Showing 81 - 100 results of 773 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 81

    Improved Energy Detector with Weights for Primary User Status Changes in Cognitive Radio Networks by Xianzhong Xie, Xiaofeng Hu, Bin Ma, Ting Song

    Published 2014-03-01
    “…The probabilities of false alarm and detection for our ED are deduced under the new detection model. …”
    Get full text
    Article
  2. 82

    Association of continuous renal replacement therapy downtime with fluid balance gap and clinical outcomes: a retrospective cohort analysis utilizing EHR and machine data by Chloe Braun, Tomonori Takeuchi, Josh Lambert, Lucas Liu, Sarah Roberts, Stuart Carter, William Beaubien-Souligny, Ashita Tolwani, Javier A. Neyra

    Published 2024-12-01
    “…No association was found in the subgroups with lower alarm frequency (0–2 and 3–5 alarms). There was no statistical evidence for an association between %TTL and hospital mortality in the adjusted model with the interaction term of alarm frequency. …”
    Get full text
    Article
  3. 83

    Opportunistic cooperative spectrum sensing based on eigenvalue ratio of random matrix by Wuji ZHANG, Shunlan LIU, Jianrong BAO

    Published 2020-02-01
    “…To overcome the deficiencies of low detection probability of traditional spectrum sensing,an EROC spectrum sensing algorithm based on the eigenvalue ratio of a random matrix was proposed.Based on the random detection theory,it used double thresholds and opportunistic cooperation to improve of traditional maximum and minimum eigenvalue (MME) algorithm,and it retained the advantages of the traditional energy detection algorithm.Moreover,on the premise of known false alarm probability,the decision threshold was deduced,and the odd-even slot division was used to effectively realize opportunistic cooperation in reception.Simulation results show that the proposed spectrum sensing algorithm has higher detection probability than MME algorithms in case of low signal-to-noise ratio and low false alarm probability.Therefore,it is suitable for application in wireless communications with deteriorate transmission channels.…”
    Get full text
    Article
  4. 84

    Design of home fire detection system based on wireless multi-sensor data fusion by Wenbin CHENG, Lei DU, Yiyi LIU

    Published 2017-09-01
    “…Aiming at the shortcomings of false alarm and leakage alarm in the existing fire detection system and the complicated wiring,high cost and poor flexibility of the traditional wired fire detection system,a set of home fire detection system based on wireless multi-sensor data fusion was designed,to detect the fire safety hazards caused by kitchen equipment aging,electrical wiring aging or electrical equipment aging.The design of multi-sensor data fusion algorithm,fire detection system hardware framework and software implementation were described in detail.The simulation results show that the scheme has the characteristics of high accuracy and flexibility.…”
    Get full text
    Article
  5. 85

    Simulation and application of power transmission network based on SDH by Yunfei GUO, Xiande BU, Shidong LIU, Yao WANG, Wenjie YU

    Published 2015-12-01
    “…The architecture of power optical transmission network simulation was proposed from the equipment layer,network layer and business layer for the target of communication support system for power grid control business,and the principle of SDH prototype simulation based on SSFNET was presented,and the design idea and implementation method of SDH device,network protection and recovery and associated alarm function was described in detail.Finally an example about the SDH communication topology of stable system in Northern Jiangsu Province was given,it realized the basic function of service bearer,fault alarm,channel recovery,route reconstruction,delay monitoring of power optical transmission network,which would provide quantitative analysis method for the communication network risk assessment,fault simulation,and the interaction effect of the power grid control system.…”
    Get full text
    Article
  6. 86

    Variable threshold energy detection algorithm based on trust degree by Jie XIAO, Yuebin CHEN, Chutian CHEN, Ting ZHENG, Jiwu QIAN

    Published 2018-08-01
    “…Aiming at stochastic probabilistic SSDF attacks,a variable threshold energy detection algorithm based on trust degree was proposed.Firstly,the variable threshold was updated by comparing the actual fusion value with the upper and lower boundary values of the fusion center.The upper and lower boundary values were determined through the given false alarm probability andmissed probability.Secondly,a soft fusionmethod was used based on the ratio of correct perception times and the total number of times to update the trust value.Simulation results show that,compared with the traditional fixed threshold,the proposed algorithm can not only reduce the false alarm andmissed detection probability,but also improve the detection probability of the system.…”
    Get full text
    Article
  7. 87

    Parabrachial CGRP neurons modulate active defensive behavior under a naturalistic threat by Gyeong Hee Pyeon, Hyewon Cho, Byung Min Chung, June-Seek Choi, Yong Sang Jo

    Published 2025-01-01
    “…Recent studies suggest that calcitonin gene-related peptide (CGRP) neurons in the parabrachial nucleus (PBN) represent aversive information and signal a general alarm to the forebrain. If CGRP neurons serve as a true general alarm, their activation would modulate both passive nad active defensive behaviors depending on the magnitude and context of the threat. …”
    Get full text
    Article
  8. 88

    Research on Bogie Frame Lateral Instability of High-Speed Railway Vehicle by Chen Wang, Shihui Luo, Ziqiang Xu, Chang Gao, Weihua Ma

    Published 2018-01-01
    “…In order to find out the reason for the bogie frame instability alarm in the high-speed railway vehicle, the influence of wheel tread profile of the unstable vehicle was investigated. …”
    Get full text
    Article
  9. 89

    Anomaly detection in multidimensional time series for water injection pump operations based on LSTMA-AE and mechanism constraints by Mei Wang, Xinyuan Zhu, Guangyue Zhou, Kewen Li, Qingshan Wu, Wankai Fan

    Published 2025-01-01
    “…By utilizing LSTMA-AE, we aim to improve the accuracy of anomaly detection, while simultaneously employing mechanistic constraints to mitigate false alarm rates. Experimental results demonstrate that this approach significantly outperforms methods such as polynomial interpolation, random forest, and LSTM-AE in terms of anomaly detection accuracy on field datasets from oilfields, accompanied by a notably lower false alarm rate.…”
    Get full text
    Article
  10. 90

    Enterprise information system automatic fault diagnosis and analysis method based on decision tree by Xin JIN, Longchuan YAN, Jun LIU, Shulin ZHANG

    Published 2017-03-01
    “…The algorithm exploits information from system operation monitoring indicators and alarm data, based on decision tree, to automatically diagnose and analyze faults of enterprise information systems. …”
    Get full text
    Article
  11. 91

    Variability of Reaction Time as a Marker of Executive Function Impairments in Fibromyalgia by Stefan Duschek, Cristina Muñoz Ladrón de Guevara, María José Fernández Serrano, Casandra I. Montoro, Santiago Pelegrina López, Gustavo A. Reyes del Paso

    Published 2022-01-01
    “…In the entire sample, SD, sigma, and tau were inversely associated with the hit rate and positively associated with the false alarm rate. While the greater decline in hit rate after the change in task rule indicates deficient cognitive flexibility, the lack of any difference in false alarm rate suggests intact response inhibition. …”
    Get full text
    Article
  12. 92

    Condensed Aerosol Generators in Fire Safety of Buildings. Part 1 – Analysis of Normative and Legal Documents by Robart Śliwiński

    Published 2024-12-01
    “…Introduction: Fixed firefighting systems, in addition to detection systems (fire alarm system) and alarm systems (voice evacuation systems), are one of the pillars of the safety of today's erected, increasingly complex buildings. …”
    Get full text
    Article
  13. 93

    Detection of sybil attacks based on periodic ultra wide band distance information in WSN by Yanzhi ZHANG, Xiaoqin YE

    Published 2016-08-01
    “…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
    Get full text
    Article
  14. 94

    Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks by Dyi-Rong Duh, Ssu-Pei Li, Victor W. Cheng

    Published 2013-09-01
    “…The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. Moreover, every event region can also be detected and identified. …”
    Get full text
    Article
  15. 95

    Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN by Wumaier HENIGULI

    Published 2016-04-01
    “…For the Sinkhole attack problem of wireless sensor network(WSN),a detection algorithm based on fusion of ant colony optimization(ACO)and P2P trust model was proposed.Firstly,ant colony optimization algorithm was used to detect the existence of a Sinkhole attack in route and generate the alarm information of sensor nodes. Then,Boolean expression evolve sign generation algorithm was used to distributed keys for group alarm nodes,and it was used to mark suspicious nodes. …”
    Get full text
    Article
  16. 96

    Research and applications on intelligent operations of cross-professional carrying network by Sai HAN, Dongyue ZHANG, Zelin WANG, Guangquan WANG, Ao LI, Qiukeng FANG, Hongbing MA

    Published 2022-11-01
    “…With the increasingly close integration of artificial intelligence technology and networks, the operation and production of networks in the future should be fully digitalized, automated and intelligent.At present, fault locating of cross-professional network mainly relies on operation and maintenance staff of each professional network to analyze and dispatch orders, resulting in long trouble clearing time and repeated orders.In order to save manual work, with the help of automation and artificial intelligent technologies, a cross-professional network intelligent operation and maintenance system was developed and applied in real network.The associated topology information of IPRAN and OTN, along with the real-time IPRAN and OTN alarm data were analyzed, the root cause alarm was located accurately, the fault location was determined, and dispatch order was achieved automatically.A automatic cross-professional fault diagnosis capability was built by the system, which reduced the fault locating time from traditional two minutes to tens of milliseconds, therefore, the manual work was reduced by more than 90%, and 95% fault types of the existing network could be covered.…”
    Get full text
    Article
  17. 97

    Patient's Heart Beat and Temperature Monitoring System. by Mbabazi Caleb

    Published 2023
    “…This work presents a system that is capable of providing real time remote monitoring of the heartbeat with the help of an alarm and SMS alert. This project aims at the design and implementation of a low cost but efficient and flexible heartbeat monitoring and alert system using GSM technology. …”
    Get full text
    Thesis
  18. 98

    Motorcycle Parking Security System based on Website and QR Code Technology by Riva Andra Yuni, Werman Kasoep, Desta Yolanda

    Published 2023-09-01
    “…Furthermore, to detect forced removal attempts, the system is equipped with an alarm that notifies the parking attendant. This alarm will be activated if vibrations above 20 cm/s2 are detected and will be accompanied by a buzzer sound as a danger signal. …”
    Get full text
    Article
  19. 99

    Forecasting GOES 15 >2 MeV Electron Fluxes From Solar Wind Data and Geomagnetic Indices by C. Forsyth, C. E. J. Watt, M. K. Mooney, I. J. Rae, S. D. Walton, R. B. Horne

    Published 2020-08-01
    “…Hit rates range over 56–89% with false alarm rates of 11–53%. Applied to 2012, 2013, and 2017, our best forecasts have hit rates of 56–83% and false alarm rates of 10–20%. …”
    Get full text
    Article
  20. 100

    Discriminative zero-watermarking algorithm based on region XOR and ternary quantization by Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG

    Published 2022-02-01
    “…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
    Get full text
    Article