-
141
PRIVATE SECURITY SURVEILLANCE SYSTEM
Published 2021-10-01“…There is also a Final Recovery Unit (FRU) which sends a message to the owner of the home and sounds an alarm whiles flashing lights in the event that the Area Watch Unit (AWU) is by-passed without authority. …”
Get full text
Article -
142
A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks
Published 2014-06-01“…In comparison to the existing schemes, simulation results demonstrate that the proposed secure CSS scheme improves the primary user detection rate by 10% at false alarm rate of 0.1 when the mobility pattern of the SUs is different.…”
Get full text
Article -
143
Design and Implementation of Xinjiang Astronomical Observatory Astronomical Data Transmission Visualization System
Published 2019-01-01“…Besides, the middle layer contains an alarm subsystem that can automatically send system exceptions to administrator. …”
Get full text
Article -
144
Uncertainty-Aware Sensor Deployment Strategy in Mixed Wireless Sensor Networks
Published 2013-11-01“…We consider the Gaussian white noise in the environment and present a centralized algorithm (FABGM for short) which discoveres vacancies by using detection model based on false alarm and moves the mobile nodes according to the method based on bipartite graph matching in this study. …”
Get full text
Article -
145
Edge Detection via Edge-Strength Estimation Using Fuzzy Reasoning and Optimal Threshold Selection Using Particle Swarm Optimization
Published 2014-01-01“…This threshold is selected such that the overall probability of error in identifying edge pixels, that is, the sum of the probability of misdetection and the probability of false alarm, is minimum. This minimization is achieved via particle swarm optimization (PSO). …”
Get full text
Article -
146
Robust Wiener filter‐based time gating method for detection of shallowly buried objects
Published 2021-02-01“…Abstract A robust method for ultra‐wideband (UWB) imaging of buried shallow objects based on time gating, Wiener filtering, as well as constant false alarm rate (CFAR) is proposed. Moreover, it is demonstrated that Wiener filtering can be used as a clutter removal tool in UWB signal applications. …”
Get full text
Article -
147
Multifeature Fusion Vehicle Detection Algorithm Based on Choquet Integral
Published 2014-01-01“…Our method can not only improve the detection rate but also reduce the false alarm rate, which meets the engineering requirements of Advanced Driving Assistance Systems (ADAS).…”
Get full text
Article -
148
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…Based on the behavior of grey wolf, an optimization technique GWO is implemented for intrusion detection to enhance accuracy and minimize false alarm in RNN-LSTM. Preprocess and segment network data with creating RNN-LSTM model for considering the dependence of our dataset Our approach improves the IDS performance by optimizing hyperparameters such as hidden layers, units, learning rates using GWO. …”
Get full text
Article -
149
Using a mobile application for antiretroviral therapy adherence in people living with HIV: A longitudinal pilot study
Published 2025-01-01“…The application was developed by the researchers, and uses an alarm system to record ART use. Adherence was also assessed using the ‘Cuestionario para la Evaluación de la Adhesión al Tratamiento Antiretroviral’ (CEAT-VIH) and the Multi-Method Tool questionnaire. …”
Get full text
Article -
150
Analysis of 6G and B5G waveforms using hybrid MF-ED and ECG-ED spectrum sensing techniques
Published 2025-04-01“…Additionally, characteristics including bit error rate (BER), power spectral density (PSD), probability of detection (pd), and probability of false alarm (pfa) were researched and evaluated for 500 and 1000 samples. …”
Get full text
Article -
151
Detection Performance of Polarization and Spatial Diversities for Indoor GNSS Applications
Published 2012-01-01“…Experimental results show that, for a given target detection performance in terms of the probability of false alarm and the probability of detection, the required input SNR level to meet the target detection performance can be significantly reduced utilizing the diversity system.…”
Get full text
Article -
152
Predator–prey interaction in insects and arachnids: a chemical ecology perspective
Published 2024-09-01“…Predator–prey interaction has sequential stages starting with initial detection, attack by the predator or either evasion or counterattack by the prey, capture by the predator or escape by the prey, and ingestion by the predator or alarm by the prey. At each stage of the predator–prey interaction sequence, stage-specific semiochemicals may be released by both the predator and the prey. …”
Get full text
Article -
153
Multiantenna Spectrum Sensing in the Presence of Multiple Primary Users over Fading and Nonfading Channels
Published 2015-01-01“…The basis of this paper is Wei and Tirkkonen, 2012, in which expressions for the key performance metrics of the sphericity test applied to the multiantenna cooperative spectrum sensing of multiple primary transmitters in cognitive radio networks over nonfading channels are provided. The false alarm and the detection probabilities were derived in Wei and Tirkkonen, 2012, based on approximations obtained by matching the moments of the test statistics to the Beta distribution. …”
Get full text
Article -
154
Forest Fire Detection Using Wireless Sensors and Networks
Published 2022-09-01“…In this work, all nodes only use temperature sensors and they are programmed on a certain threshold temperature, above it the node will send an alarm message to the sink. This concept relies solely on the node behavior to alert of crises possibility using simple node components to provide detection and information on whether this is a peaceful fire, or the beginning of wild fire. …”
Get full text
Article -
155
Incoherent Integration Detection Method of Airborne Phased Array Radar in a Multipath Environment
Published 2021-01-01“…Considering these two characteristics, this paper first proposes a target pairing algorithm for matching the DP range and multipath range of the same target in signal detection, and then, combined with the cell-averaging constant false alarm rate (CA-CFAR) detection model, an incoherent integration detection method for airborne PAR in the multipath environment is proposed. …”
Get full text
Article -
156
Multivariate Statistics and Supervised Learning for Predictive Detection of Unintentional Islanding in Grid-Tied Solar PV Systems
Published 2016-01-01“…For reducing the false alarm rate of anomaly detection, Kullback-Leibler (K-L) divergence was applied on the principal component projections which concluded that Q statistic based approach alone is not reliable for detection of the symptoms liable to cause unintentional islanding. …”
Get full text
Article -
157
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01“…The proposed AccFIT-IDS achieves 99.86% accuracy, with precision, recall and F1-score of 99.81%, 99.92% and 99.86%, respectively, and a false alarm rate of 0.0021, demonstrating its effectiveness.…”
Get full text
Article -
158
Digital Twin-Based Modeling of Complex Systems for Smart Aging
Published 2022-01-01“…The fall detection results based on the digital twin selected thresholds are significantly better than the experimental results of the manually set threshold method; the thresholds set by the digital twin can more accurately identify daily behaviors, especially the more violent daily behaviors such as lying down, and the accurate alarm rate of the falling behavior reaches 92.5%. …”
Get full text
Article -
159
An Intelligent FPGA Based Anti-Sweating System for Bed Sore Prevention in a Clinical Environment
Published 2011-01-01“…Based on the temperature change, the FPGA chip select the - mode (heater/cooler) and speed of the fan module. Furthermore, an alarm module was implemented to alert the nurse to reposition the patient only if patient’s skin to bed surface temperature exceeds a predefined threshold thereby saving human resources. …”
Get full text
Article -
160
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01“…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
Get full text
Article