Showing 221 - 240 results of 773 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 221

    Wear Prediction and Visual Decision Support of Drop Forged Rivetless Chain for Conveyors by Liu Manxian, Xu Zijia, Shen Xujia, Li Xiaodong, Zhang Zhijun, Yang Yi

    Published 2023-01-01
    “…The experiment results show that the wear life prediction model has high fitting accuracy, low false alarm rates, and low missed detection rates of wear early-warning, which can satisfy the requirements of wear life prediction. …”
    Get full text
    Article
  2. 222

    A Novel Transformer-Based Anomaly Detection Model for the Reactor Coolant Pump in Nuclear Power Plants by Guangrong Zhou, Sheng Zheng, Senquan Yang, Shuang Yi

    Published 2024-01-01
    “…However, the harsh working environment can accelerate the process of equipment deterioration for the reactor coolant pump while the current alarm mechanism cannot detect the deterioration of equipment performance at the early stage. …”
    Get full text
    Article
  3. 223

    A Real-Valued Negative Selection Algorithm Based on Grid for Anomaly Detection by Ruirui Zhang, Tao Li, Xin Xiao

    Published 2013-01-01
    “…Theory analysis and experimental results demonstrate that GB-RNSA lowers the number of detectors, time complexity, and false alarm rate.…”
    Get full text
    Article
  4. 224

    The system of control chemical and radioactive pollution of marine environment parameters in the location areas of potentially hazardous underwater objects by A.I. Vyalyshev, F.K. Tuzov, V.V. Stoyanov, A.A. Dolgov, D.V. Poltoranov

    Published 2024-07-01
    “…An emergency mode of operation of the system is provided when an excess of permissible levels of radiation and chemical contamination is detected with immediate transmission of a signal via a satellite alarm communication channel to monitoring and decision-making center.…”
    Get full text
    Article
  5. 225

    Fault Diagnosis Method for Bearing of High-Speed Train Based on Multitask Deep Learning by Jia Gu, Ming Huang

    Published 2020-01-01
    “…The model can judge whether the running train bearing temperature is in the normal range in real time and predict and alarm the abnormal bearing temperature.…”
    Get full text
    Article
  6. 226

    Les signaux des primates non humains peuvent-ils avoir une signification arbitraire comme les mots humains ? Une approche affective by Christine Sievers, Thibaud Gruber

    Published 2023-12-01
    “…In their seminal paper published in 1980, Seyfarth, Cheney and Marler demonstrated that vervet monkey alarm calls have concrete, discrete, ascribable meaning. …”
    Get full text
    Article
  7. 227

    Study and Application of Mathematical Analysis Model for Pollution Diffusion in Plain Rivers by SUN Rufei, YAO Cheng, HU Kehong, YU Chao

    Published 2024-12-01
    “…The results showed that the river reach is in the alarm state for more than 4 hours, which requires prompt external intervention. …”
    Get full text
    Article
  8. 228

    Irritable Bowel Syndrome Diagnosis: Should There Be Alertness to Cancer? by A. A. Sheptulin, N. L. Jahaya, A. V. Sedova

    Published 2019-05-01
    “…In this case, colonoscopy for suspected IBS is performed only in patients aged over 50 years old, provided a hereditary predisposition to CRC and the “alarm symptoms” are detected. It has been recently shown that CRC can proceed under the “mask” of IBS. …”
    Get full text
    Article
  9. 229

    Tension Pneumocephalus Related to Radiotherapy for Nasopharyngeal Carcinoma by Esther Jimenez-Jimenez, Sebastià Sabater Martí, M. Victoria Villas

    Published 2014-01-01
    “…The appearance of aqueous rhinorrhea and neurological symptoms must be viewed as signs of alarm.…”
    Get full text
    Article
  10. 230

    Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks by Vinod Namboodiri, Abtin Keshavarzian

    Published 2011-01-01
    “…This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. …”
    Get full text
    Article
  11. 231

    Los difusos contornos para distinguir la desobediencia a la autoridad como delito y como infracción administrativa: mandato de tipificación, libertad ambulatoria y mínima intervenc... by José Ignacio Cubero Marcos

    Published 2024-12-01
    “…It should be borne in mind that an individual can be arrested at the very moment when the typical conduct is carried out, which happened on many occasions during the state of alarm. Finally, the legislator should consider decriminalising disobedience in accordance with the principle of minimum intervention and the last resort of criminal law.…”
    Article
  12. 232

    Study on Time Factors in the Smoke Control Process of Highway Tunnel Fires by Guoping Zheng, Dapeng Xue, Yizhou Zhuang, Yusheng Zhu

    Published 2021-01-01
    “…In order to study the relevant time factors for smoke management in a highway tunnel, firstly, the logical sequence and time of the fire alarm system (FAS) startup are investigated and analyzed. …”
    Get full text
    Article
  13. 233

    STATE PREDICTION OF WIND TURBINE GENERATOR BASED ON K-CNN AND N-GRU (MT) by CHAI Tong, YUAN YiPing, MA JunYan, FAN PanPan

    Published 2023-01-01
    “…The feature extraction results after dimensionality reduction were input into N-GRU for prediction and reconstruction error was obtained, then the state evaluation was realized by setting the alarm threshold. Finally, a 2 MW wind turbine in a wind farm in Xinjiang was taken as an example to verify the model validity and model accuracy.…”
    Get full text
    Article
  14. 234

    Broadcasting with Prediction and Selective Forwarding in Vehicular Networks by Jianjun Yang, Zongming Fei

    Published 2013-12-01
    “…It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of its range or after a particular time slot. …”
    Get full text
    Article
  15. 235

    Advanced Fuzzy-Logic-Based Traffic Incident Detection Algorithm by Changhong Zhu, Zhenjun Guo, Jie Ke

    Published 2021-01-01
    “…Further, the performance of this algorithm is evaluated using commonly used criteria such as mean time to detection (MTTD), false alarm rate (FAR), and detection rate (DR). Initially, an experiment is conducted for selecting the algorithm architecture that yields the optimal detection performance. …”
    Get full text
    Article
  16. 236

    An Improved Dual-Kurtogram-Based T2 Control Chart for Condition Monitoring and Compound Fault Diagnosis of Rolling Bearings by Zhiyuan Jiao, Wei Fan, Zhenying Xu

    Published 2021-01-01
    “…The SK of Subband I and the ESK of Subband II are calculated to derive T2 statistics based on the covariance determinant. An alarm will be triggered when the T2 statistics exceed the control limit and suitable subbands for square envelope analysis are adopted to obtain the characteristic frequency. …”
    Get full text
    Article
  17. 237

    Gender differences in the recognition of emotional faces: are men less efficient? by Ana Ruiz-Ibáñez, José T. Boyano

    Published 2017-06-01
    “…The results showed statistically significant differences in face corrected recognition (hit rate - false alarm rate): the women demonstrated a better recognition than the men. …”
    Get full text
    Article
  18. 238

    A multi-band spectrum sensing method based on sticky hidden Markov model by Zhongjie JIA, Ming JIN, Xiaoqun SONG

    Published 2021-01-01
    “…Existing multi-band spectrum sensing methods often use the sparsity of broadband spectrum.However, high spectrum occupancy rate of primary users degrades their performance severely.To address this issue, a novel multi-band spectrum sensing method was proposed by exploiting the state correlation among adjacent frequency bands.Firstly, a sticky hidden Markov model (SHMM) was established by regarding the multi-band states and measured energies as hidden and observed variables.In the SHMM, a sticky factor was introduced to represent the state correlation among adjacent frequency bands.Secondly, iterative expressions for the parameters of SHMM were derived.Finally, multi-band spectrum sensing was implemented by obtaining the posterior mean of observations from every frequency bands.Simulation results show that the proposed method outperforms existing methods, and when the false alarm probability is 0.1, the average frequency band occupancy rate is 50%, and the average signal-to-noise ratio is -12 dB, the detection probability can reach close to 0.99, which is about 30% higher than the detection probability of other methods.In addition, the proposed method had a faster convergence rate than existing methods and therefore has lower computational complexity.…”
    Get full text
    Article
  19. 239

    A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments by Aneetha Avalappampatty Sivasamy, Bose Sundan

    Published 2015-01-01
    “…Performance of the model, as evaluated through validation and testing using KDD Cup’99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.…”
    Get full text
    Article
  20. 240

    Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study by Paulo Nunes, Jose Fonseca, Marco Vieira

    Published 2025-01-01
    “…In this paper, we blend SA and DA to simultaneously improve the detection and decrease the false alarms. Our approach starts with SA to identify an initial set of potential vulnerabilities. …”
    Get full text
    Article