false positive ratio
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 11)

H-INDEX

4
(FIVE YEARS 2)

2022 ◽  
Vol 2022 ◽  
pp. 1-16
Author(s):  
Aqsa Mohiyuddin ◽  
Asma Basharat ◽  
Usman Ghani ◽  
Veselý Peter ◽  
Sidra Abbas ◽  
...  

Breast cancer incidence has been rising steadily during the past few decades. It is the second leading cause of death in women. If it is diagnosed early, there is a good possibility of recovery. Mammography is proven to be an excellent screening technique for breast tumor diagnosis, but its detection and classification in mammograms remain a significant challenge. Previous studies’ major limitation is an increase in false positive ratio (FPR) and false negative ratio (FNR), as well as a drop in Matthews correlation coefficient (MCC) value. A model that can lower FPR and FNR while increasing MCC value is required. To overcome prior research limitations, a modified network of YOLOv5 is used in this study to detect and classify breast tumors. Our research is conducted using publicly available datasets Curated Breast Imaging Subset of DDSM (CBIS-DDSM). The first step is to perform preprocessing, which includes image enhancing techniques and the removal of pectoral muscles and labels. The dataset is then annotated, augmented, and divided into 60% for training, 30% for validation, and 10% for testing. The experiment is then performed using a batch size of 8, a learning rate of 0.01, a momentum of 0.843, and an epoch value of 300. To evaluate the performance of our proposed model, our proposed model is compared with YOLOv3 and faster RCNN. The results show that our proposed model performs better than YOLOv3 and faster RCNN with 96% mAP, 93.50% MCC value, 96.50% accuracy, 0.04 FPR, and 0.03 FNR value. The results show that our suggested model successfully identifies and classifies breast tumors while also overcoming previous research limitations by lowering the FPR and FNR and boosting the MCC value.


2021 ◽  
Vol 37 ◽  
pp. 01016
Author(s):  
B N Ramkumar ◽  
T Subbulakshmi

Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.


2020 ◽  
Vol 10 (20) ◽  
pp. 7198
Author(s):  
Junghwan Kim ◽  
Myeong-Cheol Ko ◽  
Moon Sun Shin ◽  
Jinsoo Kim

Prefix caching is one of the notable techniques in enhancing the IP address lookup performance which is crucial in packet forwarding. A cached prefix can match a range of IP addresses, so prefix caching leads to a higher cache hit ratio than IP address caching. However, prefix caching has an issue to be resolved. When a prefix is matched in a cache, the prefix cannot be the result without assuring that there is no longer descendant prefix of the matching prefix which is not cached yet. This is due to the aspect of the IP address lookup seeking to find the longest matching prefix. Some prefix expansion techniques avoid the problem, but the expanded prefixes occupy more entries as well as cover a smaller range of IP addresses. This paper proposes a novel prefix caching scheme in which the original prefix can be cached without expansion. In this scheme, for each prefix, a Bloom filter is constructed to be used for testing if there is any matchable descendant. The false positive ratio of a Bloom filter generally grows as the number of elements contained in the filter increases. We devise an elaborate two-level Bloom filter scheme which adjusts the filter size at each level, to reduce the false positive ratio, according to the number of contained elements. The experimental result shows that the proposed scheme achieves a very low cache miss ratio without increasing the number of prefixes. In addition, most of the filter assertions are negative, which means the proposed prefix cache effectively hits the matching prefix using the filter.


With the quick advancement of web applications, internet users are spending more and more time with these applications .They utilize the benefits of the internet in doing all the day-to-day chores from reading newspaper to grocery shopping .This makes them prone to various kinds of cyber-attacks such as phishing , password attack , malwares etc...Phishing is one of the most common cyber-attack which is made by the attackers to take the users’ delicate data . In phishing attack the users are first tempted with attractive offers and are then redirected to illegitimate (phishing) websites which ask for their credentials .In spite of the alert and awareness spread against these types of cyber-attacks , people continue to fall prey and get affected .The attackers have evolved with time and craft the attacks in such a way that the phishing websites and emails may seem real .Many systems and algorithms have been developed to predict phishing attacks .However ,the achievement rate of phishing attacks stays high and it’s detection is prone towards high true negative and false positive ratio. Therefore ,to deal with this conundrum we are putting forward a generalized algorithm for phishing detection with improved accuracy.


Author(s):  
İbrahim Alper Doğru ◽  
Murat Önder

Besides the applications aimed at increasing the efficiency of the Android mobile devices, also many malicious applications, millions of Android malware according to various security company reports, are being developed and uploaded into the application stores. In order to detect those applications, a malicious Android application detection system based on permission and permission groups namely, AppPerm Analyzer has been developed. The AppPerm Analyzer software extracts the manifest and code permissions of analyzed applications, creates duple and triple permission groups from them, calculates risk scores of these permissions and permission groups according to their usage rates in malicious and benign applications and calculates the total risk score of the analyzed application. After training the software with 7776 applications in total, it is tested with 1664 benign and 1664 malicious applications. In the tests, AppPerm Analyzer detected malicious applications with an accuracy of 96.19% at most. At this point, sensitivity (true-positive ratio) is 95.50% and specificity (true-negative ratio) is 96.88%. If a false-positive ratio up to 10% is accepted, the sensitivity increases to 99.04%.


2020 ◽  
Vol 22 (1) ◽  
pp. 23
Author(s):  
Pınar Mutlu ◽  
HasanOguz Kapicibasi ◽  
şahınurAycan Alkan ◽  
NihalArzu Mirici ◽  
Buse Yuksel ◽  
...  

Electronics ◽  
2019 ◽  
Vol 9 (1) ◽  
pp. 45 ◽  
Author(s):  
Chuan-Yu Chang ◽  
Kathiravan Srinivasan ◽  
Wei-Chun Wang ◽  
Ganapathy Pattukandan Ganapathy ◽  
Durai Raj Vincent ◽  
...  

In recent times, the application of enabling technologies such as digital shearography combined with deep learning approaches in the smart quality assessment of tires, which leads to intelligent tire manufacturing practices with automated defects detection. Digital shearography is a prominent approach that can be employed for identifying the defects in tires, usually not visible to human eyes. In this research, the bubble defects in tire shearography images are detected using a unique ensemble hybrid amalgamation of the convolutional neural networks/ConvNets with high-performance Faster Region-based convolutional neural networks. It can be noticed that the routine of region-proposal generation along with object detection is accomplished using the ConvNets. Primarily, the sliding window based ConvNets are utilized in the proposed model for dividing the input shearography images into regions, in order to identify the bubble defects. Subsequently, this is followed by implementing the Faster Region-based ConvNets for identifying the bubble defects in the tire shearography images and further, it also helps to minimize the false-positive ratio (sometimes referred to as the false alarm ratio). Moreover, it is evident from the experimental results that the proposed hybrid model offers a cent percent detection of bubble defects in the tire shearography images. Also, it can be witnessed that the false-positive ratio gets minimized to 18 percent.


2019 ◽  
Vol 8 (4) ◽  
pp. 12801-12803

One of the most challenging issue nowadays is providing security on MANET architecture. The key issue in MANET is the design of intrusion detection system, that is able to detect attacks in a rapid manner .Traditional methods like genetic algorithms, fuzzy logic, game theory techniques are helpful in designing of IDs. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. These techniques are also tends to increase the false positive ratio, detection rate is low and values of ROC characteristics due to training of feature set of attack patterns . The techniques also failed to detect any new type of attacks by any existing methods. This paper focuses on designing of intrusion detection system based on hybrid approach that effectively able to detect any type of attacks using Evolutionary algorithm techniques.


2019 ◽  
Vol 16 (04) ◽  
pp. 1950016 ◽  
Author(s):  
Duanpo Wu ◽  
Zimeng Wang ◽  
Hong Huang ◽  
Guangsheng Wang ◽  
Junbiao Liu ◽  
...  

Epilepsy is caused by sudden abnormal discharges of neurons in the brain. This paper constructs an automatic seizure detection system, which combines the predicting result of multi-domain feature with the predicting result of spike rate feature to detect the occurrence of epileptic seizures. After segmenting EEG data into 5[Formula: see text]s with 80% overlap epochs, the paper extracts time domain features, frequency domain features and hurst exponents (HE) from each epoch and these features are reduced by linear discriminant analysis (LDA) to be input parameters of the random forest (RF) classifier, which provides classification of the EEG epochs concerning the existence of seizures. In parallel, the paper extracts spikes from EEG data with morphological filter and calculates the spike rate to determine whether there is seizure. Then the results obtained by these two methods are merged as the final detection result. The paper shows that the accuracy (AC), sensitivity (SE), specificity (SP) and the false positive ratio based on event (FPRE) obtained by hybrid method are 98.94%, 76.60%, 98.99% and 2.43 times/h, respectively. Finally, the paper applies the seizure detection method to do seizure warning and recording to help the family member to take care of the patients and the doctor to adjust the antiepileptic drugs (AEDs).


Sign in / Sign up

Export Citation Format

Share Document