Showing 141 - 160 results of 543 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 141

    PRIVATE SECURITY SURVEILLANCE SYSTEM by BENJAMIN KOMMEY, SETH KOTEY, ERIC TUTU, DANIEL OPOKU

    Published 2021-10-01
    “…There is also a Final Recovery Unit (FRU) which sends a message to the owner of the home and sounds an alarm whiles flashing lights in the event that the Area Watch Unit (AWU) is by-passed without authority. …”
    Get full text
    Article
  2. 142

    A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks by Jun Du, Daoxing Guo, Bangning Zhang, Ligang Shang

    Published 2014-06-01
    “…In comparison to the existing schemes, simulation results demonstrate that the proposed secure CSS scheme improves the primary user detection rate by 10% at false alarm rate of 0.1 when the mobility pattern of the SUs is different.…”
    Get full text
    Article
  3. 143

    Design and Implementation of Xinjiang Astronomical Observatory Astronomical Data Transmission Visualization System by Xinchen Ye, Hailong Zhang, Yan Zhu, Jie Wang, Tohtonur Ergesh, Huijuan Li

    Published 2019-01-01
    “…Besides, the middle layer contains an alarm subsystem that can automatically send system exceptions to administrator. …”
    Get full text
    Article
  4. 144

    Uncertainty-Aware Sensor Deployment Strategy in Mixed Wireless Sensor Networks by Yan Chang, Shukui Zhang, Yang Zhang, Jianxi Fan, Jin Wang

    Published 2013-11-01
    “…We consider the Gaussian white noise in the environment and present a centralized algorithm (FABGM for short) which discoveres vacancies by using detection model based on false alarm and moves the mobile nodes according to the method based on bipartite graph matching in this study. …”
    Get full text
    Article
  5. 145

    Edge Detection via Edge-Strength Estimation Using Fuzzy Reasoning and Optimal Threshold Selection Using Particle Swarm Optimization by Ajay Khunteta, D. Ghosh

    Published 2014-01-01
    “…This threshold is selected such that the overall probability of error in identifying edge pixels, that is, the sum of the probability of misdetection and the probability of false alarm, is minimum. This minimization is achieved via particle swarm optimization (PSO). …”
    Get full text
    Article
  6. 146

    Robust Wiener filter‐based time gating method for detection of shallowly buried objects by Ali Gharamohammadi, Fereidoon Behnia, Arash Shokouhmand, George Shaker

    Published 2021-02-01
    “…Abstract A robust method for ultra‐wideband (UWB) imaging of buried shallow objects based on time gating, Wiener filtering, as well as constant false alarm rate (CFAR) is proposed. Moreover, it is demonstrated that Wiener filtering can be used as a clutter removal tool in UWB signal applications. …”
    Get full text
    Article
  7. 147

    Multifeature Fusion Vehicle Detection Algorithm Based on Choquet Integral by Wenhui Li, Peixun Liu, Ying Wang, Hongyin Ni

    Published 2014-01-01
    “…Our method can not only improve the detection rate but also reduce the false alarm rate, which meets the engineering requirements of Advanced Driving Assistance Systems (ADAS).…”
    Get full text
    Article
  8. 148

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “…Based on the behavior of grey wolf, an optimization technique GWO is implemented for intrusion detection to enhance accuracy and minimize false alarm in RNN-LSTM. Preprocess and segment network data with creating RNN-LSTM model for considering the dependence of our dataset Our approach improves the IDS performance by optimizing hyperparameters such as hidden layers, units, learning rates using GWO. …”
    Get full text
    Article
  9. 149

    Using a mobile application for antiretroviral therapy adherence in people living with HIV: A longitudinal pilot study by Rejane Caetani, Susana L. Wiechmann, Jacques D. Brancher, Vitor H.F Oliveira, Rafael Deminice

    Published 2025-01-01
    “…The application was developed by the researchers, and uses an alarm system to record ART use. Adherence was also assessed using the ‘Cuestionario para la Evaluación de la Adhesión al Tratamiento Antiretroviral’ (CEAT-VIH) and the Multi-Method Tool questionnaire. …”
    Get full text
    Article
  10. 150

    Analysis of 6G and B5G waveforms using hybrid MF-ED and ECG-ED spectrum sensing techniques by Arun Kumar, Aziz Nanthaamornphong

    Published 2025-04-01
    “…Additionally, characteristics including bit error rate (BER), power spectral density (PSD), probability of detection (pd), and probability of false alarm (pfa) were researched and evaluated for 500 and 1000 samples. …”
    Get full text
    Article
  11. 151

    Detection Performance of Polarization and Spatial Diversities for Indoor GNSS Applications by Mohammadreza Zaheri, Ali Broumandan, Vahid Dehghanian, Gérard Lachapelle

    Published 2012-01-01
    “…Experimental results show that, for a given target detection performance in terms of the probability of false alarm and the probability of detection, the required input SNR level to meet the target detection performance can be significantly reduced utilizing the diversity system.…”
    Get full text
    Article
  12. 152

    Predator–prey interaction in insects and arachnids: a chemical ecology perspective by Vivek Kempraj, Soo Jean Park

    Published 2024-09-01
    “…Predator–prey interaction has sequential stages starting with initial detection, attack by the predator or either evasion or counterattack by the prey, capture by the predator or escape by the prey, and ingestion by the predator or alarm by the prey. At each stage of the predator–prey interaction sequence, stage-specific semiochemicals may be released by both the predator and the prey. …”
    Get full text
    Article
  13. 153

    Multiantenna Spectrum Sensing in the Presence of Multiple Primary Users over Fading and Nonfading Channels by Dayan Adionel Guimarães, Rausley Adriano Amaral de Souza, Guilherme Pedro Aquino

    Published 2015-01-01
    “…The basis of this paper is Wei and Tirkkonen, 2012, in which expressions for the key performance metrics of the sphericity test applied to the multiantenna cooperative spectrum sensing of multiple primary transmitters in cognitive radio networks over nonfading channels are provided. The false alarm and the detection probabilities were derived in Wei and Tirkkonen, 2012, based on approximations obtained by matching the moments of the test statistics to the Beta distribution. …”
    Get full text
    Article
  14. 154

    Forest Fire Detection Using Wireless Sensors and Networks by Mingyue Wang

    Published 2022-09-01
    “…In this work, all nodes only use temperature sensors and they are programmed on a certain threshold temperature, above it the node will send an alarm message to the sink. This concept relies solely on the node behavior to alert of crises possibility using simple node components to provide detection and information on whether this is a peaceful fire, or the beginning of wild fire. …”
    Get full text
    Article
  15. 155

    Incoherent Integration Detection Method of Airborne Phased Array Radar in a Multipath Environment by Yili Hu, Yongbo Zhao, Sheng Chen

    Published 2021-01-01
    “…Considering these two characteristics, this paper first proposes a target pairing algorithm for matching the DP range and multipath range of the same target in signal detection, and then, combined with the cell-averaging constant false alarm rate (CA-CFAR) detection model, an incoherent integration detection method for airborne PAR in the multipath environment is proposed. …”
    Get full text
    Article
  16. 156

    Multivariate Statistics and Supervised Learning for Predictive Detection of Unintentional Islanding in Grid-Tied Solar PV Systems by Shashank Vyas, Rajesh Kumar, Rajesh Kavasseri

    Published 2016-01-01
    “…For reducing the false alarm rate of anomaly detection, Kullback-Leibler (K-L) divergence was applied on the principal component projections which concluded that Q statistic based approach alone is not reliable for detection of the symptoms liable to cause unintentional islanding. …”
    Get full text
    Article
  17. 157

    AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system by C. Rajathi, P. Rukmani

    Published 2025-12-01
    “…The proposed AccFIT-IDS achieves 99.86% accuracy, with precision, recall and F1-score of 99.81%, 99.92% and 99.86%, respectively, and a false alarm rate of 0.0021, demonstrating its effectiveness.…”
    Get full text
    Article
  18. 158

    Digital Twin-Based Modeling of Complex Systems for Smart Aging by Yiyi Deng

    Published 2022-01-01
    “…The fall detection results based on the digital twin selected thresholds are significantly better than the experimental results of the manually set threshold method; the thresholds set by the digital twin can more accurately identify daily behaviors, especially the more violent daily behaviors such as lying down, and the accurate alarm rate of the falling behavior reaches 92.5%. …”
    Get full text
    Article
  19. 159

    An Intelligent FPGA Based Anti-Sweating System for Bed Sore Prevention in a Clinical Environment by K. S. Jaichandar, Sampath Kumar, Chew kweeTiang, Siew Fong, Stewart Tai

    Published 2011-01-01
    “…Based on the temperature change, the FPGA chip select the - mode (heater/cooler) and speed of the fan module. Furthermore, an alarm module was implemented to alert the nurse to reposition the patient only if patient’s skin to bed surface temperature exceeds a predefined threshold thereby saving human resources. …”
    Get full text
    Article
  20. 160

    Reconstructing a lightweight security protocol in the radio‐frequency identification systems by Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani

    Published 2023-07-01
    “…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
    Get full text
    Article