CINXE.COM
Search results for: false negative rate
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: false negative rate</title> <meta name="description" content="Search results for: false negative rate"> <meta name="keywords" content="false negative rate"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="false negative rate" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="false negative rate"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 12483</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: false negative rate</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12483</span> Balanced Ischemia Misleading to a False Negative Myocardial Perfusion Imaging (Stress) Test</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Devam%20Sheth">Devam Sheth </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nuclear imaging with stress myocardial perfusion (stress test) is the preferred first line investigation for noninvasive evaluation of ischaemic heart condition. The sensitivity of this test is close to 90 % making it a very reliable test. However, rarely it gives a false negative result which can be explained by the phenomenon termed as “balanced ischaemia”. We present the case of a 78 year Caucasian female without any significant past cardiac history, who presents with chest pain and shortness of breath since one day. The initial ECG and cardiac enzymes were non-impressive. Few hours later, she had some substernal chest pain along with some ST segment depression in the lateral leads. Stress test comes back negative for any significant perfusion defects. However, given her typical symptoms, she underwent a cardiac catheterization which revealed significant triple vessel disease mandating her to get a bypass surgery. This unusual phenomenon of false nuclear stress test in the setting of positive ECG changes can be explained only by balanced ischemia wherein due to global myocardial ischemia, the stress test fails to reveal relative perfusion defects in the affected segments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=balanced" title="balanced">balanced</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positive" title=" false positive"> false positive</a>, <a href="https://publications.waset.org/abstracts/search?q=ischemia" title=" ischemia"> ischemia</a>, <a href="https://publications.waset.org/abstracts/search?q=myocardial%20perfusion%20imaging" title=" myocardial perfusion imaging"> myocardial perfusion imaging</a> </p> <a href="https://publications.waset.org/abstracts/49756/balanced-ischemia-misleading-to-a-false-negative-myocardial-perfusion-imaging-stress-test" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49756.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12482</span> Improvements in OpenCV's Viola Jones Algorithm in Face Detection–Skin Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jyoti%20Bharti">Jyoti Bharti</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20K.%20Gupta"> M. K. Gupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Astha%20Jain"> Astha Jain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a new improved approach for false positives filtering of detected face images on OpenCV’s Viola Jones Algorithm In this approach, for Filtering of False Positives, Skin Detection in two colour spaces i.e. HSV (Hue, Saturation and Value) and YCrCb (Y is luma component and Cr- red difference, Cb- Blue difference) is used. As a result, it is found that false detection has been reduced. Our proposed method reaches the accuracy of about 98.7%. Thus, a better recognition rate is achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=face%20detection" title="face detection">face detection</a>, <a href="https://publications.waset.org/abstracts/search?q=Viola%20Jones" title=" Viola Jones"> Viola Jones</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positives" title=" false positives"> false positives</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenCV" title=" OpenCV"> OpenCV</a> </p> <a href="https://publications.waset.org/abstracts/48849/improvements-in-opencvs-viola-jones-algorithm-in-face-detection-skin-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12481</span> A Comparative Study of Malware Detection Techniques Using Machine Learning Methods</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cristina%20Vatamanu">Cristina Vatamanu</a>, <a href="https://publications.waset.org/abstracts/search?q=Doina%20Cosovan"> Doina Cosovan</a>, <a href="https://publications.waset.org/abstracts/search?q=Dragos%20Gavrilut"> Dragos Gavrilut</a>, <a href="https://publications.waset.org/abstracts/search?q=Henri%20Luchian"> Henri Luchian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the past few years, the amount of malicious software increased exponentially and, therefore, machine learning algorithms became instrumental in identifying clean and malware files through semi-automated classification. When working with very large datasets, the major challenge is to reach both a very high malware detection rate and a very low false positive rate. Another challenge is to minimize the time needed for the machine learning algorithm to do so. This paper presents a comparative study between different machine learning techniques such as linear classifiers, ensembles, decision trees or various hybrids thereof. The training dataset consists of approximately 2 million clean files and 200.000 infected files, which is a realistic quantitative mixture. The paper investigates the above mentioned methods with respect to both their performance (detection rate and false positive rate) and their practicability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ensembles" title="ensembles">ensembles</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positives" title=" false positives"> false positives</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20selection" title=" feature selection"> feature selection</a>, <a href="https://publications.waset.org/abstracts/search?q=one%20side%20class%20algorithm" title=" one side class algorithm"> one side class algorithm</a> </p> <a href="https://publications.waset.org/abstracts/30093/a-comparative-study-of-malware-detection-techniques-using-machine-learning-methods" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30093.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12480</span> An Improved Two-dimensional Ordered Statistical Constant False Alarm Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Weihao%20Wang">Weihao Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhulin%20Zong"> Zhulin Zong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Two-dimensional ordered statistical constant false alarm detection is a widely used method for detecting weak target signals in radar signal processing applications. The method is based on analyzing the statistical characteristics of the noise and clutter present in the radar signal and then using this information to set an appropriate detection threshold. In this approach, the reference cell of the unit to be detected is divided into several reference subunits. These subunits are used to estimate the noise level and adjust the detection threshold, with the aim of minimizing the false alarm rate. By using an ordered statistical approach, the method is able to effectively suppress the influence of clutter and noise, resulting in a low false alarm rate. The detection process involves a number of steps, including filtering the input radar signal to remove any noise or clutter, estimating the noise level based on the statistical characteristics of the reference subunits, and finally, setting the detection threshold based on the estimated noise level. One of the main advantages of two-dimensional ordered statistical constant false alarm detection is its ability to detect weak target signals in the presence of strong clutter and noise. This is achieved by carefully analyzing the statistical properties of the signal and using an ordered statistical approach to estimate the noise level and adjust the detection threshold. In conclusion, two-dimensional ordered statistical constant false alarm detection is a powerful technique for detecting weak target signals in radar signal processing applications. By dividing the reference cell into several subunits and using an ordered statistical approach to estimate the noise level and adjust the detection threshold, this method is able to effectively suppress the influence of clutter and noise and maintain a low false alarm rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=two-dimensional" title="two-dimensional">two-dimensional</a>, <a href="https://publications.waset.org/abstracts/search?q=ordered%20statistical" title=" ordered statistical"> ordered statistical</a>, <a href="https://publications.waset.org/abstracts/search?q=constant%20false%20alarm" title=" constant false alarm"> constant false alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a>, <a href="https://publications.waset.org/abstracts/search?q=weak%20target%20signals" title=" weak target signals"> weak target signals</a> </p> <a href="https://publications.waset.org/abstracts/163351/an-improved-two-dimensional-ordered-statistical-constant-false-alarm-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163351.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12479</span> Fast Accurate Detection of Frequency Jumps Using Kalman Filter with Non Linear Improvements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20E.%20Mohamed">Mahmoud E. Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20F.%20Shalash"> Ahmed F. Shalash</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20A.%20Kamal"> Hanan A. Kamal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In communication systems, frequency jump is a serious problem caused by the oscillators used. Kalman filters are used to detect that jump, Despite the tradeoff between the noise level and the speed of the detection. In this paper, An improvement is introduced in the Kalman filter, Through a nonlinear change in the bandwidth of the filter. Simulation results show a considerable improvement in the filter speed with a very low noise level. Additionally, The effect on the response to false alarms is also presented and false alarm rate show improvement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kalman%20filter" title="Kalman filter">Kalman filter</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20detection" title=" false detection"> false detection</a>, <a href="https://publications.waset.org/abstracts/search?q=improvement" title=" improvement "> improvement </a> </p> <a href="https://publications.waset.org/abstracts/7978/fast-accurate-detection-of-frequency-jumps-using-kalman-filter-with-non-linear-improvements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">602</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12478</span> ANA Negative but FANA Positive Patients with Clinical Symptoms of Rheumatic Disease: The Suggestion for Clinicians</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdolreza%20Esmaeilzadeh">Abdolreza Esmaeilzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehri%20Mirzaei"> Mehri Mirzaei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: Rheumatic disease is a chronic disease that causes pain, stiffness, swelling and limited motion and function of many joints. RA is the most common form of autoimmune arthritis, affecting more than 1.3 million Americans. Of these, about 75% are women. Materials and Methods: This study was formed due to the misconception about ANA test, which is frequently performed with methods based upon solid phase as ELISA. This experiment was conducted on 430 patients, with clinical symptoms that are likely affected with rheumatic diseases, simultaneously by means of ANA and FANA. Results: 36 cases (8.37%) of patients, despite positive ANA, have demonstrated negative results via Indirect Immunofluorescence Assay (IIFA), (false positive). 116 cases (27%) have demonstrated negative ANA results, by means of the ELISA technique, although they had positive IIFA results. Conclusion: Other advantages of IIFA are antibody titration and specific pattern detection that have the capability of distinguishing positive dsDNA results. According to the restrictions and false negative cases, in patients, IIFA test is highly recommended for these disease's diagnosis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autoimmune%20disease" title="autoimmune disease">autoimmune disease</a>, <a href="https://publications.waset.org/abstracts/search?q=IIFA" title=" IIFA"> IIFA</a>, <a href="https://publications.waset.org/abstracts/search?q=EIA" title=" EIA"> EIA</a>, <a href="https://publications.waset.org/abstracts/search?q=rheumatic%20disease" title=" rheumatic disease"> rheumatic disease</a> </p> <a href="https://publications.waset.org/abstracts/23763/ana-negative-but-fana-positive-patients-with-clinical-symptoms-of-rheumatic-disease-the-suggestion-for-clinicians" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">499</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12477</span> A Study on the False Alarm Rates of MEWMA and MCUSUM Control Charts When the Parameters Are Estimated</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umar%20Farouk%20Abbas">Umar Farouk Abbas</a>, <a href="https://publications.waset.org/abstracts/search?q=Danjuma%20Mustapha"> Danjuma Mustapha</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamisu%20Idi"> Hamisu Idi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is now a known fact that quality is an important issue in manufacturing industries. A control chart is an integrated and powerful tool in statistical process control (SPC). The mean µ and standard deviation σ parameters are estimated. In general, the multivariate exponentially weighted moving average (MEWMA) and multivariate cumulative sum (MCUSUM) are used in the detection of small shifts in joint monitoring of several correlated variables; the charts used information from past data which makes them sensitive to small shifts. The aim of the paper is to compare the performance of Shewhart xbar, MEWMA, and MCUSUM control charts in terms of their false rates when parameters are estimated with autocorrelation. A simulation was conducted in R software to generate the average run length (ARL) values of each of the charts. After the analysis, the results show that a comparison of the false alarm rates of the charts shows that MEWMA chart has lower false alarm rates than the MCUSUM chart at various levels of parameter estimated to the number of ARL0 (in control) values. Also noticed was that the sample size has an advert effect on the false alarm of the control charts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=average%20run%20length" title="average run length">average run length</a>, <a href="https://publications.waset.org/abstracts/search?q=MCUSUM%20chart" title=" MCUSUM chart"> MCUSUM chart</a>, <a href="https://publications.waset.org/abstracts/search?q=MEWMA%20chart" title=" MEWMA chart"> MEWMA chart</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20alarm%20rate" title=" false alarm rate"> false alarm rate</a>, <a href="https://publications.waset.org/abstracts/search?q=parameter%20estimation" title=" parameter estimation"> parameter estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a> </p> <a href="https://publications.waset.org/abstracts/106504/a-study-on-the-false-alarm-rates-of-mewma-and-mcusum-control-charts-when-the-parameters-are-estimated" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12476</span> Mosaic Augmentation: Insights and Limitations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olivia%20A.%20Kjorlien">Olivia A. Kjorlien</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Asghari"> Maryam Asghari</a>, <a href="https://publications.waset.org/abstracts/search?q=Farshid%20Alizadeh-Shabdiz"> Farshid Alizadeh-Shabdiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goal of this paper is to investigate the impact of mosaic augmentation on the performance of object detection solutions. To carry out the study, YOLOv4 and YOLOv4-Tiny models have been selected, which are popular, advanced object detection models. These models are also representatives of two classes of complex and simple models. The study also has been carried out on two categories of objects, simple and complex. For this study, YOLOv4 and YOLOv4 Tiny are trained with and without mosaic augmentation for two sets of objects. While mosaic augmentation improves the performance of simple object detection, it deteriorates the performance of complex object detection, specifically having the largest negative impact on the false positive rate in a complex object detection case. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accuracy" title="accuracy">accuracy</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positives" title=" false positives"> false positives</a>, <a href="https://publications.waset.org/abstracts/search?q=mosaic%20augmentation" title=" mosaic augmentation"> mosaic augmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20detection" title=" object detection"> object detection</a>, <a href="https://publications.waset.org/abstracts/search?q=YOLOV4" title=" YOLOV4"> YOLOV4</a>, <a href="https://publications.waset.org/abstracts/search?q=YOLOV4-Tiny" title=" YOLOV4-Tiny"> YOLOV4-Tiny</a> </p> <a href="https://publications.waset.org/abstracts/162634/mosaic-augmentation-insights-and-limitations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162634.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12475</span> Method of False Alarm Rate Control for Cyclic Redundancy Check-Aided List Decoding of Polar Codes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dmitry%20Dikarev">Dmitry Dikarev</a>, <a href="https://publications.waset.org/abstracts/search?q=Ajit%20Nimbalker"> Ajit Nimbalker</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexei%20Davydov"> Alexei Davydov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Polar coding is a novel example of error correcting codes, which can achieve Shannon limit at block length N→∞ with log-linear complexity. Active research is being carried to adopt this theoretical concept for using in practical applications such as 5th generation wireless communication systems. Cyclic redundancy check (CRC) error detection code is broadly used in conjunction with successive cancellation list (SCL) decoding algorithm to improve finite-length polar code performance. However, there are two issues: increase of code block payload overhead by CRC bits and decrease of CRC error-detection capability. This paper proposes a method to control CRC overhead and false alarm rate of polar decoding. As shown in the computer simulations results, the proposed method provides the ability to use any set of CRC polynomials with any list size while maintaining the desired level of false alarm rate. This level of flexibility allows using polar codes in 5G New Radio standard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=5G%20New%20Radio" title="5G New Radio">5G New Radio</a>, <a href="https://publications.waset.org/abstracts/search?q=channel%20coding" title=" channel coding"> channel coding</a>, <a href="https://publications.waset.org/abstracts/search?q=cyclic%20redundancy%20check" title=" cyclic redundancy check"> cyclic redundancy check</a>, <a href="https://publications.waset.org/abstracts/search?q=list%20decoding" title=" list decoding"> list decoding</a>, <a href="https://publications.waset.org/abstracts/search?q=polar%20codes" title=" polar codes"> polar codes</a> </p> <a href="https://publications.waset.org/abstracts/85145/method-of-false-alarm-rate-control-for-cyclic-redundancy-check-aided-list-decoding-of-polar-codes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85145.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12474</span> Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadjah%20Chergui">Nadjah Chergui</a>, <a href="https://publications.waset.org/abstracts/search?q=Narhimene%20Boustia"> Narhimene Boustia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context" title="context">context</a>, <a href="https://publications.waset.org/abstracts/search?q=default" title=" default"> default</a>, <a href="https://publications.waset.org/abstracts/search?q=exception" title=" exception"> exception</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/46511/using-vulnerability-to-reduce-false-positive-rate-in-intrusion-detection-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46511.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12473</span> The Correlation of Economic Variables on Domestic Investment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amirreza%20Attarzadeh">Amirreza Attarzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to investigate the relationship between economic variables, e.g., inflation rate, interest rate, trade openness and the growth rate of GDP, with domestic investment. The present study also draws on conceptual economy related theories to verify the negative effect of interest rates on domestic investment. However, trade openness and growth rate had a positive correlation, and the inflation rate may have a positive or negative impact on domestic investment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inflation%20rate" title="inflation rate">inflation rate</a>, <a href="https://publications.waset.org/abstracts/search?q=growth%20rate%20of%20GDP" title=" growth rate of GDP"> growth rate of GDP</a>, <a href="https://publications.waset.org/abstracts/search?q=interest%20rate%20and%20trade%20openness" title=" interest rate and trade openness"> interest rate and trade openness</a>, <a href="https://publications.waset.org/abstracts/search?q=domestic%20investment" title=" domestic investment"> domestic investment</a> </p> <a href="https://publications.waset.org/abstracts/41609/the-correlation-of-economic-variables-on-domestic-investment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41609.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12472</span> Filtering Intrusion Detection Alarms Using Ant Clustering Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghodhbani%20Salah">Ghodhbani Salah</a>, <a href="https://publications.waset.org/abstracts/search?q=Jemili%20Farah"> Jemili Farah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system" title="intrusion detection system">intrusion detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20filtering" title=" alarm filtering"> alarm filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=ANT%20class" title=" ANT class"> ANT class</a>, <a href="https://publications.waset.org/abstracts/search?q=ant%20clustering" title=" ant clustering"> ant clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=intruders%E2%80%99%20behaviors" title=" intruders’ behaviors"> intruders’ behaviors</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20alarms" title=" false alarms"> false alarms</a> </p> <a href="https://publications.waset.org/abstracts/23716/filtering-intrusion-detection-alarms-using-ant-clustering-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23716.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">403</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12471</span> A Method for False Alarm Recognition Based on Multi-Classification Support Vector Machine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Weiwei%20Cui">Weiwei Cui</a>, <a href="https://publications.waset.org/abstracts/search?q=Dejian%20Lin"> Dejian Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Leigang%20Zhang"> Leigang Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yao%20Wang"> Yao Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zheng%20Sun"> Zheng Sun</a>, <a href="https://publications.waset.org/abstracts/search?q=Lianfeng%20Li"> Lianfeng Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Built-in test (BIT) is an important technology in testability field, and it is widely used in state monitoring and fault diagnosis. With the improvement of modern equipment performance and complexity, the scope of BIT becomes larger, and it leads to the emergence of false alarm problem. The false alarm makes the health assessment unstable, and it reduces the effectiveness of BIT. The conventional false alarm suppression methods such as repeated test and majority voting cannot meet the requirement for a complicated system, and the intelligence algorithms such as artificial neural networks (ANN) are widely studied and used. However, false alarm has a very low frequency and small sample, yet a method based on ANN requires a large size of training sample. To recognize the false alarm, we propose a method based on multi-classification support vector machine (SVM) in this paper. Firstly, we divide the state of a system into three states: healthy, false-alarm, and faulty. Then we use multi-classification with '1 vs 1' policy to train and recognize the state of a system. Finally, an example of fault injection system is taken to verify the effectiveness of the proposed method by comparing ANN. The result shows that the method is reasonable and effective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=false%20alarm" title="false alarm">false alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20diagnosis" title=" fault diagnosis"> fault diagnosis</a>, <a href="https://publications.waset.org/abstracts/search?q=SVM" title=" SVM"> SVM</a>, <a href="https://publications.waset.org/abstracts/search?q=k-means" title=" k-means"> k-means</a>, <a href="https://publications.waset.org/abstracts/search?q=BIT" title=" BIT"> BIT</a> </p> <a href="https://publications.waset.org/abstracts/87531/a-method-for-false-alarm-recognition-based-on-multi-classification-support-vector-machine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87531.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12470</span> Mixture statistical modeling for predecting mortality human immunodeficiency virus (HIV) and tuberculosis(TB) infection patients</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Asrul%20Affendi%20Bi%20Abdullah">Mohd Asrul Affendi Bi Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Nyi%20Nyi%20Naing"> Nyi Nyi Naing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study was to identify comparable manner between negative binomial death rate (NBDR) and zero inflated negative binomial death rate (ZINBDR) with died patients with (HIV + T B+) and (HIV + T B−). HIV and TB is a serious world wide problem in the developing country. Data were analyzed with applying NBDR and ZINBDR to make comparison which a favorable model is better to used. The ZINBDR model is able to account for the disproportionately large number of zero within the data and is shown to be a consistently better fit than the NBDR model. Hence, as a results ZINBDR model is a superior fit to the data than the NBDR model and provides additional information regarding the died mechanisms HIV+TB. The ZINBDR model is shown to be a use tool for analysis death rate according age categorical. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=zero%20inflated%20negative%20binomial%20death%20rate" title="zero inflated negative binomial death rate">zero inflated negative binomial death rate</a>, <a href="https://publications.waset.org/abstracts/search?q=HIV%20and%20TB" title=" HIV and TB"> HIV and TB</a>, <a href="https://publications.waset.org/abstracts/search?q=AIC%20and%20BIC" title=" AIC and BIC"> AIC and BIC</a>, <a href="https://publications.waset.org/abstracts/search?q=death%20rate" title=" death rate"> death rate</a> </p> <a href="https://publications.waset.org/abstracts/33245/mixture-statistical-modeling-for-predecting-mortality-human-immunodeficiency-virus-hiv-and-tuberculosistb-infection-patients" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33245.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">432</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12469</span> Empirical Research on Rate of Return, Interest Rate and Mudarabah Deposit </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Inten%20Meutia">Inten Meutia</a>, <a href="https://publications.waset.org/abstracts/search?q=Emylia%20Yuniarti"> Emylia Yuniarti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this study is to analyze the effects of interest rate, the rate of return of Islamic banks on the amount of mudarabah deposits in Islamic banks. In analyzing the effect of rate of return in the Islamic banks and interest rate risk in the conventional banks, the 1-month Islamic deposit rate of return and 1 month fixed deposit interest rate of a total Islamic deposit are considered. Using data covering the period from January 2010 to Sepember 2013, the study applies the regression analysis to analyze the effect between variable and independence t-test to analyze the mean difference between rate of return and rate of interest. Regression analysis shows that rate of return have significantly negative influence on mudarabah deposits, while interest rate have negative influence but not significant. The result of independent t test shows that the interest rate is not different from the rate of return in Islamic Bank. It supports the hyphotesis that rate of return in Islamic banking mimic rate of interest in conventional bank. The results of the study have important implications on the risk management practices of the Islamic banks in Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conventional%20bank" title="conventional bank">conventional bank</a>, <a href="https://publications.waset.org/abstracts/search?q=interest%20rate" title=" interest rate"> interest rate</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20bank" title=" Islamic bank"> Islamic bank</a>, <a href="https://publications.waset.org/abstracts/search?q=rate%20of%20return" title=" rate of return"> rate of return</a> </p> <a href="https://publications.waset.org/abstracts/8419/empirical-research-on-rate-of-return-interest-rate-and-mudarabah-deposit" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">512</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12468</span> Detecting Overdispersion for Mortality AIDS in Zero-inflated Negative Binomial Death Rate (ZINBDR) Co-infection Patients in Kelantan </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Asrul%20Affedi">Mohd Asrul Affedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Nyi%20Nyi%20Naing"> Nyi Nyi Naing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Overdispersion is present in count data, and basically when a phenomenon happened, a Negative Binomial (NB) is commonly used to replace a standard Poisson model. Analysis of count data event, such as mortality cases basically Poisson regression model is appropriate. Hence, the model is not appropriate when existing a zero values. The zero-inflated negative binomial model is appropriate. In this article, we modelled the mortality cases as a dependent variable by age categorical. The objective of this study to determine existing overdispersion in mortality data of AIDS co-infection patients in Kelantan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=negative%20binomial%20death%20rate" title="negative binomial death rate">negative binomial death rate</a>, <a href="https://publications.waset.org/abstracts/search?q=overdispersion" title=" overdispersion"> overdispersion</a>, <a href="https://publications.waset.org/abstracts/search?q=zero-inflation%20negative%20binomial%20death%20rate" title=" zero-inflation negative binomial death rate"> zero-inflation negative binomial death rate</a>, <a href="https://publications.waset.org/abstracts/search?q=AIDS" title=" AIDS "> AIDS </a> </p> <a href="https://publications.waset.org/abstracts/33248/detecting-overdispersion-for-mortality-aids-in-zero-inflated-negative-binomial-death-rate-zinbdr-co-infection-patients-in-kelantan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33248.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">463</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12467</span> BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xinghang%20Lv">Xinghang Lv</a>, <a href="https://publications.waset.org/abstracts/search?q=Tao%20Peng"> Tao Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Jia%20Chen"> Jia Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Junping%20Liu"> Junping Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xinrong%20Hu"> Xinrong Hu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ruhan%20He"> Ruhan He</a>, <a href="https://publications.waset.org/abstracts/search?q=Minghua%20Jiang"> Minghua Jiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Wenli%20Cao"> Wenli Cao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20detection" title="vulnerability detection">vulnerability detection</a>, <a href="https://publications.waset.org/abstracts/search?q=abstract%20syntax%20tree" title=" abstract syntax tree"> abstract syntax tree</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20flow%20graph" title=" control flow graph"> control flow graph</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20dependency%20graph" title=" data dependency graph"> data dependency graph</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20representation" title=" code representation"> code representation</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a> </p> <a href="https://publications.waset.org/abstracts/148239/bodeacd-buffer-overflow-vulnerabilities-detecting-based-on-abstract-syntax-tree-control-flow-graph-and-data-dependency-graph" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12466</span> Attack Redirection and Detection using Honeypots</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chowduru%20Ramachandra%20Sharma">Chowduru Ramachandra Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Shatunjay%20Rawat"> Shatunjay Rawat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=honeypot" title="honeypot">honeypot</a>, <a href="https://publications.waset.org/abstracts/search?q=TPOT" title=" TPOT"> TPOT</a>, <a href="https://publications.waset.org/abstracts/search?q=snort" title=" snort"> snort</a>, <a href="https://publications.waset.org/abstracts/search?q=NIDS" title=" NIDS"> NIDS</a>, <a href="https://publications.waset.org/abstracts/search?q=honeybird" title=" honeybird"> honeybird</a>, <a href="https://publications.waset.org/abstracts/search?q=iptables" title=" iptables"> iptables</a>, <a href="https://publications.waset.org/abstracts/search?q=netfilter" title=" netfilter"> netfilter</a>, <a href="https://publications.waset.org/abstracts/search?q=redirection" title=" redirection"> redirection</a>, <a href="https://publications.waset.org/abstracts/search?q=attack%20detection" title=" attack detection"> attack detection</a>, <a href="https://publications.waset.org/abstracts/search?q=docker" title=" docker"> docker</a>, <a href="https://publications.waset.org/abstracts/search?q=snare" title=" snare"> snare</a>, <a href="https://publications.waset.org/abstracts/search?q=tanner" title=" tanner"> tanner</a> </p> <a href="https://publications.waset.org/abstracts/143612/attack-redirection-and-detection-using-honeypots" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143612.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12465</span> Reduction of False Positives in Head-Shoulder Detection Based on Multi-Part Color Segmentation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lae-Jeong%20Park">Lae-Jeong Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper presents a method that utilizes figure-ground color segmentation to extract effective global feature in terms of false positive reduction in the head-shoulder detection. Conventional detectors that rely on local features such as HOG due to real-time operation suffer from false positives. Color cue in an input image provides salient information on a global characteristic which is necessary to alleviate the false positives of the local feature based detectors. An effective approach that uses figure-ground color segmentation has been presented in an effort to reduce the false positives in object detection. In this paper, an extended version of the approach is presented that adopts separate multipart foregrounds instead of a single prior foreground and performs the figure-ground color segmentation with each of the foregrounds. The multipart foregrounds include the parts of the head-shoulder shape and additional auxiliary foregrounds being optimized by a search algorithm. A classifier is constructed with the feature that consists of a set of the multiple resulting segmentations. Experimental results show that the presented method can discriminate more false positive than the single prior shape-based classifier as well as detectors with the local features. The improvement is possible because the presented approach can reduce the false positives that have the same colors in the head and shoulder foregrounds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pedestrian%20detection" title="pedestrian detection">pedestrian detection</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20segmentation" title=" color segmentation"> color segmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positive" title=" false positive"> false positive</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a> </p> <a href="https://publications.waset.org/abstracts/61932/reduction-of-false-positives-in-head-shoulder-detection-based-on-multi-part-color-segmentation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">281</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12464</span> The Impact of Exchange Rate Volatility on Real Total Export and Sub-Categories of Real Total Export of Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wong%20Hock%20Tsen">Wong Hock Tsen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to investigate the impact of exchange rate volatility on real export in Malaysia. The moving standard deviation with order three (MSD(3)) is used for the measurement of exchange rate volatility. The conventional and partially asymmetric autoregressive distributed lag (ARDL) models are used in the estimations. This study finds exchange rate volatility to have significant impact on real total export and some sub-categories of real total export. Moreover, this study finds that the positive or negative exchange rate volatility tends to have positive or negative impact on real export. Exchange rate volatility can be harmful to export of Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exchange%20rate%20volatility" title="exchange rate volatility">exchange rate volatility</a>, <a href="https://publications.waset.org/abstracts/search?q=autoregressive%20distributed%20lag" title=" autoregressive distributed lag"> autoregressive distributed lag</a>, <a href="https://publications.waset.org/abstracts/search?q=export" title=" export"> export</a>, <a href="https://publications.waset.org/abstracts/search?q=Malaysia" title=" Malaysia"> Malaysia</a> </p> <a href="https://publications.waset.org/abstracts/53891/the-impact-of-exchange-rate-volatility-on-real-total-export-and-sub-categories-of-real-total-export-of-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53891.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12463</span> Linear Frequency Modulation-Frequency Shift Keying Radar with Compressive Sensing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ho%20Jeong%20Jin">Ho Jeong Jin</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang%20Won%20Seo"> Chang Won Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=Choon%20Sik%20Cho"> Choon Sik Cho</a>, <a href="https://publications.waset.org/abstracts/search?q=Bong%20Yong%20Choi"> Bong Yong Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwang%20Kyun%20Na"> Kwang Kyun Na</a>, <a href="https://publications.waset.org/abstracts/search?q=Sang%20Rok%20Lee"> Sang Rok Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a radar signal processing technique using the LFM-FSK (Linear Frequency Modulation-Frequency Shift Keying) is proposed for reducing the false alarm rate based on the compressive sensing. The LFM-FSK method combines FMCW (Frequency Modulation Continuous Wave) signal with FSK (Frequency Shift Keying). This shows an advantage which can suppress the ghost phenomenon without the complicated CFAR (Constant False Alarm Rate) algorithm. Moreover, the parametric sparse algorithm applying the compressive sensing that restores signals efficiently with respect to the incomplete data samples is also integrated, leading to reducing the burden of ADC in the receiver of radars. 24 GHz FMCW signal is applied and tested in the real environment with FSK modulated data for verifying the proposed algorithm along with the compressive sensing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compressive%20sensing" title="compressive sensing">compressive sensing</a>, <a href="https://publications.waset.org/abstracts/search?q=LFM-FSK%20radar" title=" LFM-FSK radar"> LFM-FSK radar</a>, <a href="https://publications.waset.org/abstracts/search?q=radar%20signal%20processing" title=" radar signal processing"> radar signal processing</a>, <a href="https://publications.waset.org/abstracts/search?q=sparse%20algorithm" title=" sparse algorithm"> sparse algorithm</a> </p> <a href="https://publications.waset.org/abstracts/51309/linear-frequency-modulation-frequency-shift-keying-radar-with-compressive-sensing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51309.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">481</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12462</span> Multicenter Evaluation of the ACCESS Anti-HCV Assay on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis C Virus Antibody</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dan%20W.%20Rhodes">Dan W. Rhodes</a>, <a href="https://publications.waset.org/abstracts/search?q=Juliane%20Hey"> Juliane Hey</a>, <a href="https://publications.waset.org/abstracts/search?q=Magali%20Karagueuzian"> Magali Karagueuzian</a>, <a href="https://publications.waset.org/abstracts/search?q=Florianne%20Martinez"> Florianne Martinez</a>, <a href="https://publications.waset.org/abstracts/search?q=Yael%20Sandowski"> Yael Sandowski</a>, <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Roulet"> Vanessa Roulet</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20Badawi"> Mahmoud Badawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed-Amine%20Chakir"> Mohammed-Amine Chakir</a>, <a href="https://publications.waset.org/abstracts/search?q=Val%C3%A9rie%20Simon"> Valérie Simon</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%A9mie%20Gautier"> Jérémie Gautier</a>, <a href="https://publications.waset.org/abstracts/search?q=Fran%C3%A7oise%20Le%20Boulaire"> Françoise Le Boulaire</a>, <a href="https://publications.waset.org/abstracts/search?q=Catherine%20Coignard"> Catherine Coignard</a>, <a href="https://publications.waset.org/abstracts/search?q=Claire%20Vincent"> Claire Vincent</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandrine%20Greaume"> Sandrine Greaume</a>, <a href="https://publications.waset.org/abstracts/search?q=Isabelle%20Voisin"> Isabelle Voisin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Beckman Coulter, Inc. (BEC) has recently developed a fully automated second-generation anti-HCV test on a new immunoassay platform. The objective of this multicenter study conducted in Europe was to evaluate the performance of the ACCESS anti-HCV assay on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer as an aid in the diagnosis of HCV (Hepatitis C Virus) infection and as a screening test for blood and plasma donors. Methods: The clinical specificity of the ACCESS anti-HCV assay was determined using HCV antibody-negative samples from blood donors and hospitalized patients. Sample antibody status was determined by a CE-marked anti-HCV assay (Abbott ARCHITECTTM anti-HCV assay or Abbott PRISM HCV assay) with an additional confirmation method (Immunoblot testing with INNO-LIATM HCV Score - Fujirebio), if necessary, according to pre-determined testing algorithms. The clinical sensitivity was determined using known HCV antibody-positive samples, identified positive by Immunoblot testing with INNO-LIATM HCV Score - Fujirebio. HCV RNA PCR or genotyping was available on all Immunoblot positive samples for further characterization. The false initial reactive rate was determined on fresh samples from blood donors and hospitalized patients. Thirty (30) commercially available seroconversion panels were tested to assess the sensitivity for early detection of HCV infection. The study was conducted from November 2019 to March 2022. Three (3) external sites and one (1) internal site participated. Results: Clinical specificity (95% CI) was 99.7% (99.6 – 99.8%) on 5852 blood donors and 99.0% (98.4 – 99.4%) on 1527 hospitalized patient samples. There were 15 discrepant samples (positive on ACCESS anti-HCV assay and negative on both ARCHITECT and Immunoblot) observed with hospitalized patient samples, and of note, additional HCV RNA PCR results showed five (5) samples had positive HCV RNA PCR results despite the absence of HCV antibody detection by ARCHITECT and Immunoblot, suggesting a better sensitivity of the ACCESS anti-HCV assay with these five samples compared to the ARCHITECT and Immunoblot anti-HCV assays. Clinical sensitivity (95% CI) on 510 well-characterized, known HCV antibody-positive samples was 100.0% (99.3 – 100.0%), including 353 samples with known HCV genotypes (1 to 6). The overall false initial reactive rate (95% CI) on 6630 patient samples was 0.02% (0.00 – 0.09%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS anti-HCV assay had equivalent sensitivity performances, with an average bleed difference since the first reactive bleed below one (1), compared to the ARCHITECTTM anti-HCV assay. Conclusion: The newly developed ACCESS anti-HCV assay from BEC for use on the DxI 9000 ACCESS Immunoassay Analyzer demonstrated high clinical sensitivity and specificity, equivalent to currently marketed anti-HCV assays, as well as a low false initial reactive rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DxI%209000%20ACCESS%20Immunoassay%20Analyzer" title="DxI 9000 ACCESS Immunoassay Analyzer">DxI 9000 ACCESS Immunoassay Analyzer</a>, <a href="https://publications.waset.org/abstracts/search?q=HCV" title=" HCV"> HCV</a>, <a href="https://publications.waset.org/abstracts/search?q=HCV%20antibody" title=" HCV antibody"> HCV antibody</a>, <a href="https://publications.waset.org/abstracts/search?q=Hepatitis%20C%20virus" title=" Hepatitis C virus"> Hepatitis C virus</a>, <a href="https://publications.waset.org/abstracts/search?q=immunoassay" title=" immunoassay"> immunoassay</a> </p> <a href="https://publications.waset.org/abstracts/152600/multicenter-evaluation-of-the-access-anti-hcv-assay-on-the-dxi-9000-access-immunoassay-analyzer-for-the-detection-of-hepatitis-c-virus-antibody" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152600.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12461</span> Performance Analysis of Traffic Classification with Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Htay%20Htay%20Yi">Htay Htay Yi</a>, <a href="https://publications.waset.org/abstracts/search?q=Zin%20May%20Aye"> Zin May Aye</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate" title="false negative rate">false negative rate</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system" title=" intrusion detection system"> intrusion detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning%20methods" title=" machine learning methods"> machine learning methods</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a> </p> <a href="https://publications.waset.org/abstracts/133091/performance-analysis-of-traffic-classification-with-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133091.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12460</span> Multicenter Evaluation of the ACCESS HBsAg and ACCESS HBsAg Confirmatory Assays on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis B Surface Antigen</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Roulet">Vanessa Roulet</a>, <a href="https://publications.waset.org/abstracts/search?q=Marc%20Turini"> Marc Turini</a>, <a href="https://publications.waset.org/abstracts/search?q=Juliane%20Hey"> Juliane Hey</a>, <a href="https://publications.waset.org/abstracts/search?q=St%C3%A9phanie%20Bord-Romeu"> Stéphanie Bord-Romeu</a>, <a href="https://publications.waset.org/abstracts/search?q=Emilie%20Bonzom"> Emilie Bonzom</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20Badawi"> Mahmoud Badawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed-Amine%20Chakir"> Mohammed-Amine Chakir</a>, <a href="https://publications.waset.org/abstracts/search?q=Val%C3%A9rie%20Simon"> Valérie Simon</a>, <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Viotti"> Vanessa Viotti</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%A9mie%20Gautier"> Jérémie Gautier</a>, <a href="https://publications.waset.org/abstracts/search?q=Fran%C3%A7oise%20Le%20Boulaire"> Françoise Le Boulaire</a>, <a href="https://publications.waset.org/abstracts/search?q=Catherine%20Coignard"> Catherine Coignard</a>, <a href="https://publications.waset.org/abstracts/search?q=Claire%20Vincent"> Claire Vincent</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandrine%20Greaume"> Sandrine Greaume</a>, <a href="https://publications.waset.org/abstracts/search?q=Isabelle%20Voisin"> Isabelle Voisin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Beckman Coulter, Inc. has recently developed fully automated assays for the detection of HBsAg on a new immunoassay platform. The objective of this European multicenter study was to evaluate the performance of the ACCESS HBsAg and ACCESS HBsAg Confirmatory assays† on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer. Methods: The clinical specificity of the ACCESS HBsAg and HBsAg Confirmatory assays was determined using HBsAg-negative samples from blood donors and hospitalized patients. The clinical sensitivity was determined using presumed HBsAg-positive samples. Sample HBsAg status was determined using a CE-marked HBsAg assay (Abbott ARCHITECT HBsAg Qualitative II, Roche Elecsys HBsAg II, or Abbott PRISM HBsAg assay) and a CE-marked HBsAg confirmatory assay (Abbott ARCHITECT HBsAg Qualitative II Confirmatory or Abbott PRISM HBsAg Confirmatory assay) according to manufacturer package inserts and pre-determined testing algorithms. False initial reactive rate was determined on fresh hospitalized patient samples. The sensitivity for the early detection of HBV infection was assessed internally on thirty (30) seroconversion panels. Results: Clinical specificity was 99.95% (95% CI, 99.86 – 99.99%) on 6047 blood donors and 99.71% (95%CI, 99.15 – 99.94%) on 1023 hospitalized patient samples. A total of six (6) samples were found false positive with the ACCESS HBsAg assay. None were confirmed for the presence of HBsAg with the ACCESS HBsAg Confirmatory assay. Clinical sensitivity on 455 HBsAg-positive samples was 100.00% (95% CI, 99.19 – 100.00%) for the ACCESS HBsAg assay alone and for the ACCESS HBsAg Confirmatory assay. The false initial reactive rate on 821 fresh hospitalized patient samples was 0.24% (95% CI, 0.03 – 0.87%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS HBsAg assay had equivalent sensitivity performances compared to the Abbott ARCHITECT HBsAg Qualitative II assay with an average bleed difference since first reactive bleed of 0.13. All bleeds found reactive in ACCESS HBsAg assay were confirmed in ACCESS HBsAg Confirmatory assay. Conclusion: The newly developed ACCESS HBsAg and ACCESS HBsAg Confirmatory assays from Beckman Coulter have demonstrated high clinical sensitivity and specificity, equivalent to currently marketed HBsAg assays, as well as a low false initial reactive rate. †Pending achievement of CE compliance; not yet available for in vitro diagnostic use. 2023-11317 Beckman Coulter and the Beckman Coulter product and service marks mentioned herein are trademarks or registered trademarks of Beckman Coulter, Inc. in the United States and other countries. All other trademarks are the property of their respective owners. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dxi%209000%20access%20immunoassay%20analyzer" title="dxi 9000 access immunoassay analyzer">dxi 9000 access immunoassay analyzer</a>, <a href="https://publications.waset.org/abstracts/search?q=hbsag" title=" hbsag"> hbsag</a>, <a href="https://publications.waset.org/abstracts/search?q=hbv" title=" hbv"> hbv</a>, <a href="https://publications.waset.org/abstracts/search?q=hepatitis%20b%20surface%20antigen" title=" hepatitis b surface antigen"> hepatitis b surface antigen</a>, <a href="https://publications.waset.org/abstracts/search?q=hepatitis%20b%20virus" title=" hepatitis b virus"> hepatitis b virus</a>, <a href="https://publications.waset.org/abstracts/search?q=immunoassay" title=" immunoassay"> immunoassay</a> </p> <a href="https://publications.waset.org/abstracts/164572/multicenter-evaluation-of-the-access-hbsag-and-access-hbsag-confirmatory-assays-on-the-dxi-9000-access-immunoassay-analyzer-for-the-detection-of-hepatitis-b-surface-antigen" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164572.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12459</span> A Crystal Plasticity Approach to Model Dynamic Strain Aging</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Burak%20Bal">Burak Bal</a>, <a href="https://publications.waset.org/abstracts/search?q=Demircan%20Canadinc"> Demircan Canadinc</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Dynamic strain aging (DSA), resulting from the reorientation of C-Mn clusters in the core of dislocations, can provide a strain hardening mechanism. In addition, in Hadfield steel, negative strain rate sensitivity is observed due to the DSA. In our study, we incorporated dynamic strain aging onto crystal plasticity computations to predict the local instabilities and corresponding negative strain rate sensitivity. Specifically, the material response of Hadfield steel was obtained from monotonic and strain-rate jump experiments under tensile loading. The strain rate range was adjusted from 10⁻⁴ to 10⁻¹s ⁻¹. The crystal plasticity modeling of the material response was carried out based on Voce-type hardening law and corresponding Voce hardening parameters were determined. The solute pinning effect of carbon atom was incorporated to crystal plasticity simulations at microscale level by computing the shear stress contribution imposed on an arrested dislocation by carbon atom. After crystal plasticity simulations with modifying hardening rule, which takes into account the contribution of DSA, it was seen that the model successfully predicts both the role of DSA and corresponding strain rate sensitivity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crystal%20plasticity" title="crystal plasticity">crystal plasticity</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20strain%20aging" title=" dynamic strain aging"> dynamic strain aging</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadfield%20steel" title=" Hadfield steel"> Hadfield steel</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20strain%20rate%20sensitivity" title=" negative strain rate sensitivity"> negative strain rate sensitivity</a> </p> <a href="https://publications.waset.org/abstracts/76918/a-crystal-plasticity-approach-to-model-dynamic-strain-aging" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76918.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">260</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12458</span> Angiographic Evaluation of ETT (Treadmill) Positive Patients in a Tertiary Care Hospital of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syed%20Dawood%20Md.%20Taimur">Syed Dawood Md. Taimur</a>, <a href="https://publications.waset.org/abstracts/search?q=Saidur%20Rahman%20Khan"> Saidur Rahman Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Farzana%20Islam"> Farzana Islam </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: To evaluate the factors which predetermine the coronary artery disease in patients having positive Exercise Tolerance Test (ETT) that is treadmill results and coronary artery findings. Methods: This descriptive study was conducted at Department of Cardiology, Ibrahim Cardiac Hospital & Research Institute,Dhaka,Bangladesh from 1st January, 2014 to 31st August, 2014. All patients who had done ETT (treadmill) for chest pain diagnosis were studied. One hundred and four patients underwent coronary angiogram after positive treadmill result. Patients were divided into two groups depending upon the angiographic findings, i.e. true positive and false positive. Positive treadmill test patients who have coronary artery involvement these are called true positive and who have no involvement they are called false positive group. Both groups were compared with each other. Results: Out of 104 patients, 81 (77.9%) patients had true positive ETT and 23 (22.1%) patients had false positive ETT. The mean age of patients in positive ETT was 53.46± 8.06 years and male mean age was 53.63±8.36 years and female was 52.87 ± 7.0 years. Sixty nine (85.19%) male patients and twelve (14.81%) female patients had true positive ETT, whereas 15 (65.21%) males and 8 (34.79%) females had false positive ETT, this was statistically significant (p<0.032)difference in the two groups(sex) in comparison of true and false positive ETT. The risk factors of these patients like diabetes mellitus, hypertension, dyslipidemia, family history and smoking were seen among these patients. Hypertensive patients having true positive which were statically significant (p<0.004) and diabetic, dyslipidaemic patients having true positive which were statically significant (p < 0.032 & 0.030).True positive patients had family history were 68 (83.95%) and smoking were 52 (64.20%), where family history patients had statistically significant(p<0.017) between two groups of patients and smokers were significant (p<0.012). 46 true positive patients achieved THR which was not statistically significant (P<0.138)and 79 true patients had abnormal resting ECG whether it was significant (p<0.036). Amongst the vessels involvement the most common was LAD 55 (67.90%), followed by LCX 42 (51.85%), RCA 36 (44.44%) and the LMCA was 9 (11.11%), .40 patients (49.38%) had SVD, 26 (30.10%) had DVD, 15(18.52%) had TVD and 23 had normal coronary arteries. Conclusion: It can be concluded that among the female patients who have positive ETT with normal resting ECG, who had achieved target heart rate are likely to have a false positive test result. Conversely male patients,resting abnormal ECG who had not achieved THR, symptom limited ETT, have a hypertension, diabetis, dyslipidaemic, family history and smoking are likely to have a true positive treadmill test result. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exercise%20tolerance%20test" title="exercise tolerance test">exercise tolerance test</a>, <a href="https://publications.waset.org/abstracts/search?q=coronary%20artery%20disease" title=" coronary artery disease"> coronary artery disease</a>, <a href="https://publications.waset.org/abstracts/search?q=coronary%20angiography" title=" coronary angiography"> coronary angiography</a>, <a href="https://publications.waset.org/abstracts/search?q=true%20positive" title=" true positive"> true positive</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positive" title=" false positive"> false positive</a> </p> <a href="https://publications.waset.org/abstracts/17646/angiographic-evaluation-of-ett-treadmill-positive-patients-in-a-tertiary-care-hospital-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17646.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12457</span> A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqing%20Wang">Xiaoqing Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Junfeng%20Wang"> Junfeng Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaolan%20Zhu"> Xiaolan Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=API%20Calls" title=" API Calls"> API Calls</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=permissions%20combination" title=" permissions combination"> permissions combination</a> </p> <a href="https://publications.waset.org/abstracts/51217/a-static-android-malware-detection-based-on-actual-used-permissions-combination-and-api-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51217.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12456</span> Modeling False Statements in Texts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francielle%20A.%20Vargas">Francielle A. Vargas</a>, <a href="https://publications.waset.org/abstracts/search?q=Thiago%20A.%20S.%20Pardo"> Thiago A. S. Pardo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to the standard philosophical definition, lying is saying something that you believe to be false with the intent to deceive. For deception detection, the FBI trains its agents in a technique named statement analysis, which attempts to detect deception based on parts of speech (i.e., linguistics style). This method is employed in interrogations, where the suspects are first asked to make a written statement. In this poster, we model false statements using linguistics style. In order to achieve this, we methodically analyze linguistic features in a corpus of fake news in the Portuguese language. The results show that they present substantial lexical, syntactic and semantic variations, as well as punctuation and emotion distinctions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deception%20detection" title="deception detection">deception detection</a>, <a href="https://publications.waset.org/abstracts/search?q=linguistics%20style" title=" linguistics style"> linguistics style</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20linguistics" title=" computational linguistics"> computational linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a> </p> <a href="https://publications.waset.org/abstracts/129388/modeling-false-statements-in-texts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129388.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12455</span> Determination of Strain Rate Sensitivity (SRS) for Grain Size Variants on Nanocrystalline Materials Produced by ARB and ECAP</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20B.%20Sob">P. B. Sob</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20B.%20Tengen"> T. B. Tengen</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20A.%20Alugongo"> A. A. Alugongo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mechanical behavior of 6082T6 aluminum is investigated at different temperatures. The strain rate sensitivity is investigated at different temperatures on the grain size variants. The sensitivity of the measured grain size variants on 3-D grain is discussed. It is shown that the strain rate sensitivities are negative for the grain size variants during the deformation of nanostructured materials. It is also observed that the strain rate sensitivities vary in different ways with the equivalent radius, semi minor axis radius, semi major axis radius and major axis radius. From the obtained results, it is shown that the variation of strain rate sensitivity with temperature suggests that the strain rate sensitivity at the low and the high temperature ends of the 6082T6 aluminum range is different. The obtained results revealed transition at different temperature from negative strain rate sensitivity as temperature increased on the grain size variants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nanostructured%20materials" title="nanostructured materials">nanostructured materials</a>, <a href="https://publications.waset.org/abstracts/search?q=grain%20size%20variants" title=" grain size variants"> grain size variants</a>, <a href="https://publications.waset.org/abstracts/search?q=temperature" title=" temperature"> temperature</a>, <a href="https://publications.waset.org/abstracts/search?q=yield%20stress" title=" yield stress"> yield stress</a>, <a href="https://publications.waset.org/abstracts/search?q=strain%20rate%20sensitivity" title=" strain rate sensitivity"> strain rate sensitivity</a> </p> <a href="https://publications.waset.org/abstracts/36624/determination-of-strain-rate-sensitivity-srs-for-grain-size-variants-on-nanocrystalline-materials-produced-by-arb-and-ecap" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36624.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12454</span> Test of Moisture Sensor Activation Speed</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=I.%20Parkova">I. Parkova</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Vali%C5%A1evskis"> A. Vališevskis</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Vi%C4%BCumsone"> A. Viļumsone</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nocturnal enuresis or bed-wetting is intermittent incontinence during sleep of children after age 5 that may precipitate wide range of behavioural and developmental problems. One of the non-pharmacological treatment methods is the use of a bed-wetting alarm system. In order to improve comfort conditions of nocturnal enuresis alarm system, modular moisture sensor should be replaced by a textile sensor. In this study behaviour and moisture detection speed of woven and sewn sensors were compared by analysing change in electrical resistance after solution (salt water) was dripped on sensor samples. Material of samples has different structure and yarn location, which affects solution detection rate. Sensor system circuit was designed and two sensor tests were performed: system activation test and false alarm test to determine the sensitivity of the system and activation threshold. Sewn sensor had better result in system’s activation test – faster reaction, but woven sensor had better result in system’s false alarm test – it was less sensitive to perspiration simulation. After experiments it was found that the optimum switching threshold is 3V in case of 5V input voltage, which provides protection against false alarms, for example – during intensive sweating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conductive%20yarns" title="conductive yarns">conductive yarns</a>, <a href="https://publications.waset.org/abstracts/search?q=moisture%20textile%20sensor" title=" moisture textile sensor"> moisture textile sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=industry" title=" industry"> industry</a>, <a href="https://publications.waset.org/abstracts/search?q=material" title=" material"> material</a> </p> <a href="https://publications.waset.org/abstracts/7649/test-of-moisture-sensor-activation-speed" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7649.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">246</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=416">416</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=417">417</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>