-
201
Myocardial Damage in SARS-CoV-2 Infection
Published 2020-11-01“…Cardiovascular manifestations induced by the new coronavirus SARS-CoV-2 may give a fatal course to COVID-19 and cause alarm in the world medical community. Patients with a history of arterial hypertension, coronary heart disease and cardiomyopathy constitute a very high risk population of complications from the coronavirus. …”
Get full text
Article -
202
Blind detection for image steganography using short du ate codes statistical model for Hilbert scanning sequences
Published 2013-01-01“…By analyzing and proving the correlation between the detection capability of a short duplicate code statistical feature and the probability of cumulating short duplicate codes、the dimension of short duplicate codes,a method to improving the detection capability of a short duplicate code statistical feature was found.Then,a blind detection method for image steganography using short duplicate codes statistical model for Hilbert scanning sequences was proposed.The proposed method used Poisson distribution test to detect the stego-message based on the statistical feature of short duplicate code with same elements in LSB Hilbert scanning sequences.So,the proposed method could make full use of Hilbert curve to maintain the good properties of local correlation,and could not only use the correlation of adjacent elements,but also use the correlation of elements in local regions.Theoretical lysis and experiments show that the proposed method can effectively improve the detection rate under the condition of effectively controlling the false alarm rate.…”
Get full text
Article -
203
Exploiting Optimal Threshold for Decision Fusion in Wireless Sensor Networks
Published 2014-02-01“…The optimal local thresholds and global threshold are derived by using the Minimax criterion based analysis while they are ensuring false alarm rate constraint, without a preestimated target appearance probability. …”
Get full text
Article -
204
Multi scale power spectral density subband gradient-based spectrum sensing algorithm and performance analysis
Published 2016-02-01“…Theoretically expressions of statistical properties, false alarm probability, detection probability and decision threshold in different channels were deduced. …”
Get full text
Article -
205
Fine C/A code acquisition algorithm for weak GPS signal based on averaging correlation and differential coherent accumulation
Published 2015-05-01“…Aiming at the problem of global positioning system (GPS) C/A code acquisition under weak signal conditions,a code acquisition algorithm based on averaging correlation and differential coherent accumulation was proposed.First,the strength ratio of the largest peak to the second largest peak was adopted as the decision variable; optimum decision thresholds can be obtained through the simulation probability of false alarm of all kinds of acquisition algorithms.Second,by setting the decision threshold,the probabilities of detection of different Doppler frequency deviation and signal to noise ratio (SNR) were obtained.Finally,acquisition sensitivities of the code acquisition algorithm based on the differen-tial coherent accumulation were compared with those of the code acquisition algorithm based on coherent and noncoher-ent accumulation and the code acquisition algorithm based on noncoherent accumulation.Simulation results show that acquisition sensitivities of the code acquisition algorithm based on the differential coherent accumulation are improved by about 2.0 dB than those of the other two acquisition algorithms under the same receiving data length condition.…”
Get full text
Article -
206
Seizure Associated Takotsubo Syndrome: A Rare Combination
Published 2017-01-01“…She was on telemetry which showed ST alarm. Electrocardiogram (ECG) was ordered and showed ST elevation in anterolateral leads and troponins were positive. …”
Get full text
Article -
207
Leakage Detection in Water Pipes: An Approach of Smart Water
Published 2023-03-01“…The System contains 2 parts: the first part is alarm based on Global System for Mobile (GSM) technology to send Short Message Service (SMS) to the owner. …”
Get full text
Article -
208
Diogenes Syndrome: Identification and Distinction from Hoarding Disorder
Published 2021-01-01“…Police officers attended the man’s home following the alarm being raised by his stepfather that he had not been seen or heard from in 3 weeks. …”
Get full text
Article -
209
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
Published 2024-12-01“…Second, Backpropagation enables the system to improve automatically over time, reducing false alarm rates and enhancing prevention effectiveness. …”
Get full text
Article -
210
Design and realization of compressor data abnormality safety monitoring and inducement traceability expert system.
Published 2025-01-01“…The results show that this method effectively overcomes the problems of false alarms and missed alarms based on fixed threshold alarm methods, and achieves 100% classification of two types of faults: non starting of the drive machine and low oil pressure by constructing a PCA (Principal Component Analysis)-SPE (Square Prediction Error)-CNN (Convolutional Neural Network) classifier. …”
Get full text
Article -
211
Classification, Mechanisms of Action, and Therapeutic Applications of Inhibitory Oligonucleotides for Toll-Like Receptors (TLR) 7 and 9
Published 2010-01-01“…The innate force acts as an alarm mechanism that senses changes in the microenvironment through the recognition of common microbial patterns by Toll-like receptors (TLR) and NOD proteins. …”
Get full text
Article -
212
Railway safety monitoring algorithm based on distributed optical fiber vibration sensor
Published 2020-09-01“…Aiming at the monitoring problem of the human climbing behaviour existing along the railway,a railway safety detection algorithm based on distributed optical fiber vibration sensors was proposed by combining the distributed optical fiber sensing technology and signal analysis technology.The surrounding vibration was sensed and transmitted through the optical cables laid along the fence network of the railway,and then the Internet of things (IoT) connection between the railway and monitoring algorithm was built to realize the intelligent monitoring of the climbing behavior.In view of the complicated surrounding environment of the railway and more interference,the Hamming window and wavelet threshold denoising method were used to filter the signal of each frame to improve the signal-to-noise ratio of the vibration signal.In the selection of features,the power spectrum and short-time over-level rate of the signal were extracted from the time domain and frequency domain respectively as a joint feature to determine whether there was climbing or creeping behavior.Since that the climbing behavior was spatially continuous,the minimum alarm range was set to filter out alarms with a too small range,which improved the accuracy of the monitoring system.…”
Get full text
Article -
213
Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach
Published 2022-01-01“…The binary model achieved a classification accuracy of 99.55% with a very low false alarm rate of 0.45%. The classification accuracy of the multiclassification model was also high (98.92%). …”
Get full text
Article -
214
The Construction of an Action-Speech Feature-Based School Violence Recognition Algorithm and Occupational Therapy Education Model for Adolescents
Published 2022-01-01“…The recall rate for violent actions is increased to 90.0%, thus reducing the missed alarm rate of the system.…”
Get full text
Article -
215
Abnormal Event Detection in Wireless Sensor Networks Based on Multiattribute Correlation
Published 2017-01-01“…Experimental results show that the proposed algorithm can reduce the impact of interference factors and the rate of the false alarm effectively; it can also improve the accuracy of event detection.…”
Get full text
Article -
216
14 NO.LU PROTOKOL ÇERÇEVESİNDE AVRUPA İNSAN HAKLARI SÖZLEŞMESİ DENETİM SİSTEMİNDE İYİLEŞTİRME ÇALIŞMALARI
Published 2007-06-01“…Ancak, bireysel başvuru sayısındaki artış hızı karşısında 1998 yılında yürürlüğe giren yeni sistem de kısa sürede alarm vermeye başlamıştır. Avrupa İnsan Hakları Mahkemesinin artan iş yüküyle baş edebilmesi için düşünülen çare 14 No.lu Protokol olmuştur. 14 No.lu Protokol mevcut sistemi esaslı bir şekilde değiştiren bir reform olmaktan ziyade, uygulamadaki aksakları gidermeye ve işlerin akışını hızlandırmaya yönelik tedbirler içermektedir. …”
Get full text
Article -
217
Saúde e desastres no Brasil: uma reflexão sobre os aspectos envolvidos em eventos hidrológicos e rompimento de barragens
Published 2019-11-01“…In this context, disaster preparedness and response plans are needed in all municipalities at risk, and cannot be limited to the bureaucratic process of legislation and devoid of warning and alarm systems that effectively contribute to saving lives.…”
Get full text
Article -
218
Performance Degradation Assessment of Rotary Machinery Based on a Multiscale Tsallis Permutation Entropy Method
Published 2021-01-01“…The health condition of the rotary machinery was effectively represented by the MTPEs in conditional monitoring; the initial point of the unhealthy stage was found using the 3σ interval. This was set as the alarm threshold according to the varying HI trend. …”
Get full text
Article -
219
Anomaly Detection for Aviation Safety Based on an Improved KPCA Algorithm
Published 2017-01-01“…Experiments show that the proposed approach can effectively detect the anomalies with the accuracy of 93.57% and false positive alarm rate of 1.11%.…”
Get full text
Article -
220
Enhancing the Cloud Computing Performance by Labeling the Free Node Services as Ready-To-Execute Tasks
Published 2017-01-01“…In this paper, we have implemented a new technique to retain the service and assign tasks to the best and free available node already labeled by the manager node. The Cloud Computing Alarm (CCA) technique is working to provide all information about the services node and which one is ready to receive the task from users. …”
Get full text
Article