The evolution of telecommunications has allowed the development of broadband services based mainly on fiber optic backbone networks. The operation and maintenance of these optical networks is made possible by using su...The evolution of telecommunications has allowed the development of broadband services based mainly on fiber optic backbone networks. The operation and maintenance of these optical networks is made possible by using supervision platforms that generate alarms that can be archived in the form of log files. But analyzing the alarms in the log files is a laborious and difficult task for the engineers who need a degree of expertise. Identifying failures and their root cause can be time consuming and impact the quality of service, network availability and service level agreements signed between the operator and its customers. Therefore, it is more than important to study the different possibilities of alarms classification and to use machine learning algorithms for alarms correlation in order to quickly determine the root causes of problems faster. We conducted a research case study on one of the operators in Cameroon who held an optical backbone based on SDH and WDM technologies with data collected from 2016-03-28 to “2022-09-01” with 7201 rows and 18. In this paper, we will classify alarms according to different criteria and use 02 unsupervised learning algorithms namely the K-Means algorithm and the DBSCAN to establish correlations between alarms in order to identify root causes of problems and reduce the time to troubleshoot. To achieve this objective, log files were exploited in order to obtain the root causes of the alarms, and then K-Means algorithm and the DBSCAN were used firstly to evaluate their performance and their capability to identify the root cause of alarms in optical network.展开更多
Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalizati...Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalization method for multivariate correlated alarms to realize the root cause analysis and alarm prioritization. An information fusion based interpretive structural model is constructed according to the data-driven partial correlation coefficient calculation and process knowledge modification. This hierarchical multi-layer model is helpful in abnormality propagation path identification and root-cause analysis. Revised Likert scale method is adopted to determine the alarm priority and reduce the blindness of alarm handling. As a case study, the Tennessee Eastman process is utilized to show the effectiveness and validity of proposed approach. Alarm system performance comparison shows that our rationalization methodology can reduce the alarm flood to some extent and improve the performance.展开更多
Alarm systems play important roles for the safe and efficient operation of modern industrial plants. Critical alarms are configured with a higher priority and are safety related among many other alarms. If critical al...Alarm systems play important roles for the safe and efficient operation of modern industrial plants. Critical alarms are configured with a higher priority and are safety related among many other alarms. If critical alarms can be predicted in advance, the operator will have more time to prevent them from happening. In this paper,we present a dynamic alarm prediction algorithm, which is a probabilistic model that utilizes alarm data from distributed control system, to calculate the occurrence probability of critical alarms. It accounts for the local interdependences among the alarms using the n-gram model, which occur because of the nonlinear relationships between variables. Finally, the dynamic alarm prediction algorithm is applied to an industrial case study.展开更多
During the operation of complex process, such as oil production or refming, abnormal situations may occur, leading to an alarm flooding. Alarm flooding is the signalling of a large number of alarms in a few minutes, i...During the operation of complex process, such as oil production or refming, abnormal situations may occur, leading to an alarm flooding. Alarm flooding is the signalling of a large number of alarms in a few minutes, in such a way that it is impossible for the operator to attend to all alarms. On these occasions, it is usual that the operator leaves the alarm summary list and gets an analysis of the plant through the screens of the DCS (digital control system), seeking to understand the situation. The alarm summary list ceases to be a useful tool. In such cases, the operator might have the aid of a filter that would present the highest priority alarms and other information associated with them, enabling him to gain a better knowledge of the situation. This paper describes the interface of a system aimed to help the operator to have a more comprehensive knowledge of the process (a better situational awareness) during process upsets that cause alarm flooding, recovering the utility of the alarm layer to the safety of industrial processes.展开更多
Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators an...Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators and carrying out the necessary associated interventions.Successful use of equipment in the nursing practice environment will be improved by a thorough understanding of the nurse's approach to alarm configuration.Methods:A mixed-method design integrating quantitative and qualitative components was used.The sample of this study recruited a convenience sample of 60 nurses who have worked in critical care areas.This study took place at Lebanese American University Medical Center Rizk Hospital,utilizing a semi-structured interview with participants.Results:The study demonstrated the high incidence of nuisance alarms and the desensitization of critical care nurses to vital ones.According to the nurses,frequent false alarms and a shortage of staff are the 2 main causes of alarm desensitization.Age was significantly associated with the perception of Smart alarms,according to the data(P=0.03).Four interconnected themes and subcategories that reflect the clinical reasoning process for alarm customization were developed as a result of the study's qualitative component:(1)unit alarm environment;(2)nursing style;(3)motivation to customize;and(4)clinical and technological customization.Conclusions:According to this study,nurses believe that alarms are valuable.However,a qualitative analysis of the experiences revealed that customization has been severely limited since the healthcare team depends on nurses to complete these tasks independently.Additionally,a staffing shortage and lack of technical training at the start of placement have also hindered customization.展开更多
Static analysis presents significant challenges in alarm handling, where probabilistic models and alarm prioritization are essential methods for addressing these issues. These models prioritize alarms based on user fe...Static analysis presents significant challenges in alarm handling, where probabilistic models and alarm prioritization are essential methods for addressing these issues. These models prioritize alarms based on user feedback, thereby alleviating the burden on users to manually inspect alarms. However, they often encounter limitations related to efficiency and issues such as false generalization. While learning-based approaches have demonstrated promise, they typically incur high training costs and are constrained by the predefined structures of existing models. Moreover, the integration of large language models (LLMs) in static analysis has yet to reach its full potential, often resulting in lower accuracy rates in vulnerability identification. To tackle these challenges, we introduce BinLLM, a novel framework that harnesses the generalization capabilities of LLMs to enhance alarm probability models through rule learning. Our approach integrates LLM-derived abstract rules into the probabilistic model, using alarm paths and critical statements from static analysis. This integration enhances the model’s reasoning capabilities, improving its effectiveness in prioritizing genuine bugs while mitigating false generalizations. We evaluated BinLLM on a suite of C programs and observed 40.1% and 9.4% reduction in the number of checks required for alarm verification compared to two state-of-the-art baselines, Bingo and BayeSmith, respectively, underscoring the potential of combining LLMs with static analysis to improve alarm management.展开更多
This article presents the findings of a pilot project to test the large-scale rollout of smoke alarms in an informal community in Cape Town, South Africa. The work provides novel insight into the effectiveness and cha...This article presents the findings of a pilot project to test the large-scale rollout of smoke alarms in an informal community in Cape Town, South Africa. The work provides novel insight into the effectiveness and challenges associated with using smoke detectors in low-income communities. Technical details and detector considerations are also provided that will assist in enhancing future interventions.The project installed 1200 smoke detection devices in TRA informal settlement in the suburb of Wallacedene, in the City of Cape Town, and monitored their effectiveness for a period of 12 months. The monitoring showed that there were 11 real activations, where the presence of the devices likely saved lives and homes. The project also identified a series of challenges, especially in relation to nuisance alarms,where everyday household emissions, dust, and insect ingress caused false alarms, leading some participants to uninstall devices. The findings of the pilot study suggest that although smoke detectors could provide a valuable tool for reducing the frequency and impact of informal settlement fires in South Africa and elsewhere, they need to be adapted to meet the specific needs and conditions encountered in informal dwellings. Modifications, such as adjusting device sensitivity,preventing dust and insect ingress and tailoring devices to everyday conditions, will be essential to make smoke alarms more suitable and effective in the future. Smoke alarms could become an important component of low-income community fire safety if such challenges can be addressed.展开更多
斯威士兰的国王,最近宣布他将娶一个17岁的女孩作为他的第11任妻 子。消息传出,全国哗然。个中原因,本文的末尾有明确交代。国王两年之前曾经宣布:…teenage girls should remain virgins(贞洁)to help stem(阻止)theAIDS crisis in Swa...斯威士兰的国王,最近宣布他将娶一个17岁的女孩作为他的第11任妻 子。消息传出,全国哗然。个中原因,本文的末尾有明确交代。国王两年之前曾经宣布:…teenage girls should remain virgins(贞洁)to help stem(阻止)theAIDS crisis in Swaziland,where the adult HIV infection rate is approaching 40percent.展开更多
As oil and gas exploration continues to progress into deeper and unconventional reservoirs,the likelihood of kick risk increases,making kick warning a critical factor in ensuring drilling safety and efficiency.Due to ...As oil and gas exploration continues to progress into deeper and unconventional reservoirs,the likelihood of kick risk increases,making kick warning a critical factor in ensuring drilling safety and efficiency.Due to the scarcity of kick samples,traditional supervised models perform poorly,and significant fluctuations in field data lead to high false alarm rates.This study proposes an unsupervised graph autoencoder(GAE)-based kick warning method,which effectively reduces false alarms by eliminating the influence of field engineer operations and incorporating real-time model updates.The method utilizes the GAE model to process time-series data during drilling,accurately identifying kick risk while overcoming challenges related to small sample sizes and missing features.To further reduce false alarms,the weighted dynamic time warping(WDTW)algorithm is introduced to identify fluctuations in logging data caused by field engineer operations during drilling,with real-time updates applied to prevent normal conditions from being misclassified as kick risk.Experimental results show that the GAE-based kick warning method achieves an accuracy of 92.7%and significantly reduces the false alarm rate.The GAE model continues to operate effectively even under conditions of missing features and issues kick warnings 4 min earlier than field engineers,demonstrating its high sensitivity and robustness.After integrating the WDTW algorithm and real-time updates,the false alarm rate is reduced from 17.3%to 5.6%,further improving the accuracy of kick warnings.The proposed method provides an efficient and reliable approach for kick warning in drilling operations,offering strong practical value and technical support for the intelligent management of future drilling operations.展开更多
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi...This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.展开更多
Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short...Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short game to wake up your mind.After that,you must review your goals for the day.展开更多
Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been exten...Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation.展开更多
Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,mal...Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,males and females are expected to differ in the perceived costs and/orbenefts associated with predator avoidance decisions.Recent studies suggest that male Trinidadian guppies(Poecilia reticulata)show reducedor absent responses to acute personal information cues,placing them at greater risk of predation relative to females.Our goal here was totest the hypothesis that adult(reproductively active)male guppies rely on social information to limit potential costs associated with their lack ofresponse to risky personal cues.Adult male guppies were exposed to personal chemosensory cues(either conspecifc alarm cues(AC),a novelodor,or a water control)in the presence of a shoal of three females inside a holding container that allowed the transmission of visual but notchemical cues.At the same time,we exposed females to either risk from AC or no risk,resulting in the display of a range of female behavior,from calm to alarmed,available as social information for males.Alarmed females caused male fright activity to increase and male interest infemales to decrease,regardless of the personal cue treatment.These results indicate that male guppies rely more on female information regarding predation risk than their own personal information,probably to balance trade-offs between reproduction and predator avoidance.展开更多
Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on ...Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior.展开更多
Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of ot...Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry.展开更多
There are multiple types of risks involved in the service of long-span railway bridges.Classical methods are difficult to provide targeted alarm information according to different situations of load anomalies and stru...There are multiple types of risks involved in the service of long-span railway bridges.Classical methods are difficult to provide targeted alarm information according to different situations of load anomalies and structural anomalies.To accurately alarm different risks of long-span railway bridges by structural health monitoring systems,this paper proposes a cross-cooperative alarm method using principal and secondary indicators during high-wind periods.It provides the prior criterion for monitoring systems under special conditions,defining the principal and secondary indicators,alarm levels,and thresholds based on the relationship between dynamic equilibrium equations and multiple linear regression analysis.Analysis of one-year monitoring data from a longspan railway cable-stayed bridge shows that the 10-min average cross-bridge wind speed(excitation indicator)can be selected as the principal indicator,while lateral displacement(response indicator)can serve as the secondary indicator.The threshold levels of the secondary indicator prioritize the safety of bridge operation(mainly aiming at the safety of trains traversing bridges),with values significantly lower than structural safety thresholds.This approach enhances alarm timeliness and effectively distinguishes between load anomalies,structural anomalies,and equipment failures.Consequently,it improves alarm accuracy and provides timely decision support for bridge maintenance,train traversing,and emergency treatment.展开更多
The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railw...The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railway security is paramount.The current laser monitoring technologies suffer from high false alarm rates and unreliable intrusion identification.This study addresses these issues by investigating high-resolution laser monitoring technology for railway obstacles,focusing on key parameters such as monitoring range and resolution.We propose an enhanced non-uniform laser scanning method,developing a laser monitoring system that reduces the obstacle false alarm rate to 2.00%,significantly lower than the 20%standard(TJ/GW135-2015).This rate is the best record for laser monitoring systems on China Railway.Our system operates seamlessly in all weather conditions,providing superior accuracy,resolution,and identification efficiency.It is the only 3D LiDAR system certified by the China State Railway Group Co.,Ltd.(Certificate No.[2023]008).Over three years,our system has been deployed at numerous points along various lines managed by the China State Railway Group,accumulating a dataset of 300,000 observations.This extensive deployment has significantly enhanced railway safety.The development and implementation of our railway laser monitoring system represent a substantial advancement in railway safety technology.Its low false alarm rate(2.00%),high accuracy(20 cm×20 cm×20 cm),and robust performance in diverse conditions underscore its potential for widespread adoption,promising to enhance railway safety in China and internationally.展开更多
Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis i...Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis is presented. The monitoring data were first modeled as ARMA models, while a principalcomponent matrix derived from the AR coefficients of these models was utilized to establish the Mahalanobisdistance criterion functions. Then, a new damage-sensitive feature index DDSF is proposed. A hypothesis test involving the t-test method is further applied to obtain a decision of damage alarming as the mean value of DDSF had significantly changed after damage. The numerical results of a three-span-girder model shows that the defined index is sensitive to subtle structural damage, and the proposed algorithm can be applied to the on-line damage alarming in SHM.展开更多
The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response un...The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response under various scales are further formulated. The theoretical analysis results reveal that the wavelet packet energy spectrum (WPES) obtained from wavelet packet decomposition of structural dynamic response will detect the presence of structural damage. The sensitivity analysis of the WPES to structural damage and measurement noise is also performed. The transfer properties of the structural system matrix and the observation noise under various analysis scales are formulated, which verify the damage alarming reliability using the proposed WPES with preferable damage sensitivity and noise robusticity.展开更多
A novel spectrum hole detection mechanism is proposed to improve the detection probability in cognitive radio networks for several typical scenarios. By removing the influence of the spatial false alarm (SFA), the s...A novel spectrum hole detection mechanism is proposed to improve the detection probability in cognitive radio networks for several typical scenarios. By removing the influence of the spatial false alarm (SFA), the spectrum hole detection probability of the secondary user under path loss and multi-path fading is derived. Meanwhile, the spectrum hole detection probability of multi-users cooperative sensing and that of single-user sensing in multi-bands are derived for comparison. Theoretical analyses and simulation results show that the spectrum hole detection probability of the proposed mechanism is inversely proportional to the sampling times and the area of the sensing region. The detection performance of the multi-users sensing is better than that of single-user sensing when with the AND ~ogic fusion rule but worse when with the OR logic fusion rule. The detection probability is further decreased in the Rayleigh fading channel but it is greatly increased in multi-bands.展开更多
文摘The evolution of telecommunications has allowed the development of broadband services based mainly on fiber optic backbone networks. The operation and maintenance of these optical networks is made possible by using supervision platforms that generate alarms that can be archived in the form of log files. But analyzing the alarms in the log files is a laborious and difficult task for the engineers who need a degree of expertise. Identifying failures and their root cause can be time consuming and impact the quality of service, network availability and service level agreements signed between the operator and its customers. Therefore, it is more than important to study the different possibilities of alarms classification and to use machine learning algorithms for alarms correlation in order to quickly determine the root causes of problems faster. We conducted a research case study on one of the operators in Cameroon who held an optical backbone based on SDH and WDM technologies with data collected from 2016-03-28 to “2022-09-01” with 7201 rows and 18. In this paper, we will classify alarms according to different criteria and use 02 unsupervised learning algorithms namely the K-Means algorithm and the DBSCAN to establish correlations between alarms in order to identify root causes of problems and reduce the time to troubleshoot. To achieve this objective, log files were exploited in order to obtain the root causes of the alarms, and then K-Means algorithm and the DBSCAN were used firstly to evaluate their performance and their capability to identify the root cause of alarms in optical network.
基金Supported by the National Natural Science Foundation of China(61473026,61104131)the Fundamental Research Funds for the Central Universities(JD1413)
文摘Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalization method for multivariate correlated alarms to realize the root cause analysis and alarm prioritization. An information fusion based interpretive structural model is constructed according to the data-driven partial correlation coefficient calculation and process knowledge modification. This hierarchical multi-layer model is helpful in abnormality propagation path identification and root-cause analysis. Revised Likert scale method is adopted to determine the alarm priority and reduce the blindness of alarm handling. As a case study, the Tennessee Eastman process is utilized to show the effectiveness and validity of proposed approach. Alarm system performance comparison shows that our rationalization methodology can reduce the alarm flood to some extent and improve the performance.
基金Supported by the National High Technology Research and Development Program of China(2013AA040701)
文摘Alarm systems play important roles for the safe and efficient operation of modern industrial plants. Critical alarms are configured with a higher priority and are safety related among many other alarms. If critical alarms can be predicted in advance, the operator will have more time to prevent them from happening. In this paper,we present a dynamic alarm prediction algorithm, which is a probabilistic model that utilizes alarm data from distributed control system, to calculate the occurrence probability of critical alarms. It accounts for the local interdependences among the alarms using the n-gram model, which occur because of the nonlinear relationships between variables. Finally, the dynamic alarm prediction algorithm is applied to an industrial case study.
文摘During the operation of complex process, such as oil production or refming, abnormal situations may occur, leading to an alarm flooding. Alarm flooding is the signalling of a large number of alarms in a few minutes, in such a way that it is impossible for the operator to attend to all alarms. On these occasions, it is usual that the operator leaves the alarm summary list and gets an analysis of the plant through the screens of the DCS (digital control system), seeking to understand the situation. The alarm summary list ceases to be a useful tool. In such cases, the operator might have the aid of a filter that would present the highest priority alarms and other information associated with them, enabling him to gain a better knowledge of the situation. This paper describes the interface of a system aimed to help the operator to have a more comprehensive knowledge of the process (a better situational awareness) during process upsets that cause alarm flooding, recovering the utility of the alarm layer to the safety of industrial processes.
文摘Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators and carrying out the necessary associated interventions.Successful use of equipment in the nursing practice environment will be improved by a thorough understanding of the nurse's approach to alarm configuration.Methods:A mixed-method design integrating quantitative and qualitative components was used.The sample of this study recruited a convenience sample of 60 nurses who have worked in critical care areas.This study took place at Lebanese American University Medical Center Rizk Hospital,utilizing a semi-structured interview with participants.Results:The study demonstrated the high incidence of nuisance alarms and the desensitization of critical care nurses to vital ones.According to the nurses,frequent false alarms and a shortage of staff are the 2 main causes of alarm desensitization.Age was significantly associated with the perception of Smart alarms,according to the data(P=0.03).Four interconnected themes and subcategories that reflect the clinical reasoning process for alarm customization were developed as a result of the study's qualitative component:(1)unit alarm environment;(2)nursing style;(3)motivation to customize;and(4)clinical and technological customization.Conclusions:According to this study,nurses believe that alarms are valuable.However,a qualitative analysis of the experiences revealed that customization has been severely limited since the healthcare team depends on nurses to complete these tasks independently.Additionally,a staffing shortage and lack of technical training at the start of placement have also hindered customization.
基金supported by the National Natural Science Foundation of China(Nos.U20B2048 and 62471301)。
文摘Static analysis presents significant challenges in alarm handling, where probabilistic models and alarm prioritization are essential methods for addressing these issues. These models prioritize alarms based on user feedback, thereby alleviating the burden on users to manually inspect alarms. However, they often encounter limitations related to efficiency and issues such as false generalization. While learning-based approaches have demonstrated promise, they typically incur high training costs and are constrained by the predefined structures of existing models. Moreover, the integration of large language models (LLMs) in static analysis has yet to reach its full potential, often resulting in lower accuracy rates in vulnerability identification. To tackle these challenges, we introduce BinLLM, a novel framework that harnesses the generalization capabilities of LLMs to enhance alarm probability models through rule learning. Our approach integrates LLM-derived abstract rules into the probabilistic model, using alarm paths and critical statements from static analysis. This integration enhances the model’s reasoning capabilities, improving its effectiveness in prioritizing genuine bugs while mitigating false generalizations. We evaluated BinLLM on a suite of C programs and observed 40.1% and 9.4% reduction in the number of checks required for alarm verification compared to two state-of-the-art baselines, Bingo and BayeSmith, respectively, underscoring the potential of combining LLMs with static analysis to improve alarm management.
基金This work was supported by the United States Agency for International Development(Grant Agreement AID-OFDAG-16-00115)by Santam Insurance,South Africa.The authors would like to acknowledge Santam Insurance,South Africa,for their support and for funding the cost of the fre alarms and the research.
文摘This article presents the findings of a pilot project to test the large-scale rollout of smoke alarms in an informal community in Cape Town, South Africa. The work provides novel insight into the effectiveness and challenges associated with using smoke detectors in low-income communities. Technical details and detector considerations are also provided that will assist in enhancing future interventions.The project installed 1200 smoke detection devices in TRA informal settlement in the suburb of Wallacedene, in the City of Cape Town, and monitored their effectiveness for a period of 12 months. The monitoring showed that there were 11 real activations, where the presence of the devices likely saved lives and homes. The project also identified a series of challenges, especially in relation to nuisance alarms,where everyday household emissions, dust, and insect ingress caused false alarms, leading some participants to uninstall devices. The findings of the pilot study suggest that although smoke detectors could provide a valuable tool for reducing the frequency and impact of informal settlement fires in South Africa and elsewhere, they need to be adapted to meet the specific needs and conditions encountered in informal dwellings. Modifications, such as adjusting device sensitivity,preventing dust and insect ingress and tailoring devices to everyday conditions, will be essential to make smoke alarms more suitable and effective in the future. Smoke alarms could become an important component of low-income community fire safety if such challenges can be addressed.
文摘斯威士兰的国王,最近宣布他将娶一个17岁的女孩作为他的第11任妻 子。消息传出,全国哗然。个中原因,本文的末尾有明确交代。国王两年之前曾经宣布:…teenage girls should remain virgins(贞洁)to help stem(阻止)theAIDS crisis in Swaziland,where the adult HIV infection rate is approaching 40percent.
基金Youth Foundation of National Natural Science Foundation of China (No. 52204020)Distinguished Young Foundation of National Natural Science Foundation of China (No. 52125401).
文摘As oil and gas exploration continues to progress into deeper and unconventional reservoirs,the likelihood of kick risk increases,making kick warning a critical factor in ensuring drilling safety and efficiency.Due to the scarcity of kick samples,traditional supervised models perform poorly,and significant fluctuations in field data lead to high false alarm rates.This study proposes an unsupervised graph autoencoder(GAE)-based kick warning method,which effectively reduces false alarms by eliminating the influence of field engineer operations and incorporating real-time model updates.The method utilizes the GAE model to process time-series data during drilling,accurately identifying kick risk while overcoming challenges related to small sample sizes and missing features.To further reduce false alarms,the weighted dynamic time warping(WDTW)algorithm is introduced to identify fluctuations in logging data caused by field engineer operations during drilling,with real-time updates applied to prevent normal conditions from being misclassified as kick risk.Experimental results show that the GAE-based kick warning method achieves an accuracy of 92.7%and significantly reduces the false alarm rate.The GAE model continues to operate effectively even under conditions of missing features and issues kick warnings 4 min earlier than field engineers,demonstrating its high sensitivity and robustness.After integrating the WDTW algorithm and real-time updates,the false alarm rate is reduced from 17.3%to 5.6%,further improving the accuracy of kick warnings.The proposed method provides an efficient and reliable approach for kick warning in drilling operations,offering strong practical value and technical support for the intelligent management of future drilling operations.
基金Chongqing Engineering University Undergraduate Innovation and Entrepreneurship Training Program Project:Wireless Fire Automatic Alarm System(Project No.:CXCY2024017)Chongqing Municipal Education Commission Science and Technology Research Project:Development and Research of Chongqing Wireless Fire Automatic Alarm System(Project No.:KJQN202401906)。
文摘This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.
文摘Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short game to wake up your mind.After that,you must review your goals for the day.
基金funded by the National Natural Science Foundation of China (No. 32301295 to JW, 32101242 to LM, and 32260253 to LW)High-Level Talents Research Start-Up Project of Hebei University (No. 521100222044 to JW)
文摘Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation.
基金supported by Concordia University and funded by the Natural Sciences and Engineering Research Council of Canada(Discovery Grant to G.E.B.,and an E.W.R.SteacieMemorial Fellowship to M.C.O.F.).
文摘Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,males and females are expected to differ in the perceived costs and/orbenefts associated with predator avoidance decisions.Recent studies suggest that male Trinidadian guppies(Poecilia reticulata)show reducedor absent responses to acute personal information cues,placing them at greater risk of predation relative to females.Our goal here was totest the hypothesis that adult(reproductively active)male guppies rely on social information to limit potential costs associated with their lack ofresponse to risky personal cues.Adult male guppies were exposed to personal chemosensory cues(either conspecifc alarm cues(AC),a novelodor,or a water control)in the presence of a shoal of three females inside a holding container that allowed the transmission of visual but notchemical cues.At the same time,we exposed females to either risk from AC or no risk,resulting in the display of a range of female behavior,from calm to alarmed,available as social information for males.Alarmed females caused male fright activity to increase and male interest infemales to decrease,regardless of the personal cue treatment.These results indicate that male guppies rely more on female information regarding predation risk than their own personal information,probably to balance trade-offs between reproduction and predator avoidance.
基金National Geographic Society,UCLA(Faculty Senate and the Division of Life Sciences),a Rocky Mountain Biological Laboratory research fellowship,NSF IDBR-0754247,and DEB-1119660 and 1557130 all to D.T.B.DBI-0242960,0731346,1226713,and 1755522 to the RMBL.K.A.was a NSF GRFP fellow during the fnal preparation of this MS。
文摘Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior.
基金funded by the Education Department of Hainan Province(no.HnjgY 2022-12)the National Natural Science Foundation of China(no.32260127).
文摘Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry.
基金supported by the National Natural Science Foundation of China(Grants U23A20660,52008099,and 52378288)the Major Science and Technology Project of Yunnan Province,China(Grant 202502AD080007)the China Railway Engineering Corporation Science and Technology Research and Development Project(Grant 2022-Key-44).
文摘There are multiple types of risks involved in the service of long-span railway bridges.Classical methods are difficult to provide targeted alarm information according to different situations of load anomalies and structural anomalies.To accurately alarm different risks of long-span railway bridges by structural health monitoring systems,this paper proposes a cross-cooperative alarm method using principal and secondary indicators during high-wind periods.It provides the prior criterion for monitoring systems under special conditions,defining the principal and secondary indicators,alarm levels,and thresholds based on the relationship between dynamic equilibrium equations and multiple linear regression analysis.Analysis of one-year monitoring data from a longspan railway cable-stayed bridge shows that the 10-min average cross-bridge wind speed(excitation indicator)can be selected as the principal indicator,while lateral displacement(response indicator)can serve as the secondary indicator.The threshold levels of the secondary indicator prioritize the safety of bridge operation(mainly aiming at the safety of trains traversing bridges),with values significantly lower than structural safety thresholds.This approach enhances alarm timeliness and effectively distinguishes between load anomalies,structural anomalies,and equipment failures.Consequently,it improves alarm accuracy and provides timely decision support for bridge maintenance,train traversing,and emergency treatment.
基金financially supported by the National Natural Science Foundation of China(Nos.62275244,62375258,62225507,U2033211,62175230,and 62175232)the CAS Project for Young Scientists in Basic Research(No.YSBR-065)+2 种基金Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20200001)National Key R&D Program of China(No.2022YFB3607800,No.2022YFB3605800,and No.2022YFB4601501)Key Program of the Chinese Academy of Sciences(ZDBS-ZRKJZ-TLC018)。
文摘The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railway security is paramount.The current laser monitoring technologies suffer from high false alarm rates and unreliable intrusion identification.This study addresses these issues by investigating high-resolution laser monitoring technology for railway obstacles,focusing on key parameters such as monitoring range and resolution.We propose an enhanced non-uniform laser scanning method,developing a laser monitoring system that reduces the obstacle false alarm rate to 2.00%,significantly lower than the 20%standard(TJ/GW135-2015).This rate is the best record for laser monitoring systems on China Railway.Our system operates seamlessly in all weather conditions,providing superior accuracy,resolution,and identification efficiency.It is the only 3D LiDAR system certified by the China State Railway Group Co.,Ltd.(Certificate No.[2023]008).Over three years,our system has been deployed at numerous points along various lines managed by the China State Railway Group,accumulating a dataset of 300,000 observations.This extensive deployment has significantly enhanced railway safety.The development and implementation of our railway laser monitoring system represent a substantial advancement in railway safety technology.Its low false alarm rate(2.00%),high accuracy(20 cm×20 cm×20 cm),and robust performance in diverse conditions underscore its potential for widespread adoption,promising to enhance railway safety in China and internationally.
基金The National High Technology Research and Devel-opment Program of China (863Program) (No2006AA04Z416)the National Natural Science Foundation of China (No50538020)
文摘Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis is presented. The monitoring data were first modeled as ARMA models, while a principalcomponent matrix derived from the AR coefficients of these models was utilized to establish the Mahalanobisdistance criterion functions. Then, a new damage-sensitive feature index DDSF is proposed. A hypothesis test involving the t-test method is further applied to obtain a decision of damage alarming as the mean value of DDSF had significantly changed after damage. The numerical results of a three-span-girder model shows that the defined index is sensitive to subtle structural damage, and the proposed algorithm can be applied to the on-line damage alarming in SHM.
文摘The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response under various scales are further formulated. The theoretical analysis results reveal that the wavelet packet energy spectrum (WPES) obtained from wavelet packet decomposition of structural dynamic response will detect the presence of structural damage. The sensitivity analysis of the WPES to structural damage and measurement noise is also performed. The transfer properties of the structural system matrix and the observation noise under various analysis scales are formulated, which verify the damage alarming reliability using the proposed WPES with preferable damage sensitivity and noise robusticity.
基金The National Science and Technology Major Project( No. 2011ZX03005-004-03)the National Natural Science Foundation of China ( No. 61171081, 60872004 )the Natural Science Foundation of Guangxi Province ( No. 2011GXNSFB018075)
文摘A novel spectrum hole detection mechanism is proposed to improve the detection probability in cognitive radio networks for several typical scenarios. By removing the influence of the spatial false alarm (SFA), the spectrum hole detection probability of the secondary user under path loss and multi-path fading is derived. Meanwhile, the spectrum hole detection probability of multi-users cooperative sensing and that of single-user sensing in multi-bands are derived for comparison. Theoretical analyses and simulation results show that the spectrum hole detection probability of the proposed mechanism is inversely proportional to the sampling times and the area of the sensing region. The detection performance of the multi-users sensing is better than that of single-user sensing when with the AND ~ogic fusion rule but worse when with the OR logic fusion rule. The detection probability is further decreased in the Rayleigh fading channel but it is greatly increased in multi-bands.