نتایج جستجو برای: alarm limits

تعداد نتایج: 132568  

1996
Mika Klemettinen Heikki Mannila Pirjo Ronkainen Hannu Toivonen

The papers in the series are intended for internal use and are distributed by the author. Copies may be ordered from the library of Department of Computer Science. Abstract Telecommunication networks produce large amounts of alarm information daily. This data contains potentially valuable knowledge about the network. We present a methodology for the analysis of large telecommunication networks ...

Journal: :MIS Quarterly 2013
Rui Chen Raj Sharman H. Raghav Rao Shambhu J. Upadhyaya

Appendix A.1 A Snippet of Data Types Type/Sub-Property Type Definition IncidentSpecificsType extends u:ActivityType A structure that describes the specific characteristics of the incident IncidentCategory nfirs:FireIncidentCodeSimpleType A code identifying the fire incident type such as "structure fire" AlarmDate u:DateType A code identifying the date when fire is first reported AlarmTime niem-...

2001
Andrew Collier Christopher Leigh

In data from three clear nights of a WHT/UES run in 2000 Oct/Nov, and using improved Doppler tomographic signal-analysis techniques, we have carried out a deep search for starlight reflected from the innermost of υ (upsilon) And’s three planets. We place upper limits on the planet’s radius Rp as functions of its projected orbital velocity Kp ≈ 139 sin i km s for various assumptions about the wa...

Journal: :Technometrics 2016
Nan Chen Xuemin Zi Changliang Zou

Monitoring multivariate quality variables or data streams remains an important and challenging problem in statistical process control (SPC). Although the multivariate SPC has been extensively studied in the literature, designing distribution-free control schemes are still challenging and yet to be addressed well. This paper develops a new nonparametric methodology for monitoring location parame...

Journal: :Proceedings. AMIA Symposium 1999
Roy Schoenberg Daniel Z. Sands Charles Safran

Much of the work in the ICU revolves around information that is recorded by electronic devices. Such devices typically incorporate simple alarm functions that trigger when a value exceeds predefined limits. Depending on the parameter followed, these "boundary based" alarms tend to produce vast numbers of false alarms. Some are the result of false reading and some the result of true but clinical...

Journal: :Ad Hoc Networks 2013
Yang Zhang Nirvana Meratnia Paul J. M. Havinga

Low quality sensor data limits WSN capabilities for providing reliable real-time situationawareness. Outlier detection is a solution to ensure the quality of sensor data. An effective and efficient outlier detection technique for WSNs not only identifies outliers in a distributed and online manner with high detection accuracy and low false alarm, but also satisfies WSN constraints in terms of c...

2003
Klaus Julisch

Using Root Cause Analysis to Handle Intrusion Detection Alarms Klaus Julisch IBM Zurich Research Laboratory Säumerstrasse 4 8803 Rüschlikon, Switzerland e-mail: [email protected] In response to attacks against enterprise networks, administrators are increasingly deploying intrusion detection systems. These systems monitor hosts, networks, and other resources for signs of security violations. U...

2016
Monica Lees Monica Nadine Lees

Collision warning systems represent a promising means to reduce rear-end crash involvement. However, these systems experience failures in the real-world that may promote driver distrust and diminish drivers’ willingness to comply with warnings. Recent research suggests that not all false alarms (FAs) are detrimental to drivers. However, very few studies have examined how different alarms influe...

Journal: :East African medical journal 2012
S K Ngichabe B W Gatinu M A Nyangore R Karuga S Z Wanyonyi J N Kiarie

BACKGROUND Uterine massage may significantly reduce post partum blood loss and could be patient-driven. OBJECTIVE To assess the effectiveness of an alarm reminder system for self uterine massage in the prevention of post partum blood loss. DESIGN A random controlled trial. SETTING Meru District Hospital, Kenya. SUBJECTS One hundred and twenty seven (127) women were randomly assigned to ...

2010
Violeta Mirchevska Boštjan Kaluža Mitja Luštrek Matjaž Gams

This paper presents real-time adaptation of alarm detection models in a remote health monitoring system based on user feedback. Real-time adaptation enables systems to fine-tune to the needs and preferences of the user and changes in the environment. This way, the system performance is improved in terms of technical accuracy and subjective user wishes. Two types of alarm detection models were u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید