Showing 241 - 260 results of 773 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 241

    Learning-Based Spectrum Sensing for Cognitive Radio Systems by Yasmin Hassan, Mohamed El-Tarhuni, Khaled Assaleh

    Published 2012-01-01
    “…Simulation results in terms of detection and false alarm probabilities of all proposed schemes are presented. …”
    Get full text
    Article
  2. 242

    Design and Construction of Gas Leakage and Detection System in Homes/ Industries. by Waiswa, Hashimu

    Published 2023
    “…When LPG concentration in the air exceeds the set threshold, the system irninedic1kly <1ler1s the user by cc1lling and sending SMS to a specified mobile number stored on the microcontroller and activates the alarm buzzer simultaneously. displaying the information on an LCD. …”
    Get full text
    Thesis
  3. 243

    Evolution of burnout syndrome in Spanish healthcare professionals during and after the COVID-19 pandemic: psychosocial variables involved by Fernanda Gil-Almagro, Fernanda Gil-Almagro, Fernanda Gil-Almagro, F. Javier Carmona-Monge, Fernando J. García-Hedrera, Cecilia Peñacoba-Puente

    Published 2025-02-01
    “…It is a prospective study, carried out in 256 healthcare workers in Spain during three time points in relation to the COVID-19 pandemic: (1) (T1) between 5 May and 21 June 2020 (final phase of the state of alarm declared in Spain on 14 March), (2) (T2) 6 months after the end of the state of alarm (January–April 2021), and (3) (T3) 1 year after this second evaluation (April–July 2022). …”
    Get full text
    Article
  4. 244

    Safety Autonomous Platform for Data-Driven Risk Management Based on an On-Site AI Engine in the Electric Power Industry by Dongyeop Lee, Daesik Lim, Joonwon Lee

    Published 2025-01-01
    “…We practically implemented the proposed SAP architecture using the Hadoop ecosystem and verified its feasibility through a performance evaluation of the on-site AI engine and real-time operation of risk assessment and alarm notification for data-driven risk management.…”
    Get full text
    Article
  5. 245

    Research and Implementation of SDK Simulation Platform for Chip Drivers by LI Wenyi, XU Zhisheng

    Published 2024-12-01
    “…The multi-threading of configuration, alarm and performance is developed to simulate the multi-task polling and network management reporting in the actual single-disk application. …”
    Get full text
    Article
  6. 246

    An intelligent manufacturing system based on a recursive control structure by Bingyan Teng

    Published 2025-01-01
    “…Meanwhile, a negative selection algorithm is used to construct an antibody training system that considers perturbation problems.ResultThe results indicate that immune sensing nodes can effectively monitor manufacturing systems, reducing false alarm rates by over 4%. In the scheduling experiment, the completion time and equipment load improvement rate demonstrated by the research model were 3.29% and 12.38%, respectively. …”
    Get full text
    Article
  7. 247

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Mohammad Aljanabi, Mohd Arfian Ismail, Vitaly Mezhuyev

    Published 2020-01-01
    “…This condition is attributed to the increasing number of audit data features and the decreasing performance of human-based smart intrusion detection systems regarding classification accuracy, false alarm rate, and classification time. Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. …”
    Get full text
    Article
  8. 248

    Current trends of Carbapenemase Production Amongst Multi-drug Resistant Gram-Negative Bacteria in a Tertiary-Care Hospital in West Bengal by Arunima Chakravarty, Raja Ray, Ananda S. Mondal, Hirak J. Raj

    Published 2025-01-01
    “…Conclusions: The high prevalence of Carbapenemase producing bacteria in intensive care zones is a cause of alarm. Early detection of resistance, stringent infection prevention and control measures and antimicrobial stewardship are essential to preserve the usefulness of Carbapenems and improve therapeutic outcomes in patients. …”
    Get full text
    Article
  9. 249

    Event-Based Clustering Architecture for Power Efficiency in Wireless Sensor Networks by Kai-Ting Yang, Wei Kuang Lai, Shu-Min Li, Yuh-Chung Lin

    Published 2014-05-01
    “…The simulations show that the proposed architecture has about an 18-fold improvement rate in the device lifetime and avoids the false positive caused by the erroneous alarm of a single sensor. The proposed architecture is feasible, practical, and highly applicable to many applications.…”
    Get full text
    Article
  10. 250

    Compressed Measurements Based Spectrum Sensing for Wideband Cognitive Radio Systems by Taha A. Khalaf, Mohammed Y. Abdelsadek, Mohammed Farrag

    Published 2015-01-01
    “…We also derive closed form expressions for the false alarm and detection probabilities. Numerical results show that the analytical expressions coincide with the exact probabilities obtained from simulations.…”
    Get full text
    Article
  11. 251

    14 NO.LU PROTOKOL ÇERÇEVESİNDE AVRUPA İNSAN HAKLARI SÖZLEŞMESİ DENETİM SİSTEMİNDE İYİLEŞTİRME ÇALIŞMALARI by Mehmet Emin Çağıran

    Published 2007-06-01
    “…Ancak, bireysel başvuru sayısındaki artış hızı karşısında 1998 yılında yürürlüğe giren yeni sistem de kısa sürede alarm vermeye başlamıştır. Avrupa İnsan Hakları Mahkemesinin artan iş yüküyle baş edebilmesi için düşünülen çare 14 No.lu Protokol olmuştur. 14 No.lu Protokol mevcut sistemi esaslı bir şekilde değiştiren bir reform olmaktan ziyade, uygulamadaki aksakları gidermeye ve işlerin akışını hızlandırmaya yönelik tedbirler içermektedir. …”
    Get full text
    Article
  12. 252

    Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review by Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta

    Published 2024-01-01
    “…The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
    Get full text
    Article
  13. 253

    PRIVATE SECURITY SURVEILLANCE SYSTEM by BENJAMIN KOMMEY, SETH KOTEY, ERIC TUTU, DANIEL OPOKU

    Published 2021-10-01
    “…There is also a Final Recovery Unit (FRU) which sends a message to the owner of the home and sounds an alarm whiles flashing lights in the event that the Area Watch Unit (AWU) is by-passed without authority. …”
    Get full text
    Article
  14. 254

    A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks by Jun Du, Daoxing Guo, Bangning Zhang, Ligang Shang

    Published 2014-06-01
    “…In comparison to the existing schemes, simulation results demonstrate that the proposed secure CSS scheme improves the primary user detection rate by 10% at false alarm rate of 0.1 when the mobility pattern of the SUs is different.…”
    Get full text
    Article
  15. 255

    Commentary on “Social protection and the International Monetary Fund: promise versus performance” by Alexander Kentikelenis and Thomas Stubbs by James Pfeiffer

    Published 2025-01-01
    “…Abstract Background The Covid pandemic and its aftermath have triggered new alarm and social unrest across the Global South over the deepening international debt crisis that now threatens to derail Universal Health Coverage (UHC), other Sustainable Development Goals (SDGs), future pandemic preparedness, and global warming mitigation. …”
    Get full text
    Article
  16. 256

    Risk-taking propensity and its influence on lexical decision performance: a comparative study of high- and low-risk groups by Sangyub Kim, Joonwoo Kim, Solbin Lee, Kichun Nam

    Published 2025-01-01
    “…Following the classification of participants into high- and low-risk-taking propensity groups using the Balloon Analogue Risk Task, we assessed lexical decision-making with behavioral responses (RTs, ACC), signal detection measures (hit, false alarm, miss, correct rejection) and qualitative processing using lexical variable effects (number of syllables, first syllable frequency, stem frequency, word frequency) between the groups. …”
    Get full text
    Article
  17. 257

    Current predation risk has opposing effects on social learning of foraging locations across two guppy populations by Mélanie F. Guigueno, Adrian C. K. Foster, Simon M. Reader

    Published 2025-01-01
    “…We manipulated perceived predation risk using alarm cue (conspecific skin extract). Stress responses and social learning differed between the two populations. …”
    Get full text
    Article
  18. 258

    Design and Implementation of Xinjiang Astronomical Observatory Astronomical Data Transmission Visualization System by Xinchen Ye, Hailong Zhang, Yan Zhu, Jie Wang, Tohtonur Ergesh, Huijuan Li

    Published 2019-01-01
    “…Besides, the middle layer contains an alarm subsystem that can automatically send system exceptions to administrator. …”
    Get full text
    Article
  19. 259

    Mass spectroscopy reveals compositional differences in copepodamides from limnic and marine copepods by Sina Arnoldt, Milad Pourdanandeh, Ingvar Spikkeland, Mats X. Andersson, Erik Selander

    Published 2024-02-01
    “…The presence of copepodamides in limnic copepods also warrants studies into their potential function as predator alarm cues in freshwater systems.…”
    Get full text
    Article
  20. 260

    Uncertainty-Aware Sensor Deployment Strategy in Mixed Wireless Sensor Networks by Yan Chang, Shukui Zhang, Yang Zhang, Jianxi Fan, Jin Wang

    Published 2013-11-01
    “…We consider the Gaussian white noise in the environment and present a centralized algorithm (FABGM for short) which discoveres vacancies by using detection model based on false alarm and moves the mobile nodes according to the method based on bipartite graph matching in this study. …”
    Get full text
    Article