Showing 181 - 200 results of 773 for search '"The Alarm"', query time: 0.04s Refine Results
  1. 181

    New Rome-IV criteria of the functional dyspepsia (review) by A. A. Sheptulin, A. A. Kurbatova

    Published 2018-08-01
    “…It is, still, recommended to make the diagnosis of FD, being guided both by compliance of patients symptoms to Rome criteria and the absence of alarm symptoms. The major place in the treatment of PDS is occupied by prokinetics, in EPS treatment - by antisecretory medications. …”
    Get full text
    Article
  2. 182

    DEVELOPMENT AND RESEARCH OF A NOVEL DNC SYSTEM FOR REMOTE MONITORING OF THE MACHINE TOOLS WITH FANUC NC SYSTEM by YAO Peng, LI NanNan, CAO ZhiJun, LI HeLin, XING JunWei, LIU GuoNing

    Published 2018-01-01
    “…A novel DNC(distributed numerical control) system,which is used to remotely monitor CNC machine tools of FANUC NC system as well as inspection equipment or devices,has been developed based on Socket communication and multithread technology by using SQL Server database and.NET platform.This DNC system can collect the real time information of CNC machines and inspection equipment or devices,and has the functions like the machine state monitoring,data integration and management,performance analysis,fault remote diagnosis,workshop production management,and product quality management and control.In this way,the data integrity and integration has been realized.The architecture of the system is presented and the approaches to the realization of the function modules are elaborated.The data flow,data interpretation and alarm monitoring mechanism are also discussed.This system has been applied in manufacturing plants and performs well.…”
    Get full text
    Article
  3. 183

    Detection and Elimination of a Potential Fire in Engine and Battery Compartments of Hybrid Electric Vehicles by Macam S. Dattathreya, Harpreet Singh, Thomas Meitzler

    Published 2012-01-01
    “…The system synthesizes the data and detects potential fires, takes actions for eliminating the hazard, and notifies the passengers about the potential fire using an audible alarm. This paper also presents the computer simulation results of the comparison between the FIA and singleton inference algorithms for detecting potential fires and determining the actions for eliminating them.…”
    Get full text
    Article
  4. 184

    Fast Two-Step Energy Detection for Spectrum Sensing by Meiling Lai, Shengliang Peng, Xi Yang, Lin Zhou

    Published 2015-01-01
    “…Moreover, under the constraint of constant false alarm, this paper optimizes the thresholds from maximizing detection probability point of view. …”
    Get full text
    Article
  5. 185

    Cognitive Radio Spectrum Sensing-Based QAM Technique Using Blockchain by D. Balakumar, S. Nandakumar

    Published 2023-01-01
    “…To address ambiguity, the M-ary QAM technique is provided, which increases aggregate effectiveness in terms of the percentage of false alarm (Pf) and probability of missed detection (Pm) by 5% at a comparable delay period. …”
    Get full text
    Article
  6. 186

    Research on Application of the Feature Transfer Method Based on Fast R-CNN in Smoke Image Recognition by Xi Cheng

    Published 2021-01-01
    “…Experimental results show that this method not only improves the detection accuracy but also effectively reduces the false alarm rate. It can not only meet the real time and accuracy of fire detection but also realize effective fire detection. …”
    Get full text
    Article
  7. 187

    Ship Detection in High-Resolution Dual-Polarization SAR Amplitude Images by Gui Gao, Gongtao Shi, Shilin Zhou

    Published 2013-01-01
    “…A constant false alarm rate (CFAR) detecting method for ships in high-resolution dual-polarization synthetic aperture radar (SAR) amplitude images has been proposed in this paper. …”
    Get full text
    Article
  8. 188

    Application of IoT technology in the prevention of geological hazard by Hui QIAO, Tao WANG, Zhiyuan XIE

    Published 2018-09-01
    “…A system of on-line monitoring,warning,command and dispatch of geological hazard based on the IoT was presented,which was based on the practice of the China Mobile IoT Company on-line monitoring and warning project of geological hazard,and the preventing techniques of geological hazard at home and abroad.The system mainly consisted of four links:online automatic monitoring,geological disaster warning,command and decision-making,rescue scheduling.The system could monitor the geological hazards for 24 hours uninterruptedly,automatically finding the anomaly of the geological hazard points and alarm automatically when abnormal state of the hidden danger points was found.Through the intelligent data analysis,the system could help commanders make the scientific decision quickly; through the IoT label on the rescue personnel,equipment and materials,the system could show them on the map in real time to help commanders dispatch rescue forces to arrive at the scene as soon as possible.Finally,several key technology applications of geological hazard preventing system were prospected.…”
    Get full text
    Article
  9. 189

    Research and practice on fault location technology based on open optical transport network by Hao LIU, Xiaoli HUO, Qian HU, Yi DING

    Published 2022-07-01
    “…At present the network management system of different types of equipment are relatively independent.The problem about how to quickly recover network failure towards inter-domain optical networks is required to be solved in terms of network operation and maintenance.Some fault location schemes within inter-domain optical networks were studied.When any inter-domain fault occurs, firstly, some technologies about automatic link discovery protocol and pilot tone technology of optical modules were applied to get complete optical link information and data.Then, real-time performance monitoring technology and root cause analysis function were used to find the root alarm towards specified network fault.Ultimately the management domain of optical transport networks has been extended by using those methods above on basis of developed prototype system of transmission network operation quality analysis, which may produce an end-to-end open and unified optical transport network management system including the remote client side.…”
    Get full text
    Article
  10. 190

    Covariance matrix opportunistic cooperative spectrum sensing of high detection probability by Shunlan LIU, Jing WANG, Jianrong BAO

    Published 2019-01-01
    “…The relationship between the false alarm probability and the threshold of the new algorithm was also analyzed, and the analytic detection probability was deduced for the actualization of the more accurate spectrum sensing detection. …”
    Get full text
    Article
  11. 191

    Civic Space: Shrinking from the outside in? by David SOGGE

    Published 2020-05-01
    “…Restrictions on NGOs and others promoting civil liberties have caused alarm about «shrinking civic space» perpetrated by their domestic regimes. …”
    Get full text
    Article
  12. 192

    Multiple Disturbances of Existing Tunnels Caused by Deep Excavation and New Shield Tunnel by Haoran Li, Fei Ye, Enjie Su, Xingbo Han

    Published 2023-01-01
    “…This study will be useful for similar projects involving deep excavation next to existing tunnels and overcrossing tunneling, as it will help clarify the protection range of existing lines and determine the displacement alarm value of existing structures.…”
    Get full text
    Article
  13. 193

    Research on intrusion response strategy based on static Bayesian game in mobile edge computing network by Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG

    Published 2023-02-01
    “…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
    Get full text
    Article
  14. 194

    Low complexity acquisition algorithm for GPS signals with low SNR and high dynamic by Zhu-lin XIONG, Ce-lun LIU, Jian-ping AN, Ze-bin XIE

    Published 2015-03-01
    “…Last, the maximum correlation value was sent to a constant false alarm rate detector to de-termine whether the acquisition was success. …”
    Get full text
    Article
  15. 195

    Development of a Car Battery Monitoring System. by Dusabimana Abel

    Published 2023
    “…The GSM module is to be used for communication purpose of sending the message via mobile phone indicating low battery level and then the buzzer is to trigger an alarm. The brain of the system is the microcontroller. …”
    Get full text
    Thesis
  16. 196

    Adaptive anomaly detection disruption prediction starting from first discharge on tokamak by X.K. Ai, W. Zheng, M. Zhang, Y.H. Ding, D.L. Chen, Z.Y. Chen, B.H. Guo, C.S. Shen, N.C. Wang, Z.J. Yang, Z.P. Chen, Y. Pan, B. Shen, B.J. Xiao, J-TEXT team

    Published 2025-01-01
    “…The threshold adaptive adjustment strategy addresses the challenge of selecting alarm thresholds on new devices where the validation set is lacking, ensuring that the alarm thresholds adapt to changes in the discharge scenario. …”
    Get full text
    Article
  17. 197

    Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme by Yunchuan WANG, Xiaorong XU, Yingbiao YAO, Weiwei WU

    Published 2017-08-01
    “…Energy efficiency based PUEA defensive scheme was investigated with performance analysis.In this scheme,CSS energy efficiency was constructed as the optimum objective in the presence of PUEA with secure detection probability and false alarm probability threshold as the constraint conditions.Secure CSS model and PUEA defensive scheme were proposed to achieve energy efficiency based secure CSS.K-out-of-N criterion is set as global decision criterion in the scheme.Optimal fusion threshold K and optimal cooperative SUs N can be determined in secure CSS with the guarantee of energy efficiency.Compared with the traditional maximum ratio combining (MRC) fusion rule,the proposed PUEA defensive scheme not only guarantees system energy efficiency,but also improves system detection performance.Namely,the proposed scheme makes a trade-off between energy efficiency and detection performance in the presence of PUEA.The numerical simulation results show that the proposed strategy is not affected by the PUE interference power,and it has a high degree of persistence for PUEA attack.…”
    Get full text
    Article
  18. 198

    Spectrum sensing method based on residual dense network by Jianxin GAI, Xianfeng XUE, Ruixiang NAN, Jingyi WU

    Published 2021-12-01
    “…Aiming at the problem that the traditional spectrum sensing method based on convolutional neural network(CNN) did not make full use of image feature and the ability of extracting the image feature was limited by the shallow network structure, a spectrum sensing method based on the residual dense network (ResDenNet) was proposed.By adding dense connections in the traditional neural network, the information reuse of the image feature was achieved.Meanwhile, shortcut connections were employed at both ends of the dense unit to implement deeper network training.The spectrum sensing problem was transformed into the image binary classification problem.Firstly, the received signals were integrated into a matrix, which was normalized and transformed by gray level.The obtained gray level images were used as the input of the network.Then, the network was trained through dense learning and residual learning.Finally, the online data was input into the ResDenNet and spectrum sensing was implemented based on image classification.The numerical experiments show that the proposed method is superior to the traditional ones in terms of performance.When the SNR is as low as -19 dB, the detection probability of the proposed method is still high up to 0.96 with a low false alarm probability of 0.1, while a better generalization ability is displayed.…”
    Get full text
    Article
  19. 199

    Spectrum Sensing in Very Low SNR Environment Using Multi-Scale Temporal Correlation Perception with Residual Attention by Song Hong, Weiqiang Xu

    Published 2025-01-01
    “…The analysis of the ROC curve indicates that at an SNR of -20 dB, the proposed MSTC-PANet achieves a detection rate of 98% with a false alarm rate of 10%. Furthermore, MSTC-PANet, which has been trained using digital modulation techniques, also demonstrates applicability to analog modulation.…”
    Get full text
    Article
  20. 200

    Multiple Dependent State Sampling-Based Chart Using Belief Statistic under Neutrosophic Statistics by Ahmed Ibrahim Shawky, Muhammad Aslam, Khushnoor Khan

    Published 2020-01-01
    “…The coefficients of the control chart and the neutrosophic average run lengths have been estimated for specific false alarm probabilities under various process conditions. …”
    Get full text
    Article