Showing 141 - 160 results of 773 for search '"The Alarm"', query time: 0.06s Refine Results
  1. 141

    Yellow Garden Spider, Writing Spider Argiope aurantia (Lucas) (Arachnida: Araneae: Araneidae) by Taryn B. Griffith, Jennifer Lynn Gillett-Kaufman

    Published 2020-05-01
    “…Although their appearance may cause alarm, the species is relatively harmless and will generally leave its web to flee rather than attack when disturbed (Enders 1973). https://edis.ifas.ufl.edu/in1273 …”
    Get full text
    Article
  2. 142

    Online Quality Detection System for Gear based on Machine Vision by Xiaojin Wu, Wencheng Wang

    Published 2019-04-01
    “…Finally, the outputted signals of NG and OK are transmitted to the single chip computer to realize the sound-light alarm and sorting. Experiments show that the method has high accuracy and efficiency, and can meet the needs of actual production. …”
    Get full text
    Article
  3. 143

    Homogeneity and heterogeneity in lexical stress placement among Ugandan speakers of English as an L2: a view from usage-based perspective by Adokorach Monica, Isingoma Bebwa

    Published 2023-10-01
    “…For example, differences from RP were (almost) homogenously observed in the words effect, cassava, agreement, arrest, alarm, with stress placed on the first syllable of all these nouns, while inter-speaker variability was substantially observed in words such as bursar, further, with some speakers placing stress on both syllables of the words, while others had the stress on the first syllable only. …”
    Get full text
    Article
  4. 144

    WmFall: WiFi-based multistage fall detection with channel state information by Xu Yang, Fangyuan Xiong, Yuan Shao, Qiang Niu

    Published 2018-10-01
    “…Finally, the fall detection system is evaluated in a laboratory, which has 89% detection precision with false alarm rate of 8% on the average.…”
    Get full text
    Article
  5. 145

    A new cooperation spectrum sensing algorithm based on energy detection by Caimei FU, Youming LI, Guili ZHOU, Mingchen YU, Jingwen TONG, Xupeng WANG

    Published 2016-09-01
    “…To improve the reliability of spectrum sensing in cognitive radio system,a new cooperation spectrum sensing algorithm was proposed.In this algorithm,the property of the low probability between adjacent frames of the states change was used and then the decision was made by combing the energy value of the current sensing frame with that of the neighboring frame.Therefore,the proposed algorithm could decrease the miss detection probability in case of the instantaneous signal energy dropping when primary user used the licensed spectrum.Furthermore,theoretical expressions for detection probability and false alarm probability were derived.Finally,theoretical analysis and simulation results verify that the detection performance of the proposed algorithm is better than that of cooperative spectrum sensing which is based on the classical energy detection.…”
    Get full text
    Article
  6. 146

    Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests by Gökhan Koç, Korkut Yegin

    Published 2013-10-01
    “…Results from 92 different test configurations were analyzed in terms of detection and classification. Hit and false alarm rates of classification algorithm were formed, and detection ranges were determined based on these results. …”
    Get full text
    Article
  7. 147

    FMCW radar range estimation algorithm based on fast iterative interpolation by Yongchang DUAN, Xin LI, Yaohui HUANG, Ping HUANG

    Published 2019-09-01
    “…For the multi-target detection,a multi-objective range estimation algorithm was proposed based on iterative interpolation to solve the problem of the range accuracy of frequency modulation continuous wave (FMCW) radar being easy to be interfered by spectrum.Firstly,the number of targets and the rough location of the target were obtained through the fast Fourier transform (FFT) and the constant false alarm (CFAR) detection algorithm.Then spectrum was iteratively interpolate,and the inter-spectral interference was eliminated during each iteration to obtain more accurate distance.Simulation results show that the proposed algorithm has higher estimation accuracy in multi-target environment and low Signal-to-noise ratio(SNR).The proposed algorithm is implemented by DSP,which proved that the algorithm meets the real-time requirements and is easy to be implemented in engineering.…”
    Get full text
    Article
  8. 148

    A Simple Repairable System with Warning Device by Xiao Zhang, Lina Guo

    Published 2015-01-01
    “…This paper considers a simple repairable system with a warning device which can signal an alarm when the system is not in good condition and a repairman who can have delayed-multiple vacations. …”
    Get full text
    Article
  9. 149

    DESIGN AND RESEARCH OF INTELLIGENT CONTROL SYSTEM FOR BELT CONVEYOR by WANG JiDong, SUN JianYan, HU MeiLing

    Published 2019-01-01
    “…The intelligent control of belt conveyor is realized by issuing control commands to the system equipment through the interface of the upper computer and displaying the operation status and fault alarm information of each equipment intuitively and dynamically. …”
    Get full text
    Article
  10. 150

    Idiopathic Orofacial Granulomatosis with Varied Clinical Presentation by Rathy Ravindran, Anila Karunakaran

    Published 2013-01-01
    “…The clinical features are highly variable and sometimes so insidious that signs and symptoms are not frequently severe to cause alarm. The lips are most commonly involved with persistent/recurrent swelling. …”
    Get full text
    Article
  11. 151

    Attack path prediction method based on causal knowledge net by Shuo WANG, Guang-ming TANG, Guang KOU, Hai-tao SONG

    Published 2016-10-01
    “…The existing attack path prediction methods can not accurately reflect the variation of the following attack path caused by the capability of the attacker.Accordingly an attack path prediction method based on causal knowledge net was presented.The proposed method detected the current attack actions by mapping the alarm sets to the causal knowledge net.By analyzing the attack actions,the capability grade of the attacker was inferred,according to which adjust the probability knowledge distribution dynamically.With the improved Dijkstra algorithm,the most possible attack path was computed.The experiments results indicate that the proposed method is suitable for a real network confrontation environment.Besides,the method can enhance the accuracy of attack path prediction.…”
    Get full text
    Article
  12. 152

    Chemical profiles of venom glands in queens, foundresses, pre-wintering gynes, and workers in the hornet Vespa velutina nigrithorax by Berville, Laurence, Lucas, Christophe, Haouzi, Mélissa, Khalil, Ali, Gévar, Jérémy, Bagnères, Anne-Geneviève, Darrouzet, Eric

    Published 2023-04-01
    “…Here, we focused on the venom gland, which produces the alarm pheromone. In previous studies, individuals showed marked diversity in their chemical profiles. …”
    Get full text
    Article
  13. 153

    Gambaran Klinis dan Endoskopi Saluran Cerna Bagian Atas Pasien Dispepsia di Bagian RSUP Dr. M. Djamil Padang by Citra Yuriana Putri, Arnelis ., Asterina .

    Published 2016-08-01
    “…The objective of this study was to determined the frequency of dyspepsia’s complaints, the degree of dyspepsia’s complaints, the incident of alarm sign based on gender, the frequency of  risk factors of dyspepsia, endoscopic diagnosis and the location of upper-gastrointestinal’s lesions in patient with dyspepsia. …”
    Get full text
    Article
  14. 154

    Deteksi Objek menggunakan Dashboard Camera untuk Sistem Peringatan Pencegah Kecelakaan pada Mobil by Raymond Sutjiadi, Timothy John Pattiasina

    Published 2020-02-01
    “…From the testing result, this application was able to detect vehicle objects in form of passenger car, bus, and truck, also could provide both visual and alarm warning when there was a vehicle come closely from in front, to warn the driver about the danger of collision. …”
    Get full text
    Article
  15. 155

    Nurses’ Perspectives and Experiences of Using a Bed-Exit Information System in an Acute Hospital Setting: Mixed Methods Study by Stefan Walzer, Isabel Schön, Johanna Pfeil, Sam Klemm, Sven Ziegler, Claudia Schmoor, Christophe Kunze

    Published 2025-02-01
    “…Negative experiences included information overload and alarm fatigue, leading to occasional removal of the system. …”
    Get full text
    Article
  16. 156

    Systematic Approach toward the Clinical Diagnosis of Functional Dyspepsia by Pierre Paré

    Published 1999-01-01
    “…The steps are as follows: determine the duration and the course of the disease; characterize the current syndrome and review the alarm symptoms; elicit the patient-perceived dominant symptom and/or condition; and identify the patient’s reason for consulting and address the psychosocial factors. …”
    Get full text
    Article
  17. 157

    How to Develop Parent-child Family Rehabilitation for Deaf Babies by Guihua LIANG

    Published 2015-08-01
    “…The sensitivity, confidence and alarm points of the parents to children were increased. …”
    Get full text
    Article
  18. 158

    Soft threshold wideband spectrum sensing algorithm based on enhanced gradient operator by GONG Kexian, FANG Jiale, LIU Honghua, SUN Peng, WANG Wei

    Published 2024-05-01
    “…Theoretical analysis and simulation results show that the detection probability and false alarm probability of the proposed algorithm are significantly improved and less complex than MPSG algorithm in Gaussian channel and Rayleigh fading channel. …”
    Get full text
    Article
  19. 159

    Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks by Meenakshi Panda, P. M. Khilar

    Published 2014-01-01
    “…The performance is evaluated in terms of detection accuracy, false alarm rate, detection latency and message complexity.…”
    Get full text
    Article
  20. 160

    Anomaly detection algorithm based on fractal characteristics of large-scale network traffic by XU Xiao-dong1, ZHU Shi-rui2, SUN Ya-min1

    Published 2009-01-01
    “…Based on the fractal structure of the large-scale network traffic aggregation, anomalies were analyzed qualitatively and quantitatively from perspective of the global and local scaling exponents.Multi-fractal singular spectrum and Lipschitz regularity distribution were used to analyze the fractal parameters of abnormal flow, trying to identify the relationship between the changes of these parameters and the emergence of anomalies.Experimental results show that the emergence of anomalies has obvious signs on the singular spectrum and Lipschitz regularity distribution.Using this feature, a new multi-fractal-based anomaly detection algorithm and a new detection framework were constructed.On the DARPA/Lincoln laboratory intrusion detection evaluation data set 1999, this algorithm’s detection rate is high at low false alarm rate, which is better than EMERALD.…”
    Get full text
    Article