ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring an...ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring and alarming system based on Android smart phone. In our system, an ECG device collects the ECG signal and transmits it to an Android phone. The Android phone detects alarms which come from the ECG devices. When alarms occur, Android phone will capture the ECG images and the details about the alarms, and sends them to the cloud Alarm Server (AS). Once received, AS push the messages to doctors’ phone, so the doctors could see the ECG images and alarm details on their mobile phone. In our system, high resolution ECG pictures are transmitted to doctors’ phone in a user-friendly way, which can help doctors keep track of their patient’s condition easily.展开更多
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi...This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.展开更多
The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railw...The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railway security is paramount.The current laser monitoring technologies suffer from high false alarm rates and unreliable intrusion identification.This study addresses these issues by investigating high-resolution laser monitoring technology for railway obstacles,focusing on key parameters such as monitoring range and resolution.We propose an enhanced non-uniform laser scanning method,developing a laser monitoring system that reduces the obstacle false alarm rate to 2.00%,significantly lower than the 20%standard(TJ/GW135-2015).This rate is the best record for laser monitoring systems on China Railway.Our system operates seamlessly in all weather conditions,providing superior accuracy,resolution,and identification efficiency.It is the only 3D LiDAR system certified by the China State Railway Group Co.,Ltd.(Certificate No.[2023]008).Over three years,our system has been deployed at numerous points along various lines managed by the China State Railway Group,accumulating a dataset of 300,000 observations.This extensive deployment has significantly enhanced railway safety.The development and implementation of our railway laser monitoring system represent a substantial advancement in railway safety technology.Its low false alarm rate(2.00%),high accuracy(20 cm×20 cm×20 cm),and robust performance in diverse conditions underscore its potential for widespread adoption,promising to enhance railway safety in China and internationally.展开更多
Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis i...Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis is presented. The monitoring data were first modeled as ARMA models, while a principalcomponent matrix derived from the AR coefficients of these models was utilized to establish the Mahalanobisdistance criterion functions. Then, a new damage-sensitive feature index DDSF is proposed. A hypothesis test involving the t-test method is further applied to obtain a decision of damage alarming as the mean value of DDSF had significantly changed after damage. The numerical results of a three-span-girder model shows that the defined index is sensitive to subtle structural damage, and the proposed algorithm can be applied to the on-line damage alarming in SHM.展开更多
The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response un...The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response under various scales are further formulated. The theoretical analysis results reveal that the wavelet packet energy spectrum (WPES) obtained from wavelet packet decomposition of structural dynamic response will detect the presence of structural damage. The sensitivity analysis of the WPES to structural damage and measurement noise is also performed. The transfer properties of the structural system matrix and the observation noise under various analysis scales are formulated, which verify the damage alarming reliability using the proposed WPES with preferable damage sensitivity and noise robusticity.展开更多
Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmi...Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor.展开更多
Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short...Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short game to wake up your mind.After that,you must review your goals for the day.展开更多
Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been exten...Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation.展开更多
Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,mal...Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,males and females are expected to differ in the perceived costs and/orbenefts associated with predator avoidance decisions.Recent studies suggest that male Trinidadian guppies(Poecilia reticulata)show reducedor absent responses to acute personal information cues,placing them at greater risk of predation relative to females.Our goal here was totest the hypothesis that adult(reproductively active)male guppies rely on social information to limit potential costs associated with their lack ofresponse to risky personal cues.Adult male guppies were exposed to personal chemosensory cues(either conspecifc alarm cues(AC),a novelodor,or a water control)in the presence of a shoal of three females inside a holding container that allowed the transmission of visual but notchemical cues.At the same time,we exposed females to either risk from AC or no risk,resulting in the display of a range of female behavior,from calm to alarmed,available as social information for males.Alarmed females caused male fright activity to increase and male interest infemales to decrease,regardless of the personal cue treatment.These results indicate that male guppies rely more on female information regarding predation risk than their own personal information,probably to balance trade-offs between reproduction and predator avoidance.展开更多
Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on ...Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior.展开更多
Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of ot...Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry.展开更多
In order to meet the self-powered requirement by microelectronic products and micro-electrostatic vibration generator and avoid the environmental pollution caused by waste batteries,many countries have started their r...In order to meet the self-powered requirement by microelectronic products and micro-electrostatic vibration generator and avoid the environmental pollution caused by waste batteries,many countries have started their researches on piezoelectric power generation based on the researches on the recovery device of rotational energy of piezoelectric effect.The piezoelectric power generation has many advantages compared with other generation patterns.The piezoelectric power generation has become a new field of research.In this study,the piezoelectric vibrators were used to convert energy.According to the requirements by tire pressure alarm system,the energy conversion and storage were researched and analyzed by using the passive sensing device used in automotive inspection.The converted energy was then provided to the alarm,achieving intelligent control and utilization of piezoelectric vibrators.展开更多
Damage alarming and safety evaluation using long-term monitoring data is an area of significant research activity for long-span bridges. In order to extend the research in this field, the damage alarming technique for...Damage alarming and safety evaluation using long-term monitoring data is an area of significant research activity for long-span bridges. In order to extend the research in this field, the damage alarming technique for bridge expansion joints based on long-term monitoring data was developed. The effects of environmental factors on the expansion joint displacement were analyzed. Multiple linear regression models were obtained to describe the correlation between displacements and the dominant environmental factors. The damage alarming index was defined based on the multiple regression models. At last, the X-bar control chart was utilized to detect the abnormal change of the displacements. Analysis results reveal that temperature and traffic condition are the dominant environmental factors to influence the displacement. When the confidence level of X-bar control chart is set to be 0.003, the false-positive indications of damage can be avoided. The damage sensitivity analysis shows that the proper X-bar control chart can detect 0.1 cm damage-induced change of the expansion joint displacement. It is reasonably believed that the proposed technique is robust against false-positive indication of damage and suitable to alarm the possible future damage of the expansion joints.展开更多
With principles of reliability, independence, practicality and economical effi- ciency, a set of intelligent fire alarm system based on AVRmega128 single chip microcomputer was designed to solve problems of fire alarm...With principles of reliability, independence, practicality and economical effi- ciency, a set of intelligent fire alarm system based on AVRmega128 single chip microcomputer was designed to solve problems of fire alarm system in many large- scale warehouses. Using advanced flame sensor, 485 bus communication, computer interactive software and related peripheral devices, this intelligent fire alarm system has functions of sound-light alarm and intelligent fire extinguishing. The human-com- puter interactive software was adopted for the remote control of the alarm main control panel through the 485 bus communication. This design of intelligent fire alarm system shows high reference and practical value to the development of intel- ligent alarm products with high integration and high reliability.展开更多
Quantized fault detection for sensor/actuator faults of networked control systems (NCSs) with time delays both in the sensor-to-controller channel and controller-to-actuator channel is concerned in this paper. A fau...Quantized fault detection for sensor/actuator faults of networked control systems (NCSs) with time delays both in the sensor-to-controller channel and controller-to-actuator channel is concerned in this paper. A fault model is set up based on the possible cases of sensor/atuator faults. Then, the model predictive control is used to compensate the time delay. When the sensors and actuators are healthy, an H stability criterion of the state predictive observer is obtained in terms of linear matrix inequality. A new threshold computational method that conforms to the actual situation is proposed. Then, the thresholds of the false alarm rate (FAR) and miss detection rate (MDR) are presented by using our proposed method, which are also compared with the ones given in the existin~ literatures. Finally, some numerical simulations are shown to demonstrate the effectiveness of the proposed method.展开更多
Structure damage identification and alarming of long-span bridge were conducted with three-dimensional dynamic displacement data collected by GPS subsystem of health monitoring system on Runyang Suspension Bridge.Firs...Structure damage identification and alarming of long-span bridge were conducted with three-dimensional dynamic displacement data collected by GPS subsystem of health monitoring system on Runyang Suspension Bridge.First,the effects of temperature on the main girder spatial position coordinates were analyzed from the transverse,longitudinal and vertical directions of bridge,and the correlation regression models were built between temperature and the position coordinates of main girder in the longitudinal and vertical directions;then the alarming indices of coordinate residuals were conducted,and the mean-value control chart was applied to making statistical pattern identification for abnormal changes of girder dynamic coordinates;and finally,the structural damage alarming method of main girder was established.Analysis results show that temperature has remarkable correlation with position coordinates in the longitudinal and vertical directions of bridge,and has weak correlation with the transverse coordinates.The 3%abnormal change of the longitudinal coordinates and 5%abnormal change of the vertical ones caused by structural damage are respectively identified by the mean-value control chart method based on GPS dynamic monitoring data and hence the structural abnormalities state identification and damage alarming for main girder of long-span suspension bridge can be realized in multiple directions.展开更多
Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalizati...Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalization method for multivariate correlated alarms to realize the root cause analysis and alarm prioritization. An information fusion based interpretive structural model is constructed according to the data-driven partial correlation coefficient calculation and process knowledge modification. This hierarchical multi-layer model is helpful in abnormality propagation path identification and root-cause analysis. Revised Likert scale method is adopted to determine the alarm priority and reduce the blindness of alarm handling. As a case study, the Tennessee Eastman process is utilized to show the effectiveness and validity of proposed approach. Alarm system performance comparison shows that our rationalization methodology can reduce the alarm flood to some extent and improve the performance.展开更多
In this work a review of existing fire-detector types has been carried out along with the development of a low cost, portable, and reliable microcontroller based automated fire alarm system for remotely alerting any f...In this work a review of existing fire-detector types has been carried out along with the development of a low cost, portable, and reliable microcontroller based automated fire alarm system for remotely alerting any fire incidents in household or industrial premises. The aim of the system designed is to alert the distant property-owner efficiently and quickly by sending short message (SMS) via GSM network. A Linear integrated temperature sensor detects temperature beyond preset value whereas semiconductor type sensor detects presence of smoke or gas from fire hazards. The sensor units are connected via common data line to ATMega8L AVR microcontroller. A SIM300CZ GSM kit based network module, capable of operating in standard GSM bands, has been used to send alert messages. The system is implemented on printed circuit board (PCB) and tested under different experimental conditions to evaluate its performances.展开更多
Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,f...Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset.展开更多
For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is ...For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is conventionally detected.However,there may be not only one strong peak among correlation results when the cross-correlation noise is strong enough to affect the correlation results.The proposed algorithm decreases the false alarm probability through the decision of the ratio of the maximum value and the second maximum value of the correlation results.Theoretical analysis and simulation results indicate that the proposed algorithm effectively suppresses the acquisition problem of multiple access interference in DSSS system.展开更多
文摘ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring and alarming system based on Android smart phone. In our system, an ECG device collects the ECG signal and transmits it to an Android phone. The Android phone detects alarms which come from the ECG devices. When alarms occur, Android phone will capture the ECG images and the details about the alarms, and sends them to the cloud Alarm Server (AS). Once received, AS push the messages to doctors’ phone, so the doctors could see the ECG images and alarm details on their mobile phone. In our system, high resolution ECG pictures are transmitted to doctors’ phone in a user-friendly way, which can help doctors keep track of their patient’s condition easily.
基金Chongqing Engineering University Undergraduate Innovation and Entrepreneurship Training Program Project:Wireless Fire Automatic Alarm System(Project No.:CXCY2024017)Chongqing Municipal Education Commission Science and Technology Research Project:Development and Research of Chongqing Wireless Fire Automatic Alarm System(Project No.:KJQN202401906)。
文摘This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.
基金financially supported by the National Natural Science Foundation of China(Nos.62275244,62375258,62225507,U2033211,62175230,and 62175232)the CAS Project for Young Scientists in Basic Research(No.YSBR-065)+2 种基金Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20200001)National Key R&D Program of China(No.2022YFB3607800,No.2022YFB3605800,and No.2022YFB4601501)Key Program of the Chinese Academy of Sciences(ZDBS-ZRKJZ-TLC018)。
文摘The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railway security is paramount.The current laser monitoring technologies suffer from high false alarm rates and unreliable intrusion identification.This study addresses these issues by investigating high-resolution laser monitoring technology for railway obstacles,focusing on key parameters such as monitoring range and resolution.We propose an enhanced non-uniform laser scanning method,developing a laser monitoring system that reduces the obstacle false alarm rate to 2.00%,significantly lower than the 20%standard(TJ/GW135-2015).This rate is the best record for laser monitoring systems on China Railway.Our system operates seamlessly in all weather conditions,providing superior accuracy,resolution,and identification efficiency.It is the only 3D LiDAR system certified by the China State Railway Group Co.,Ltd.(Certificate No.[2023]008).Over three years,our system has been deployed at numerous points along various lines managed by the China State Railway Group,accumulating a dataset of 300,000 observations.This extensive deployment has significantly enhanced railway safety.The development and implementation of our railway laser monitoring system represent a substantial advancement in railway safety technology.Its low false alarm rate(2.00%),high accuracy(20 cm×20 cm×20 cm),and robust performance in diverse conditions underscore its potential for widespread adoption,promising to enhance railway safety in China and internationally.
基金The National High Technology Research and Devel-opment Program of China (863Program) (No2006AA04Z416)the National Natural Science Foundation of China (No50538020)
文摘Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis is presented. The monitoring data were first modeled as ARMA models, while a principalcomponent matrix derived from the AR coefficients of these models was utilized to establish the Mahalanobisdistance criterion functions. Then, a new damage-sensitive feature index DDSF is proposed. A hypothesis test involving the t-test method is further applied to obtain a decision of damage alarming as the mean value of DDSF had significantly changed after damage. The numerical results of a three-span-girder model shows that the defined index is sensitive to subtle structural damage, and the proposed algorithm can be applied to the on-line damage alarming in SHM.
文摘The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response under various scales are further formulated. The theoretical analysis results reveal that the wavelet packet energy spectrum (WPES) obtained from wavelet packet decomposition of structural dynamic response will detect the presence of structural damage. The sensitivity analysis of the WPES to structural damage and measurement noise is also performed. The transfer properties of the structural system matrix and the observation noise under various analysis scales are formulated, which verify the damage alarming reliability using the proposed WPES with preferable damage sensitivity and noise robusticity.
文摘Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor.
文摘Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short game to wake up your mind.After that,you must review your goals for the day.
基金funded by the National Natural Science Foundation of China (No. 32301295 to JW, 32101242 to LM, and 32260253 to LW)High-Level Talents Research Start-Up Project of Hebei University (No. 521100222044 to JW)
文摘Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation.
基金supported by Concordia University and funded by the Natural Sciences and Engineering Research Council of Canada(Discovery Grant to G.E.B.,and an E.W.R.SteacieMemorial Fellowship to M.C.O.F.).
文摘Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,males and females are expected to differ in the perceived costs and/orbenefts associated with predator avoidance decisions.Recent studies suggest that male Trinidadian guppies(Poecilia reticulata)show reducedor absent responses to acute personal information cues,placing them at greater risk of predation relative to females.Our goal here was totest the hypothesis that adult(reproductively active)male guppies rely on social information to limit potential costs associated with their lack ofresponse to risky personal cues.Adult male guppies were exposed to personal chemosensory cues(either conspecifc alarm cues(AC),a novelodor,or a water control)in the presence of a shoal of three females inside a holding container that allowed the transmission of visual but notchemical cues.At the same time,we exposed females to either risk from AC or no risk,resulting in the display of a range of female behavior,from calm to alarmed,available as social information for males.Alarmed females caused male fright activity to increase and male interest infemales to decrease,regardless of the personal cue treatment.These results indicate that male guppies rely more on female information regarding predation risk than their own personal information,probably to balance trade-offs between reproduction and predator avoidance.
基金National Geographic Society,UCLA(Faculty Senate and the Division of Life Sciences),a Rocky Mountain Biological Laboratory research fellowship,NSF IDBR-0754247,and DEB-1119660 and 1557130 all to D.T.B.DBI-0242960,0731346,1226713,and 1755522 to the RMBL.K.A.was a NSF GRFP fellow during the fnal preparation of this MS。
文摘Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior.
基金funded by the Education Department of Hainan Province(no.HnjgY 2022-12)the National Natural Science Foundation of China(no.32260127).
文摘Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry.
基金Supported by Natural Science Foundation of Hebei Province(E2013204069)Scienceand Technology Research and Development Program of Baoding City(13ZG020+4 种基金13ZF005)Science and Engineering Fund of Agricultural University of Hebei(LG20120204LG201401)College Students’Innovation and Entrepreneurship Fund of Agricultural University of Hebei(201310086011cxzr2014031)~~
文摘In order to meet the self-powered requirement by microelectronic products and micro-electrostatic vibration generator and avoid the environmental pollution caused by waste batteries,many countries have started their researches on piezoelectric power generation based on the researches on the recovery device of rotational energy of piezoelectric effect.The piezoelectric power generation has many advantages compared with other generation patterns.The piezoelectric power generation has become a new field of research.In this study,the piezoelectric vibrators were used to convert energy.According to the requirements by tire pressure alarm system,the energy conversion and storage were researched and analyzed by using the passive sensing device used in automotive inspection.The converted energy was then provided to the alarm,achieving intelligent control and utilization of piezoelectric vibrators.
基金Project(2009BAG15B03) supported by the National Science and Technology Ministry of ChinaProjects(51178100, 51078080) supported by the National Natural Science Foundation of China+1 种基金Project(BK2011141) supported by the Natural Science Foundation of Jiangsu Province, ChinaProject(12KB02) supported by the Open Fund of the Key Laboratory for Safety Control of Bridge Engineering(Changsha University of Science and Technology), Ministry of Education, China
文摘Damage alarming and safety evaluation using long-term monitoring data is an area of significant research activity for long-span bridges. In order to extend the research in this field, the damage alarming technique for bridge expansion joints based on long-term monitoring data was developed. The effects of environmental factors on the expansion joint displacement were analyzed. Multiple linear regression models were obtained to describe the correlation between displacements and the dominant environmental factors. The damage alarming index was defined based on the multiple regression models. At last, the X-bar control chart was utilized to detect the abnormal change of the displacements. Analysis results reveal that temperature and traffic condition are the dominant environmental factors to influence the displacement. When the confidence level of X-bar control chart is set to be 0.003, the false-positive indications of damage can be avoided. The damage sensitivity analysis shows that the proper X-bar control chart can detect 0.1 cm damage-induced change of the expansion joint displacement. It is reasonably believed that the proposed technique is robust against false-positive indication of damage and suitable to alarm the possible future damage of the expansion joints.
基金Supported by the National Natural Science Foundation of China(11275164)~~
文摘With principles of reliability, independence, practicality and economical effi- ciency, a set of intelligent fire alarm system based on AVRmega128 single chip microcomputer was designed to solve problems of fire alarm system in many large- scale warehouses. Using advanced flame sensor, 485 bus communication, computer interactive software and related peripheral devices, this intelligent fire alarm system has functions of sound-light alarm and intelligent fire extinguishing. The human-com- puter interactive software was adopted for the remote control of the alarm main control panel through the 485 bus communication. This design of intelligent fire alarm system shows high reference and practical value to the development of intel- ligent alarm products with high integration and high reliability.
基金supported by National Natural Science Foundation of China(No.61074065)Natural Science Foundation of Hebei Province(No.F2012203184)Specialized Research Fund for the Doctoral Program of Higher Education of China(No.20111333120009)
文摘Quantized fault detection for sensor/actuator faults of networked control systems (NCSs) with time delays both in the sensor-to-controller channel and controller-to-actuator channel is concerned in this paper. A fault model is set up based on the possible cases of sensor/atuator faults. Then, the model predictive control is used to compensate the time delay. When the sensors and actuators are healthy, an H stability criterion of the state predictive observer is obtained in terms of linear matrix inequality. A new threshold computational method that conforms to the actual situation is proposed. Then, the thresholds of the false alarm rate (FAR) and miss detection rate (MDR) are presented by using our proposed method, which are also compared with the ones given in the existin~ literatures. Finally, some numerical simulations are shown to demonstrate the effectiveness of the proposed method.
基金Project(51078080)supported by the National Natural Science Foundation of ChinaProject(20130969010)supported by Aeronautical Science Foundation of China+1 种基金Project(2011Y03-6)supported by Traffic Transportation Technology Project of Jiangsu Province,ChinaProject(BK2012562)supported by the Natural Science Foundation of Jiangsu Province,China
文摘Structure damage identification and alarming of long-span bridge were conducted with three-dimensional dynamic displacement data collected by GPS subsystem of health monitoring system on Runyang Suspension Bridge.First,the effects of temperature on the main girder spatial position coordinates were analyzed from the transverse,longitudinal and vertical directions of bridge,and the correlation regression models were built between temperature and the position coordinates of main girder in the longitudinal and vertical directions;then the alarming indices of coordinate residuals were conducted,and the mean-value control chart was applied to making statistical pattern identification for abnormal changes of girder dynamic coordinates;and finally,the structural damage alarming method of main girder was established.Analysis results show that temperature has remarkable correlation with position coordinates in the longitudinal and vertical directions of bridge,and has weak correlation with the transverse coordinates.The 3%abnormal change of the longitudinal coordinates and 5%abnormal change of the vertical ones caused by structural damage are respectively identified by the mean-value control chart method based on GPS dynamic monitoring data and hence the structural abnormalities state identification and damage alarming for main girder of long-span suspension bridge can be realized in multiple directions.
基金Supported by the National Natural Science Foundation of China(61473026,61104131)the Fundamental Research Funds for the Central Universities(JD1413)
文摘Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalization method for multivariate correlated alarms to realize the root cause analysis and alarm prioritization. An information fusion based interpretive structural model is constructed according to the data-driven partial correlation coefficient calculation and process knowledge modification. This hierarchical multi-layer model is helpful in abnormality propagation path identification and root-cause analysis. Revised Likert scale method is adopted to determine the alarm priority and reduce the blindness of alarm handling. As a case study, the Tennessee Eastman process is utilized to show the effectiveness and validity of proposed approach. Alarm system performance comparison shows that our rationalization methodology can reduce the alarm flood to some extent and improve the performance.
文摘In this work a review of existing fire-detector types has been carried out along with the development of a low cost, portable, and reliable microcontroller based automated fire alarm system for remotely alerting any fire incidents in household or industrial premises. The aim of the system designed is to alert the distant property-owner efficiently and quickly by sending short message (SMS) via GSM network. A Linear integrated temperature sensor detects temperature beyond preset value whereas semiconductor type sensor detects presence of smoke or gas from fire hazards. The sensor units are connected via common data line to ATMega8L AVR microcontroller. A SIM300CZ GSM kit based network module, capable of operating in standard GSM bands, has been used to send alert messages. The system is implemented on printed circuit board (PCB) and tested under different experimental conditions to evaluate its performances.
文摘Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset.
基金supported by the National High Technology ResearchDevelopment Program of China (863 Program) (2008AA0248)
文摘For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is conventionally detected.However,there may be not only one strong peak among correlation results when the cross-correlation noise is strong enough to affect the correlation results.The proposed algorithm decreases the false alarm probability through the decision of the ratio of the maximum value and the second maximum value of the correlation results.Theoretical analysis and simulation results indicate that the proposed algorithm effectively suppresses the acquisition problem of multiple access interference in DSSS system.