-
81
Improved Energy Detector with Weights for Primary User Status Changes in Cognitive Radio Networks
Published 2014-03-01“…The probabilities of false alarm and detection for our ED are deduced under the new detection model. …”
Get full text
Article -
82
Association of continuous renal replacement therapy downtime with fluid balance gap and clinical outcomes: a retrospective cohort analysis utilizing EHR and machine data
Published 2024-12-01“…No association was found in the subgroups with lower alarm frequency (0–2 and 3–5 alarms). There was no statistical evidence for an association between %TTL and hospital mortality in the adjusted model with the interaction term of alarm frequency. …”
Get full text
Article -
83
Opportunistic cooperative spectrum sensing based on eigenvalue ratio of random matrix
Published 2020-02-01“…To overcome the deficiencies of low detection probability of traditional spectrum sensing,an EROC spectrum sensing algorithm based on the eigenvalue ratio of a random matrix was proposed.Based on the random detection theory,it used double thresholds and opportunistic cooperation to improve of traditional maximum and minimum eigenvalue (MME) algorithm,and it retained the advantages of the traditional energy detection algorithm.Moreover,on the premise of known false alarm probability,the decision threshold was deduced,and the odd-even slot division was used to effectively realize opportunistic cooperation in reception.Simulation results show that the proposed spectrum sensing algorithm has higher detection probability than MME algorithms in case of low signal-to-noise ratio and low false alarm probability.Therefore,it is suitable for application in wireless communications with deteriorate transmission channels.…”
Get full text
Article -
84
Design of home fire detection system based on wireless multi-sensor data fusion
Published 2017-09-01“…Aiming at the shortcomings of false alarm and leakage alarm in the existing fire detection system and the complicated wiring,high cost and poor flexibility of the traditional wired fire detection system,a set of home fire detection system based on wireless multi-sensor data fusion was designed,to detect the fire safety hazards caused by kitchen equipment aging,electrical wiring aging or electrical equipment aging.The design of multi-sensor data fusion algorithm,fire detection system hardware framework and software implementation were described in detail.The simulation results show that the scheme has the characteristics of high accuracy and flexibility.…”
Get full text
Article -
85
Simulation and application of power transmission network based on SDH
Published 2015-12-01“…The architecture of power optical transmission network simulation was proposed from the equipment layer,network layer and business layer for the target of communication support system for power grid control business,and the principle of SDH prototype simulation based on SSFNET was presented,and the design idea and implementation method of SDH device,network protection and recovery and associated alarm function was described in detail.Finally an example about the SDH communication topology of stable system in Northern Jiangsu Province was given,it realized the basic function of service bearer,fault alarm,channel recovery,route reconstruction,delay monitoring of power optical transmission network,which would provide quantitative analysis method for the communication network risk assessment,fault simulation,and the interaction effect of the power grid control system.…”
Get full text
Article -
86
Variable threshold energy detection algorithm based on trust degree
Published 2018-08-01“…Aiming at stochastic probabilistic SSDF attacks,a variable threshold energy detection algorithm based on trust degree was proposed.Firstly,the variable threshold was updated by comparing the actual fusion value with the upper and lower boundary values of the fusion center.The upper and lower boundary values were determined through the given false alarm probability andmissed probability.Secondly,a soft fusionmethod was used based on the ratio of correct perception times and the total number of times to update the trust value.Simulation results show that,compared with the traditional fixed threshold,the proposed algorithm can not only reduce the false alarm andmissed detection probability,but also improve the detection probability of the system.…”
Get full text
Article -
87
Parabrachial CGRP neurons modulate active defensive behavior under a naturalistic threat
Published 2025-01-01“…Recent studies suggest that calcitonin gene-related peptide (CGRP) neurons in the parabrachial nucleus (PBN) represent aversive information and signal a general alarm to the forebrain. If CGRP neurons serve as a true general alarm, their activation would modulate both passive nad active defensive behaviors depending on the magnitude and context of the threat. …”
Get full text
Article -
88
Research on Bogie Frame Lateral Instability of High-Speed Railway Vehicle
Published 2018-01-01“…In order to find out the reason for the bogie frame instability alarm in the high-speed railway vehicle, the influence of wheel tread profile of the unstable vehicle was investigated. …”
Get full text
Article -
89
Anomaly detection in multidimensional time series for water injection pump operations based on LSTMA-AE and mechanism constraints
Published 2025-01-01“…By utilizing LSTMA-AE, we aim to improve the accuracy of anomaly detection, while simultaneously employing mechanistic constraints to mitigate false alarm rates. Experimental results demonstrate that this approach significantly outperforms methods such as polynomial interpolation, random forest, and LSTM-AE in terms of anomaly detection accuracy on field datasets from oilfields, accompanied by a notably lower false alarm rate.…”
Get full text
Article -
90
Enterprise information system automatic fault diagnosis and analysis method based on decision tree
Published 2017-03-01“…The algorithm exploits information from system operation monitoring indicators and alarm data, based on decision tree, to automatically diagnose and analyze faults of enterprise information systems. …”
Get full text
Article -
91
Variability of Reaction Time as a Marker of Executive Function Impairments in Fibromyalgia
Published 2022-01-01“…In the entire sample, SD, sigma, and tau were inversely associated with the hit rate and positively associated with the false alarm rate. While the greater decline in hit rate after the change in task rule indicates deficient cognitive flexibility, the lack of any difference in false alarm rate suggests intact response inhibition. …”
Get full text
Article -
92
Condensed Aerosol Generators in Fire Safety of Buildings. Part 1 – Analysis of Normative and Legal Documents
Published 2024-12-01“…Introduction: Fixed firefighting systems, in addition to detection systems (fire alarm system) and alarm systems (voice evacuation systems), are one of the pillars of the safety of today's erected, increasingly complex buildings. …”
Get full text
Article -
93
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article -
94
Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks
Published 2013-09-01“…The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. Moreover, every event region can also be detected and identified. …”
Get full text
Article -
95
Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
Published 2016-04-01“…For the Sinkhole attack problem of wireless sensor network(WSN),a detection algorithm based on fusion of ant colony optimization(ACO)and P2P trust model was proposed.Firstly,ant colony optimization algorithm was used to detect the existence of a Sinkhole attack in route and generate the alarm information of sensor nodes. Then,Boolean expression evolve sign generation algorithm was used to distributed keys for group alarm nodes,and it was used to mark suspicious nodes. …”
Get full text
Article -
96
Research and applications on intelligent operations of cross-professional carrying network
Published 2022-11-01“…With the increasingly close integration of artificial intelligence technology and networks, the operation and production of networks in the future should be fully digitalized, automated and intelligent.At present, fault locating of cross-professional network mainly relies on operation and maintenance staff of each professional network to analyze and dispatch orders, resulting in long trouble clearing time and repeated orders.In order to save manual work, with the help of automation and artificial intelligent technologies, a cross-professional network intelligent operation and maintenance system was developed and applied in real network.The associated topology information of IPRAN and OTN, along with the real-time IPRAN and OTN alarm data were analyzed, the root cause alarm was located accurately, the fault location was determined, and dispatch order was achieved automatically.A automatic cross-professional fault diagnosis capability was built by the system, which reduced the fault locating time from traditional two minutes to tens of milliseconds, therefore, the manual work was reduced by more than 90%, and 95% fault types of the existing network could be covered.…”
Get full text
Article -
97
Patient's Heart Beat and Temperature Monitoring System.
Published 2023“…This work presents a system that is capable of providing real time remote monitoring of the heartbeat with the help of an alarm and SMS alert. This project aims at the design and implementation of a low cost but efficient and flexible heartbeat monitoring and alert system using GSM technology. …”
Get full text
Thesis -
98
Motorcycle Parking Security System based on Website and QR Code Technology
Published 2023-09-01“…Furthermore, to detect forced removal attempts, the system is equipped with an alarm that notifies the parking attendant. This alarm will be activated if vibrations above 20 cm/s2 are detected and will be accompanied by a buzzer sound as a danger signal. …”
Get full text
Article -
99
Forecasting GOES 15 >2 MeV Electron Fluxes From Solar Wind Data and Geomagnetic Indices
Published 2020-08-01“…Hit rates range over 56–89% with false alarm rates of 11–53%. Applied to 2012, 2013, and 2017, our best forecasts have hit rates of 56–83% and false alarm rates of 10–20%. …”
Get full text
Article -
100
Discriminative zero-watermarking algorithm based on region XOR and ternary quantization
Published 2022-02-01“…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
Get full text
Article