Showing 161 - 180 results of 543 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 161

    Robust Spectrum Sensing Demonstration Using a Low-Cost Front-End Receiver by Daniele Borio, Emanuele Angiuli, Raimondo Giuliani, Gianmarco Baldini

    Published 2015-01-01
    “…The design of SS algorithms is one of the most challenging tasks in CR and requires innovative hardware and software solutions to enhance detection probability and minimize low false alarm probability. Although several SS algorithms have been developed in the specialized literature, limited work has been done to practically demonstrate the feasibility of this function on platforms with significant computational and hardware constraints. …”
    Get full text
    Article
  2. 162

    Ultra-Short Wave Communication Squelch Algorithm Based on Deep Neural Network by Yuanxin Xiang, Yi Lv, Wenqiang Lei, Jiancheng Lv

    Published 2023-03-01
    “…In particular, the false alarm rate of the proposed squelch algorithm for non-stationary burst-like noise is significantly lower than that of traditional squelch methods.…”
    Get full text
    Article
  3. 163

    Multivariable Time Series Prediction for the Icing Process on Overhead Power Transmission Line by Peng Li, Na Zhao, Donghua Zhou, Min Cao, Jingjie Li, Xinling Shi

    Published 2014-01-01
    “…The design of monitoring and predictive alarm systems is necessary for successful overhead power transmission line icing. …”
    Get full text
    Article
  4. 164

    Development and Implementation of an FPGA-Embedded Multimedia Remote Monitoring System for Information Technology Server Room Management by Yongqin Zhu, Kaiwen Hou

    Published 2024-01-01
    “…Simultaneously, the FPGA transmits the collected data from each monitoring point via a serial port to an LCD serial screen for display. An alarm is triggered if any environmental anomalies are detected, indicating abnormal statuses. …”
    Get full text
    Article
  5. 165

    FWA-SVM Network Intrusion Identification Technology for Network Security by Yaohui Zhang

    Published 2025-01-01
    “…The average detection rate of the raised method is 96.43%, the false alarm rate is 0.91, and the average correlation coefficient is as high as 0.987, which is better than the other four comparative algorithms. …”
    Get full text
    Article
  6. 166

    Dyspepsia: When and How to Test for Helicobacter pylori Infection by Maria Pina Dore, Giovanni Mario Pes, Gabrio Bassotti, Paolo Usai-Satta

    Published 2016-01-01
    “…Because symptoms do not reliably discriminate between organic and functional forms of the disease, anamnesis, family history of peptic ulcer and/or of gastric cancer, medication history, especially for nonsteroidal anti-inflammatory drugs, age, and physical examination could help the physician in discerning between functional dyspepsia and organic causes. For patients without alarm symptoms, noninvasive testing for H. pylori, with either carbon-13-labeled urea breath testing or stool antigen testing, is recommended as a first-line strategy. …”
    Get full text
    Article
  7. 167

    Detection of network intelligence features with the decision tree model by N. P. Sharaev, S. N. Petrov

    Published 2022-03-01
    “…Practical tests of the developed module have shown the alarm on all types of network scanning using Nmap and Masscan utilities.Co n c l u s i o n. …”
    Get full text
    Article
  8. 168

    Audio classification using grasshopper‐ride optimization algorithm‐based support vector machine by Suryabhan Pratap Singh, Umesh Chandra Jaiswal

    Published 2021-08-01
    “…The analysis reveals that the proposed audio classification acquired the maximal accuracy of 0.96, minimal false alarm rate, and false rejection rate of 0.022 and 0.0119, respectively.…”
    Get full text
    Article
  9. 169

    Assessing the Causes of Time Overrun in Building and Road Construction Projects: The Case of Addis Ababa City, Ethiopia by Adamu Beyene Negesa

    Published 2022-01-01
    “…The finding of the study will alarm the key players and practitioners engaging in the city’s construction industry to focus on managing the severe factors.…”
    Get full text
    Article
  10. 170

    Volcanic disaster mitigation based on local wisdom: A case study from a local community in the Mount Galunggung, Indonesia by Mutolib Abdul, Rahmat Ali, Harefa Darmawan, Nugraha Satriya, Handoko Lukman, Sululing Siswadi, Laxmi, Nurhayati Siti

    Published 2025-01-01
    “…Disaster mitigation efforts based on local wisdom in Mount Galunggung include: 1) the use of the kentongan (a traditional wooden alarm instrument), 2) local knowledge of natural disaster signs, and 43) mystical beliefs associated with Mount Galunggung. …”
    Get full text
    Article
  11. 171

    Evaluating the RELM Test Results by Michael K. Sachs, Ya-Ting Lee, Donald L. Turcotte, James R. Holliday, John B. Rundle

    Published 2012-01-01
    “…We also discuss the relative merits of alarm-based versus probability-based forecasts.…”
    Get full text
    Article
  12. 172

    Subspace Compressive GLRT Detector for MIMO Radar in the Presence of Clutter by Siva Karteek Bolisetti, Mohammad Patwary, Khawza Ahmed, Abdel-Hamid Soliman, Mohamed Abdel-Maguid

    Published 2015-01-01
    “…The problem of optimising the target detection performance of MIMO radar in the presence of clutter is considered. The increased false alarm rate which is a consequence of the presence of clutter returns is known to seriously degrade the target detection performance of the radar target detector, especially under low SNR conditions. …”
    Get full text
    Article
  13. 173

    An efficient target detection algorithm via Karhunen‐Loève transform for frequency modulated continuous wave (FMCW) radar applications by Luoyan Zhu, Yinsheng Liu, Danping He, Ke Guan, Bo Ai, Zhangdui Zhong, Xi Liao

    Published 2022-09-01
    “…Pertaining to the detection performance, constant false alarm ratio detector is applied to demonstrate the detection ability as a result of the processor by use of probability of detection (Pd).…”
    Get full text
    Article
  14. 174

    Characterization of patients with clinical suspicion of dengue and warning signs. Pediatric Hospital. Cienfuegos, 2019 by Delfín Rodríguez Buergo, Hilda María Delgado Acosta, Diana Rosa Rodríguez Delgado, Roxana Gutiérrez Morán, Lisset María Martínez González

    Published 2022-02-01
    “…<br /><strong>Conclusion</strong>: The identified alarm signs indicate that the patients in the series could have evolved towards the severe stage of the disease, however, thanks to the early detection of the signs and the care received, the evolution was favorable.…”
    Get full text
    Article
  15. 175

    Zika, a Mosquito-Transmitted Virus by L. Phil Lounibos, Barry W. Alto, Nathan D. Burkett-Cadena, Cynthia C. Lord, Chelsea T. Smartt, C. Roxanne Rutledge Connelly, Jorge R. Rey

    Published 2016-02-01
    “…In 2015, however, Zika became a larger concern when a strain of the virus traced to outbreaks in French Polynesia emerged in northeastern Brazil. This strain provoked alarm because of increased incidence of microcephaly in babies born to Zika-infected mothers. …”
    Get full text
    Article
  16. 176

    Performance Analysis of Thermodynamic Indices and Atmospheric Stability Parameters in Thunderstorm Prediction: The Case of Samsun by Ahmet Can Kaya, Veli Yavuz

    Published 2024-01-01
    “…Statistical performance tests such as Probability of Detection (POD), False Alarm Ratio (FAR), Miss Rate (MR), Critical Success Index (CIS), Hiedke Skill Score (HSS), and True Skill Score (TSS) were used to measure the success of the indices and parameters in predicting thunderstorm events. …”
    Get full text
    Article
  17. 177

    Digitalized co-production of emergency response: ICT-enabled dispatch and coordination of volunteers at the emergency site by Sofie Pilemalm, Anna Follin, Erik Prytz

    Published 2025-01-01
    “…First priority requirements include geofencing alert and positioning, a joint application programming interface, receipt of alert, receipt if arrival at incident site, withdrawal of resources, chat functionality and the ability to alert in descending order within the geofenced areas to avoid alarm fatigue. As to coordination and dynamic resource allocation, e.g. built-in alert restrictions, ability to pre-select profiles and to dispatch based on competence/training, capacity and equipment would enable a more optimized response. …”
    Get full text
    Article
  18. 178

    A Clone Selection Based Real-Valued Negative Selection Algorithm by Ruirui Zhang, Xin Xiao

    Published 2018-01-01
    “…The main contributions lie in (1) introducing the clonal selection algorithm and randomly generating candidate detectors within the stratified limited ranges based on clustering centers of self set; generating big-radius candidate detectors first and making them cover space far from selves, which reduces the number of detectors; then generating small-radius candidate detectors and making them gradually cover boundary space between selves and non-selves, which reduces the number of holes; (2) distinguishing selves and dividing them into outlier selves, boundary selves, and internal selves, which can adapt to the interference of noise data from selves; (3) for anomaly detection, using mature detector set and boundary self set to test at the same time, which can effectively improve the detection rate and reduce the false alarm rate. Theoretical analysis and experimental results show that the algorithm has better time efficiency and detector generation quality according to classic negative selection algorithms.…”
    Get full text
    Article
  19. 179

    Real-Time Warning Model of Highway Engineering Construction Safety Based on Internet of Things by Haoran Song, Hao Yu, Dianliang Xiao, Yuexiang Li

    Published 2021-01-01
    “…The experimental comparison between the real-time early warning model and the traditional early warning model in this paper shows that the accuracy of the early warning model proposed in this paper is improved by nearly 5%, and the false alarm rate is reduced by nearly 4%.…”
    Get full text
    Article
  20. 180

    Cyclic Peak Extraction from a Spatial Likelihood Map for Multi-Array Multi-Target Bearing-Only Localization by Chuanxing Hu, Bo Zhang, Xishan Yang, Zhaokai Zhai, Dai Liu

    Published 2025-01-01
    “…Under conditions that clutter interference and missing of detection in direction-finding, the traditional method will produce false alarm targets and miss some targets. To address this issue, this paper draws on the idea of a spatial likelihood map which calculates the likelihood of target presence at each grid point within the observation area by partitioning the observation area into grids and utilizing bearing data from each array, yielding the distribution of targets in the observation area. …”
    Get full text
    Article