-
121
Fault Diagnosis Method for Bearing of High-Speed Train Based on Multitask Deep Learning
Published 2020-01-01“…The model can judge whether the running train bearing temperature is in the normal range in real time and predict and alarm the abnormal bearing temperature.…”
Get full text
Article -
122
Les signaux des primates non humains peuvent-ils avoir une signification arbitraire comme les mots humains ? Une approche affective
Published 2023-12-01“…In their seminal paper published in 1980, Seyfarth, Cheney and Marler demonstrated that vervet monkey alarm calls have concrete, discrete, ascribable meaning. …”
Get full text
Article -
123
Irritable Bowel Syndrome Diagnosis: Should There Be Alertness to Cancer?
Published 2019-05-01“…In this case, colonoscopy for suspected IBS is performed only in patients aged over 50 years old, provided a hereditary predisposition to CRC and the “alarm symptoms” are detected. It has been recently shown that CRC can proceed under the “mask” of IBS. …”
Get full text
Article -
124
Tension Pneumocephalus Related to Radiotherapy for Nasopharyngeal Carcinoma
Published 2014-01-01“…The appearance of aqueous rhinorrhea and neurological symptoms must be viewed as signs of alarm.…”
Get full text
Article -
125
Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks
Published 2011-01-01“…This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. …”
Get full text
Article -
126
Study on Time Factors in the Smoke Control Process of Highway Tunnel Fires
Published 2021-01-01“…In order to study the relevant time factors for smoke management in a highway tunnel, firstly, the logical sequence and time of the fire alarm system (FAS) startup are investigated and analyzed. …”
Get full text
Article -
127
Broadcasting with Prediction and Selective Forwarding in Vehicular Networks
Published 2013-12-01“…It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of its range or after a particular time slot. …”
Get full text
Article -
128
Advanced Fuzzy-Logic-Based Traffic Incident Detection Algorithm
Published 2021-01-01“…Further, the performance of this algorithm is evaluated using commonly used criteria such as mean time to detection (MTTD), false alarm rate (FAR), and detection rate (DR). Initially, an experiment is conducted for selecting the algorithm architecture that yields the optimal detection performance. …”
Get full text
Article -
129
An Improved Dual-Kurtogram-Based T2 Control Chart for Condition Monitoring and Compound Fault Diagnosis of Rolling Bearings
Published 2021-01-01“…The SK of Subband I and the ESK of Subband II are calculated to derive T2 statistics based on the covariance determinant. An alarm will be triggered when the T2 statistics exceed the control limit and suitable subbands for square envelope analysis are adopted to obtain the characteristic frequency. …”
Get full text
Article -
130
Gender differences in the recognition of emotional faces: are men less efficient?
Published 2017-06-01“…The results showed statistically significant differences in face corrected recognition (hit rate - false alarm rate): the women demonstrated a better recognition than the men. …”
Get full text
Article -
131
A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments
Published 2015-01-01“…Performance of the model, as evaluated through validation and testing using KDD Cup’99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.…”
Get full text
Article -
132
Learning-Based Spectrum Sensing for Cognitive Radio Systems
Published 2012-01-01“…Simulation results in terms of detection and false alarm probabilities of all proposed schemes are presented. …”
Get full text
Article -
133
Design and Construction of Gas Leakage and Detection System in Homes/ Industries.
Published 2023“…When LPG concentration in the air exceeds the set threshold, the system irninedic1kly <1ler1s the user by cc1lling and sending SMS to a specified mobile number stored on the microcontroller and activates the alarm buzzer simultaneously. displaying the information on an LCD. …”
Get full text
Thesis -
134
Evolution of burnout syndrome in Spanish healthcare professionals during and after the COVID-19 pandemic: psychosocial variables involved
Published 2025-02-01“…It is a prospective study, carried out in 256 healthcare workers in Spain during three time points in relation to the COVID-19 pandemic: (1) (T1) between 5 May and 21 June 2020 (final phase of the state of alarm declared in Spain on 14 March), (2) (T2) 6 months after the end of the state of alarm (January–April 2021), and (3) (T3) 1 year after this second evaluation (April–July 2022). …”
Get full text
Article -
135
Safety Autonomous Platform for Data-Driven Risk Management Based on an On-Site AI Engine in the Electric Power Industry
Published 2025-01-01“…We practically implemented the proposed SAP architecture using the Hadoop ecosystem and verified its feasibility through a performance evaluation of the on-site AI engine and real-time operation of risk assessment and alarm notification for data-driven risk management.…”
Get full text
Article -
136
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020-01-01“…This condition is attributed to the increasing number of audit data features and the decreasing performance of human-based smart intrusion detection systems regarding classification accuracy, false alarm rate, and classification time. Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. …”
Get full text
Article -
137
Event-Based Clustering Architecture for Power Efficiency in Wireless Sensor Networks
Published 2014-05-01“…The simulations show that the proposed architecture has about an 18-fold improvement rate in the device lifetime and avoids the false positive caused by the erroneous alarm of a single sensor. The proposed architecture is feasible, practical, and highly applicable to many applications.…”
Get full text
Article -
138
Compressed Measurements Based Spectrum Sensing for Wideband Cognitive Radio Systems
Published 2015-01-01“…We also derive closed form expressions for the false alarm and detection probabilities. Numerical results show that the analytical expressions coincide with the exact probabilities obtained from simulations.…”
Get full text
Article -
139
14 NO.LU PROTOKOL ÇERÇEVESİNDE AVRUPA İNSAN HAKLARI SÖZLEŞMESİ DENETİM SİSTEMİNDE İYİLEŞTİRME ÇALIŞMALARI
Published 2007-06-01“…Ancak, bireysel başvuru sayısındaki artış hızı karşısında 1998 yılında yürürlüğe giren yeni sistem de kısa sürede alarm vermeye başlamıştır. Avrupa İnsan Hakları Mahkemesinin artan iş yüküyle baş edebilmesi için düşünülen çare 14 No.lu Protokol olmuştur. 14 No.lu Protokol mevcut sistemi esaslı bir şekilde değiştiren bir reform olmaktan ziyade, uygulamadaki aksakları gidermeye ve işlerin akışını hızlandırmaya yönelik tedbirler içermektedir. …”
Get full text
Article -
140
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Published 2024-01-01“…The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
Get full text
Article