Showing 121 - 140 results of 773 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 121

    Network Anomaly Prediction Method Based on Big Data by Xu Cao, Ruitong Cao

    Published 2014-06-01
    “…With the development of the network technology and expansion of the network size,the probability of network anomaly is greatly increased,which makes network management face greater challenges.An important task of network management is network anomaly detection in time based on the data got by network management system (NMS); the performance of network management will be great improved if the network anomaly could be detected before it really happen.A method of network anomaly prediction based on big data was presented,the traditional process act as “first alarm,then solve”was replaced by anomaly prediction process.The result is significant for improving network availability and reliability.…”
    Get full text
    Article
  2. 122

    Analysis and Application of Security Risk Management Based on Business Process Granularity by Bin Tan

    Published 2013-11-01
    “…Security administrators and business system administrators can clearly understand the security risk situation of business systems, effectively focus and prioritize critical business systems, business processes and the security alarm; based on perceived security risk posture, security officer may plan, develop and implement safety programs, to improve operational safety risk management.…”
    Get full text
    Article
  3. 123

    Survey on application of attack graph technology by Zi-wei YE, Yuan-bo GUO, Chen-dong WANG, An-kang JU

    Published 2017-11-01
    “…Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.…”
    Get full text
    Article
  4. 124

    Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network by Yingxue Li, Jing Lei, Shiyuan Zhong, Chunming Huang, Chao Huang

    Published 2015-11-01
    “…As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.…”
    Get full text
    Article
  5. 125

    Proximity-Based Robust Event Detection in Wireless Sensor Networks by Chan-O Hong, Yoon-Hwa Choi

    Published 2014-07-01
    “…It is a hybrid scheme in the sense that it takes advantage of both neighbor-based and cluster-based schemes in distinguishing events from false alarms due to faulty nodes. It gives more weights to alarms in closer proximity, while making event decisions at the cluster heads to reduce the communication overhead. …”
    Get full text
    Article
  6. 126

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  7. 127

    Maintenance Analysis Method Based on Big Data Processing Technology in Power Telecommunication Network by Zhimin Yang, Bin Wu, Ran Shu

    Published 2015-11-01
    “…The characteristics of power communication network equipment's maintenance,alarm and asset data were analyzed,and then the data preprocessing work was done by adopting attributes reduction and clustering method.The related index and influencing factors required by the analysis of equipment repair work were proposed.Meanwhile,the data mining method which combines the techniques of MapReduce and Apriori algorithms was presented.Finally,the proposed data mining method was applied to mine the actual network data.According to the mined results,the network maintenance work was analyzed from the perspectives of maintenance distribution,maintenance effectiveness on operated service,maintenance time-cost and so forth.…”
    Get full text
    Article
  8. 128

    Forecasting Geomagnetic Storm Disturbances and Their Uncertainties Using Deep Learning by D. Conde, F. L. Castillo, C. Escobar, C. García, J. E. García, V. Sanz, B. Zaldívar, J. J. Curto, S. Marsal, J. M. Torta

    Published 2023-11-01
    “…The first step in developing an alarm system against GICs is to forecast them. This is a challenging task given the highly non‐linear dependencies of the response of the magnetosphere to these perturbations. …”
    Get full text
    Article
  9. 129

    Adaptive decentralized AI scheme for signal recognition of distributed sensor systems by Shixiong Zhang, Hao Li, Cunzheng Fan, Zhichao Zeng, Chao Xiong, Jie Wu, Zhijun Yan, Deming Liu, Qizhen Sun

    Published 2024-12-01
    “…By fine-tuning pre-trained model with the unlabeled data in each domain, the ADAI scheme can train a series of adaptive AI models for all target domains, significantly reducing the false alarm rate (FAR) and missing alarm rate (MAR) induced by domain differences. …”
    Get full text
    Article
  10. 130

    A preliminary simulator study on exploring responses of drivers to driving system reminders on four stimuli in vehicles by Zhao Zou, Fady Alnajjar, Michael Lwin, Luqman Ali, Hamad Al Jassmi, Omar Mubin, Muhammad Swavaf

    Published 2025-02-01
    “…This pilot study designed to explore which type of driving system reminders, namely Text display, Image display, alarm notification, or humanoid voice command, provokes stronger preferences and higher rates of cooperation from drivers. …”
    Get full text
    Article
  11. 131

    Sistem Monitoring Frekuensi Denyut Nadi pada Pelari Menggunakan Metode Photoplethysmographic by Asih Setiarini, Mahatma Widya Laksana, Basuki Winarno

    Published 2021-11-01
    “…Fitur buzzer digunakan sebagai alarm jika denyut jantung mencapai 170 Beat Per Minute (BPM). …”
    Get full text
    Article
  12. 132

    18th edition IET wiring regulations. by Scaddan, Brian

    Published 2019
    View in OPAC
    Book
  13. 133

    AntiGPS spoofing method for UAV based on LSTM-KF model by Yang SUN, Chunjie CAO, Junxiao LAI, Tianjiao YU

    Published 2020-10-01
    “…A detection method of anti GPS deception of UAV was proposed for the problem that GPS signal of UAV was easy to be interfered and deceived,which combined deep learning and Kalman filter.The dynamic model of UAV flight was predicted from the flight state of UAV by using long short-term memory network,and the dynamic adjustment of Kalman filter and dynamic model was used to identify GPS deception.In order to resist the interference of GPS deception signal,this method did not need to increase the hardware overhead of the receiver,and was easy to realize.The experimental results show that the method has higher accuracy and lower false alarm rate for the recognition of GPS signals,and can effectively enhance the UAV's ability to resist GPS deception interference.…”
    Get full text
    Article
  14. 134

    Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput by LI Mei-ling1, YUAN Chao-wei1, LI Lin1, YANG Rui-zhe3

    Published 2011-01-01
    “…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
    Get full text
    Article
  15. 135

    Spectrum sensing algorithm based on the eigenvalue of Wishart random matrix by Xuemei YANG, Xi HE, Jiapin XU

    Published 2017-09-01
    “…In order to improve the spectrum sensing performance and overcome the shortcomings of the classical algorithm,a new cooperative spectrum sensing algorithm based on Wishart random matrix theory was proposed.According to the logarithmic distribution characteristics of the sampled covariance matrix eigenvalues and using the ratio of maximum eigenvalue and geometric mean eigenvalue,a simple closed-form threshold expression could be obtained,and the spectrum sensing decision could be performed depend on the threshold.The simulation results show that the proposed algorithm can get better sensing performance even under the conditions of a few number of cooperative users,low signal to noise ratio and a few samples.It is less affected by false-alarm probability and the extreme values,and has better detection performance than similar algorithms.…”
    Get full text
    Article
  16. 136

    Spectrum Sensing under Correlated Antenna Array Using Generalized Detector in Cognitive Radio Systems by Modar Safir Shbat, Vyacheslav Tuzlukov

    Published 2013-01-01
    “…We derive the probability of false alarm and detection threshold under employment of the generalized detector (GD) in cognitive radio (CR) systems for two scenarios: firstly, the independent antenna array elements; the secondly, the correlated antenna array elements. …”
    Get full text
    Article
  17. 137

    Adaptive spectrum sensing algorithm based on cyclostationary spectrum energy by Hao-ye ZHANG, Zhi-hua BAO, Shi-bing ZHANG

    Published 2011-11-01
    “…Focused on the characteristic of cyclostationary spectrum of signal and the spectrum sensing in low signal-to-noise ratio,an adaptive decision threshold spectrum sensing algorithm was proposed,which combines cyclostationary spectrum sensing with energy detection.By weighting the sum of probabilities of detection and false alarm,estimating the eigenvalues of the cyclostationary spectrum,the algorithm provides an adaptive decision threshold which could differentiate the primary signal from the background noise.The simulation results show that the algorithm could perform well in low signal-to-noise ratio and remove the effect of noise uncertainty on the spectrum sensing.It outperforms maximum-minimum eigenvalue and blind detection with 4dB and 8dB respectively in signal-to-noise ratio,and has robustness to different modulated primary signal.…”
    Get full text
    Article
  18. 138

    Design of the Monitoring System for Communication Satellite Information Security Based on Spaceborne Network Probe by Mingjian WANG, Dandan FAN, Xiaoshen XU, Meng LI

    Published 2023-06-01
    “…To enhanced the information security protection capability of communication satellites and solved the information security monitoring problem of the system under the condition of limited on-board resources, based on the comparison of some typical information security protection designs, this paper summarized the characteristics and security threats of the communication satellites, analyzed the constraints on improved security protection capabilities, then proposed a sort of collecting satellite security data by using space based probe technology, built data analysis platform and integrated monitoring system based on the ground system, which could realized the system security status monitoring and security alarm on the premise of ensuring the normal operation of the satellite business and low resource occupancy.At last the actual operation of the system was analyzed and verified.…”
    Get full text
    Article
  19. 139

    Yellow Garden Spider, Writing Spider Argiope aurantia (Lucas) (Arachnida: Araneae: Araneidae) by Taryn B. Griffith, Jennifer Lynn Gillett-Kaufman

    Published 2020-05-01
    “…Although their appearance may cause alarm, the species is relatively harmless and will generally leave its web to flee rather than attack when disturbed (Enders 1973). https://edis.ifas.ufl.edu/in1273 …”
    Get full text
    Article
  20. 140

    Research on the security audit model in intrusion prevention based on write-related support vector data description by LUO Jun, PAN Zhi-song, MIAO Zhi-min, HU Gu-yu

    Published 2007-01-01
    “…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
    Get full text
    Article