• Title/Summary/Keyword: false negative

Search Result 505, Processing Time 0.025 seconds

Value of Sentinel Lymph Node Biopsy in Breast Cancer Surgery with Simple Pathology Facilities -An Iranian Local Experience with a Review of Potential Causes of False Negative Results

  • Amoui, Mahasti;Akbari, Mohammad Esmail;Tajeddini, Araam;Nafisi, Nahid;Raziei, Ghasem;Modares, Seyed Mahdi;Hashemi, Mohammad
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.11
    • /
    • pp.5385-5389
    • /
    • 2012
  • Introduction: Sentinel lymph node biopsy (SLNB) is a precise procedure for lymphatic staging in early breast cancer. In a valid SLNB procedure, axillary lymph node dissection (ALND) can be omitted in nodenegative cases without compromising patient safety. In this study, detection rate, accuracy and false negative rate of SLNB for breast cancer was evaluated in a setting with simple modified conventional pathology facilities without any serial sectioning or immunohistochemistry. Material and Medthod: Patients with confirmed breast cancer were enrolled in the study. SLNB and ALND were performed in all cases. Lymph node metastasis was evaluated in SLN and in nodes removed by ALND to determine the false negative rate. Pathologic assessment was carried out only by modified conventional technique with only 3 sections. Detection rate was determined either by lymphoscintigraphy or during surgery. Results: 78 patients with 79 breast units were evaluated. SLN was detected in 75 of 79 cases (95%) in lymphoscintigraphy and 76 of 79 cases (96%) during surgery. SLN metastases was detected in 30 of 75 (40%) cases either in SLNB and ALND groups. Accuracy of SLNB method for detecting LN metastases was 92%. False negative rate was 3 of 30 of positive cases: 10%. In 7 of 10 cases with axillary lymphadenopathy, LN metastastates was detected. Conclusion: SLNB is recommended for patients with various tumor sizes without palpable lymph nodes. In modified conventional pathologic examination of SLNs, at least macrometastases and some micrometastases could be detected similar to ALND. Consequently, ALND could be omitted in node-negative cases with removal of all palpable LNs. We conclude that SLNB, as one of the most important developments in breast cancer surgery, could be expanded even in areas without sophisticated pathology facilities.

Shot Boundary Detection Using Relative Difference between Two Frames (프레임간의 상대적인 차이를 이용한 비디오의 셔트 검출 기법)

  • 정인식;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.101-104
    • /
    • 2001
  • This paper proposes a unique shot boundary detection algorithm for the video indexing and/or browsing. Conventional methods based on the frame differences and the histogram differences are improved. Instead of using absolute frame differences, block by block based relative frame differences are employed. Frame adaptive thresholding values are also employed for the better detection. for the cases that the frame differences are not enough to detect the shot boundary, histogram differences are selectively applied. Experimental results show that the proposed algorithm reduces both the “false positive” errors and the “false negative” errors especially for the videos of dynamic local and/or global motions

  • PDF

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

An Analysis on the Error Probability of A Bloom Filter (블룸필터의 오류 확률에 대한 분석)

  • Kim, SungYong;Kim, JiHong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.809-815
    • /
    • 2014
  • As the size of the data is getting larger and larger due to improvement of the telecommunication techniques, it would be main issues to develop and process the database. The bloom filter used to lookup a particular element under the given set is very useful structure because of the space efficiency. In this paper, we introduce the error probabilities in Bloom filter. Especially, we derive the revised false positive rates of the Bloom filter using experimental method. Finally we analyze and compare the original false positive probability of the bloom filter used until now and the false decision probability proposed in this paper.

An Aggregate Detection Method for Improved Sensitivity using Correlation of Heterogeneous Intrusion Detection Sensors (이종의 침입탐지센서 관련성을 이용한 통합탐지의 민감도 향상 방법)

  • 김용민;김민수;김홍근;노봉남
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.29-39
    • /
    • 2002
  • In general, the intrusion detection method of anomalous behaviors has high false alarm rate which contains false-positive and false-negative. To increase the sensitivity of intrusion detection, we propose a method of aggregate detection to reduce false alarm rate by using correlation between misuse activity detection sensors and anomalous ones. For each normal behavior and anomalous one, we produce the reflection rate between the result from one sensor and another in off-line. Then, we apply this rate to the result of real-time detection to reduce false alarm rate.

An Automatic Portscan Detection System with Adaptive Threshold Setting

  • Kim, Sang-Kon;Lee, Seung-Ho;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.74-85
    • /
    • 2010
  • For the purpose of compromising hosts, attackers including infected hosts initially perform a portscan using IP addresses in order to find vulnerable hosts. Considerable research related to portscan detection has been done and many algorithms have been proposed and implemented in the network intrusion detection system (NIDS). In order to distinguish portscanners from remote hosts, most portscan detection algorithms use a fixed threshold that is manually managed by the network manager. Because the threshold is a constant, even though the network environment or the characteristics of traffic can change, many false positives and false negatives are generated by NIDS. This reduces the efficiency of NIDS and imposes a high processing burden on a network management system (NMS). In this paper, in order to address this problem, we propose an automatic portscan detection system using an fast increase slow decrease (FISD) scheme, that will automatically and adaptively set the threshold based on statistical data for traffic during prior time periods. In particular, we focus on reducing false positives rather than false negatives, while the threshold is adaptively set within a range between minimum and maximum values. We also propose a new portscan detection algorithm, rate of increase in the number of failed connection request (RINF), which is much more suitable for our system and shows better performance than other existing algorithms. In terms of the implementation, we compare our scheme with other two simple threshold estimation methods for an adaptive threshold setting scheme. Also, we compare our detection algorithm with other three existing approaches for portscan detection using a real traffic trace. In summary, we show that FISD results in less false positives than other schemes and RINF can fast and accurately detect portscanners. We also show that the proposed system, including our scheme and algorithm, provides good performance in terms of the rate of false positives.

DDoS Defense Using the Exhaustiveness of Attackers (공격자의 자원소진특성을 이용한 분산서비스불능화 (DDoS) 공격에 대한 방어)

  • Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.77-82
    • /
    • 2007
  • A novel DDoS (Distributed Denial-of-Service) defense technique, Exaustiveness-Based Detection, is proposed in this work. It dispenses with the network congestion and the unfairness between users of the Defense-by-Offense technique by incorporating a kind of simple Detect-and-Block scheme (user identification), still improving the effectiveness of the defense in comparison to the original Defense-by-Offense technique. It uses SYN cookies to identify users in the granularity of ip address and to prevent ip address spoofing by the attacker. There can be, however, some probability of false negative (denying service to good clients), if the attacker wisely adapt to the new technique by saving some portion of its bandwidth resource and later mimicking good clients. Quantitative analysis the requirement for the good clients to be safe from the false negative is provided and a procedure to design the server capacity is explained.

  • PDF

Cytohistopathologic Comparative Study of Aspiration Biopsy Cytology from Various Sites (흡인세포검사의 세포-병리학적 검색)

  • Park, Hyo-Sook
    • The Korean Journal of Cytopathology
    • /
    • v.2 no.1
    • /
    • pp.8-19
    • /
    • 1991
  • A statistical analysis of the diagnostic value for 244 aspiration biopsy cytology(ABC) among a total 1,043 cases from various sites was performed. ABC, using diagnostic terminology similar to that of a surgical pathology reports, was compared to the final tissue diagnosis. For the entire series, a sensitivity of 91.8%, a specificity of 99.3%, a positive predictive value of 98.9%, a negative predictive value of 94,8%, and an efficacy of the test of 96.3% were shown. There were 8 false negative and 1 false positive diagnosis. The diagnostic accuracy was 89.8%. Those results indicate that the ABC is a considerably highly accurate procedure that should be routinely employed.

  • PDF

Intrusion Detection based on Intrusion Prediction DB using System Call Sequences (시스템 호출을 이용한 침입예상 데이터베이스 기반 침입탐지)

  • Ko, Ki-Woong;Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.927-930
    • /
    • 2002
  • 본 논문에서는 중요 프로세스(privileged process)의 시스템 호출 순서(system call sequence)를 이용한 침입탐지 시스템을 제안한다. 기존 연구의 정상행위 기반 침입탐지 시스템은 정상행위를 모델링하여 시스템을 구성하고, 이와 비교를 통해 프로세스의 이상(anomaly) 여부를 결정한다. 이러한 방법은 모델링되지 않은 미지의 행위에 대한 적절한 판단을 행할 수 없으므로, 높은 오류율(false-positive/negative)을 보인다. 본 논문에서는 현재까지 알려진 공격에서 공통적으로 나타나는 윈도우들을 수집하여 침입예상윈도우를 구축하고, 이를 기존의 침입탐지 시스템에 부가적으로 사용하여 효과적으로 오류율(false-positive/negative)을 낮출 수 있음을 보인다. 실험 결과 제안된 방법을 통한 침입탐지는 기존의 방법에 비해 공격 탐지율은 증가하고 정상행위에 대한 오류율은 감소하였다.

  • PDF

A Comparative Study of Cytology & Cervicography for Cervical Cancer Screening (자궁경부 세포진검사 및 자궁경부 확대촬영술의 비교연구)

  • Ha, Jung-Gyu;Yun, Dal-Sik;Lee, Jun-Gi;Choe, Chang-Geun;U, Yang-Rye;Lee, Jin-Su;Lee, Yun-Hui;Park, Jae-Yeong;Lee, Yeong-Im
    • Journal of Korea Association of Health Promotion
    • /
    • v.2 no.1
    • /
    • pp.27-37
    • /
    • 2004
  • Background 'For many years, the Papanicolaou smear has been used to detect pre-malignant and malignant disease of the cervix. Although cervical cytology screening programmes have result in the reduction of cervical cancer incidence and mortality, Pap smear have been subjected to intense scrutiny and criticism in recent years. So cervicography is introduced. Cervicography is an adjunct method of cervical cancer screening intended to complement Papanicolaou smear. Cervicography involve obtaining and evaluating a photographic image of the cervix. The purpose of this investigation was to evaluate the efficacy of Papanicolaou smear and cervicography in cervical cancer screening. Materials & Methods : This study population was of 74 women, who visited department of obstetrics & Gynecology, Korea association of Health Promotion Chung-nam branch from January, 20O2 to October, 2003. All patients were taken Pap smear before cervicography, and then two cervicography was obtained with applying5% acetic acid. Those women in whom abnormalities were detected by either test subsequently obtained histologic specimen. Results : 1. The sensitivity and the specificity of Papanicolaou smear was 92.1% and 72.7%respectively.2. The sensitivity and the specificity of cervicography was 88.9% and 54.5% respectively. The false negative rate, and false positive rate of Papanicolaou smear were 7.9%, 27.2% respectively. The false negative rate, and false positive rate of cervicography were 11.1%,45.5% respectively. Conclusions . Papanicolaou smear is a useful method and an important tool for detecting cervical cancer. However when Papanicolaou smear and Cervicograpy is used together, the sensitivity is higher than for Papanicolaou smear used alone.

  • PDF