheme for authenticating individual data integrity of WSNs

  • Guangyong Gao;Min Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권3호
    • /
    • pp.938-957
    • /
    • 2023
  • The limited computing power of sensor nodes in wireless sensor networks (WSNs) and data tampering during wireless transmission are two important issues. In this paper, we propose a scheme for independent individual authentication of WSNs data based on digital watermarking technology. Digital watermarking suits well for WSNs, owing to its lower computational cost. The proposed scheme uses independent individual to generate a digital watermark and embeds the watermark in current data item. Moreover, a sink node extracts the watermark in single data and compares it with the generated watermark, thereby achieving integrity verification of data. Inherently, individual validation differs from the grouping-level validation, and avoids the lack of grouping robustness. The improved performance of individual integrity verification based on proposed scheme is validated through experimental analysis. Lastly, compared to other state-of-the-art schemes, our proposed scheme significantly reduces the false negative rate by an average of 5%, the false positive rate by an average of 80% of data verification, and increases the correct verification rate by 50% on average.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

중요도를 고려한 의사 결정 트리 기반 DDoS 공격 분석 (DDoS attack analysis based on decision tree considering importance)

  • 염성관;박상윤;신광성
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 춘계학술대회
    • /
    • pp.652-654
    • /
    • 2021
  • 침입 탐지 시스템에 의해서 DDoS와 같은 공격을 탐지되며 조기에 차단할 수 있다. 의사 결정 트리를 이용하여 DDoS 공격 트래픽을 분석하였다. 중요도가 높은 결정적인 속성(Feature)을 찾아서 해당 속성에 대해서만 의사 결정 트리를 진행하여 정확도를 확인하였다. 그리고 위양성 및 위음성 트래픽의 내용을 분석하였다. 그 결과 하나의 속성은 98%, 두 가지 속성은 99.8%의 정확도를 각각 나타냈다.

  • PDF