scholarly journals Anxiety

2019 ◽  
Author(s):  
Angarika Deb ◽  
Nikhil Chaudhary

From an evolutionary perspective, anxiety can be considered as a psychological hazard-detection system. In uncertain environments, the costs of responding to false cues of danger are often miniscule as compared to those resulting from undetected threats. Therefore, the anxiety response has evolved a bias towards false alarms under conditions of uncertainty. We discuss general and specific types of anxiety responses, underlining how the nature of these are often determined by the particular types of threats in the environment.

2021 ◽  
Author(s):  
Farah Jemili ◽  
Hajer Bouras

In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performance in terms of accuracy, precision, detection rates, and false alarms.


Author(s):  
Mohamed Cheikh ◽  
Salima Hacini ◽  
Zizette Boufaida

Intrusion detection system (IDS) plays a vital and crucial role in a computer security. However, they suffer from a number of problems such as low detection of DoS (denial-of-service)/DDoS (distributed denial-of-service) attacks with a high rate of false alarms. In this chapter, a new technique for detecting DoS attacks is proposed; it detects DOS attacks using a set of classifiers and visualizes them in real time. This technique is based on the collection of network parameter values (data packets), which are automatically represented by simple geometric graphs in order to highlight relevant elements. Two implementations for this technique are performed. The first is based on the Euclidian distance while the second is based on KNN algorithm. The effectiveness of the proposed technique has been proven through a simulation of network traffic drawn from the 10% KDD and a comparison with other classification techniques for intrusion detection.


Author(s):  
Carolina I. Restrepo ◽  
Po-Ting Chen ◽  
Ronald R. Sostaric ◽  
John M. Carson

2013 ◽  
Vol 347-350 ◽  
pp. 3619-3623
Author(s):  
Bing Li ◽  
Yuan Yan Tang ◽  
Di Wen ◽  
Zhen Chao Zhang ◽  
Bo Yang Ding

This paper briefly introduced the development of video face detection and point out the shortage of current face detection system that may produce much of false alarms. Then we detail the classic Viola face detector which using integral image, Haar-like features and AdaBoost algorithm for training. Compared with Viola face detector, we proposed an available multi-model fusion method to reduce false alarms in video face detection that is combining head-shoulder detector with HOG features. After introduced the related knowledge of HOG features, we proposed a fusion detector structure which can improve the accuracy and efficiency of detection.


Author(s):  
Nadia Baha ◽  
Eden Beloudah ◽  
Mehdi Ousmer

Falls are the major health problem among older people who live alone in their home. In the past few years, several studies have been proposed to solve the dilemma especially those which exploit video surveillance. In this paper, in order to allow older adult to safely continue living in home environments, the authors propose a method which combines two different configurations of the Microsoft Kinect: The first one is based on the person's depth information and his velocity (Ceiling mounted Kinect). The second one is based on the variation of bounding box parameters and its velocity (Frontal Kinect). Experimental results on real datasets are conducted and a comparative evaluation of the obtained results relative to the state-of-art methods is presented. The results show that the authors' method is able to accurately detect several types of falls in real-time as well as achieving a significant reduction in false alarms and improves detection rates.


2011 ◽  
Vol 128-129 ◽  
pp. 676-681 ◽  
Author(s):  
Hong Mei Kai ◽  
Xiao Jie Liu ◽  
Ya Fei Liu ◽  
Lin Zhou

As soon as the Intrusion Detection System (IDS) detects any suspicious or malicious activity, it will generate alarms. Unfortunately, the triggered alarms usually are accompanied with huge number of false alarms (false-positives and false-negatives) which is the key performance parameters of the IDS. The risk of false-negatives is higher than false-positives. In our previous paper, we proposed a novel intelligent intrusion detection, decision, response system (I2D2RS) with fuzzy theory, which use the two essential information times and time, of the failed login to decide automatically the attacker like an experienced system/security administrator. Though the system can reduce the false alarms perfectly, the capability of processing simultaneous multi-point attack is relatively weak, and then false-negatives will be occurred. In this paper, we employ a preprocessing module to collect the failed login information before data processing. The proposed approach changes the processing procedure from serial to parallel processing, thus eliminates the false-negatives. The efficiency of these improvements was confirmed with the experiments.


Sign in / Sign up

Export Citation Format

Share Document