期刊文献+
共找到13,543篇文章
< 1 2 250 >
每页显示 20 50 100
Leader-Following Consensus of Multi-Agent Systems via Fully Distributed Event-Based Control
1
作者 GENG Zongsheng ZHAO Dongdong +2 位作者 ZHOU Xingwen YAN Lei YAN Shi 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第4期640-645,共6页
This paper aims to study the leader-following consensus of linear multi-agent systems on undirected graphs.Specifically,we construct an adaptive event-based protocol that can be implemented in a fully distributed way ... This paper aims to study the leader-following consensus of linear multi-agent systems on undirected graphs.Specifically,we construct an adaptive event-based protocol that can be implemented in a fully distributed way by using only local relative information.This protocol is also resource-friendly as it will be updated only when the agent violates the designed event-triggering function.A sufficient condition is proposed for the leader-following consensus of linear multi-agent systems based on the Lyapunov approach,and the Zeno-behavior is excluded.Finally,two numerical examples are provided to illustrate the effectiveness of the theoretical results. 展开更多
关键词 CONSENSUS multi-agent systems event-based control adaptive control fully distributed protocol
原文传递
Design Discussion of a Wireless Fire Alarm System Based on Data Fusion Technology 被引量:1
2
作者 Qun Wu Jinyang Wu 《Journal of Electronic Research and Application》 2025年第2期58-64,共7页
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi... This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system. 展开更多
关键词 Data fusion technology Fire alarm system Wireless alarm Hardware design Software design
在线阅读 下载PDF
Costly calling:Marmots who alarm call at higher rates are less likely to survive the summer and live shorter lives
3
作者 Daniel T.Blumstein Katie A.Adler Jazmine Uy 《Current Zoology》 2025年第4期425-431,共7页
Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on ... Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior. 展开更多
关键词 alarm calling predator deterrence PREDATION LONGEVITY
原文传递
How nestlings of Oriental Reed Warbler respond to adult alarm calls
4
作者 Jiaojiao Wang Yongrui Feng +3 位作者 Laikun Ma Longwu Wang Canchao Yang Jianhua Hou 《Avian Research》 2025年第3期389-396,共8页
Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been exten... Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation. 展开更多
关键词 alarm call Altricial nestling Oriental Reed Warbler PARASITE PREDATOR
在线阅读 下载PDF
Sparrowhawk imitation or convergent alarm signal?A new hypothesis for bubbling call of cuckoos with empirical testing
5
作者 Huisheng Wang Xiangyang Chen +2 位作者 Jiaojiao Wang Laikun Ma Canchao Yang 《Current Zoology》 2025年第4期449-455,共7页
Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of ot... Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry. 展开更多
关键词 acoustic mimicry anti-parasite strategy avian brood parasitism convergent alarm call syllable rate
原文传递
NeuroBiometric:An Eye Blink Based Biometric Authentication System Using an Event-Based Neuromorphic Vision Sensor 被引量:4
6
作者 Guang Chen Fa Wang +3 位作者 Xiaoding Yuan Zhijun Li Zichen Liang Alois Knoll 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第1期206-218,共13页
The rise of the Internet and identity authentication systems has brought convenience to people's lives but has also introduced the potential risk of privacy leaks.Existing biometric authentication systems based on... The rise of the Internet and identity authentication systems has brought convenience to people's lives but has also introduced the potential risk of privacy leaks.Existing biometric authentication systems based on explicit and static features bear the risk of being attacked by mimicked data.This work proposes a highly efficient biometric authentication system based on transient eye blink signals that are precisely captured by a neuromorphic vision sensor with microsecond-level temporal resolution.The neuromorphic vision sensor only transmits the local pixel-level changes induced by the eye blinks when they occur,which leads to advantageous characteristics such as an ultra-low latency response.We first propose a set of effective biometric features describing the motion,speed,energy and frequency signal of eye blinks based on the microsecond temporal resolution of event densities.We then train the ensemble model and non-ensemble model with our Neuro Biometric dataset for biometrics authentication.The experiments show that our system is able to identify and verify the subjects with the ensemble model at an accuracy of 0.948 and with the non-ensemble model at an accuracy of 0.925.The low false positive rates(about 0.002)and the highly dynamic features are not only hard to reproduce but also avoid recording visible characteristics of a user's appearance.The proposed system sheds light on a new path towards safer authentication using neuromorphic vision sensors. 展开更多
关键词 BIOMETRICS biometric autentication event-based vision neuromorphic vision
在线阅读 下载PDF
Event-based Control and Filtering of Networked Systems:A Survey 被引量:7
7
作者 Lei Zou Zi-Dong Wang Dong-Hua Zhou 《International Journal of Automation and computing》 EI CSCD 2017年第3期239-253,共15页
In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(... In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(especially networked systems). For networked systems, event-based transmission scheme is capable of improving the efficiency in resource utilization and prolonging the lifetime of the network components compared with the widely adopted periodic transmission scheme. As such, it would be interesting to 1) examining how the event-triggering mechanisms affect the control or filtering performance for networked systems, and 2) developing some suitable approaches for the controller and filter design problems. In this paper, a bibliographical review is presented on event-based control and filtering problems for various networked systems. First, the event-driven communication scheme is introduced in detail according to its engineering background, characteristic, and representative research frameworks. Then, different event-based control and filtering(or state estimation) problems are categorized and then discussed. Finally, we conclude the paper by outlining future research challenges for event-based networked systems. 展开更多
关键词 Event-triggered transmission networked systems event-based control event-based filtering event-triggered distributed state estimation distributed control with event-based protocol
原文传递
Using Event-Based Method to Estimate Cybersecurity Equilibrium 被引量:2
8
作者 Zhaofeng Liu Ren Zheng +1 位作者 Wenlian Lu Shouhuai Xu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第2期455-467,共13页
Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it ... Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high frequency.This inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form solutions.More specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally convergent.The presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic method.In order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some nodes.This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems. 展开更多
关键词 Cybersecurity dynamics cybersecurity equilibrium event-based method global state estimation preventive and reactive cyber defense dynamics
在线阅读 下载PDF
Design of AI-Enhanced and Hardware-Supported Multimodal E-Skin for Environmental Object Recognition and Wireless Toxic Gas Alarm 被引量:2
9
作者 Jianye Li Hao Wang +8 位作者 Yibing Luo Zijing Zhou He Zhang Huizhi Chen Kai Tao Chuan Liu Lingxing Zeng Fengwei Huo Jin Wu 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第12期1-22,共22页
Post-earthquake rescue missions are full of challenges due to the unstable structure of ruins and successive aftershocks.Most of the current rescue robots lack the ability to interact with environments,leading to low ... Post-earthquake rescue missions are full of challenges due to the unstable structure of ruins and successive aftershocks.Most of the current rescue robots lack the ability to interact with environments,leading to low rescue efficiency.The multimodal electronic skin(e-skin)proposed not only reproduces the pressure,temperature,and humidity sensing capabilities of natural skin but also develops sensing functions beyond it—perceiving object proximity and NO2 gas.Its multilayer stacked structure based on Ecoflex and organohydrogel endows the e-skin with mechanical properties similar to natural skin.Rescue robots integrated with multimodal e-skin and artificial intelligence(AI)algorithms show strong environmental perception capabilities and can accurately distinguish objects and identify human limbs through grasping,laying the foundation for automated post-earthquake rescue.Besides,the combination of e-skin and NO2 wireless alarm circuits allows robots to sense toxic gases in the environment in real time,thereby adopting appropriate measures to protect trapped people from the toxic environment.Multimodal e-skin powered by AI algorithms and hardware circuits exhibits powerful environmental perception and information processing capabilities,which,as an interface for interaction with the physical world,dramatically expands intelligent robots’application scenarios. 展开更多
关键词 Stretchable hydrogel sensors Multimodal e-skin Artificial intelligence Post-earthquake rescue Wireless toxic gas alarm
在线阅读 下载PDF
Sounding the alarm:Functionally referential signaling in Azure-winged Magpie
10
作者 Xingyi Jiang Yanyun Zhang 《Avian Research》 SCIE CSCD 2024年第1期35-41,共7页
Functionally referential signals are a complex form of communication that conveys information about the external environment.Such signals have been found in a range of mammal and bird species and have helped us unders... Functionally referential signals are a complex form of communication that conveys information about the external environment.Such signals have been found in a range of mammal and bird species and have helped us understand the complexities of animal communication.Corvids are well known for their extraordinary cognitive abilities,but relatively little attention has been paid to their vocal function.Here,we investigated the functionally referential signals of a cooperatively breeding corvid species,Azure-winged Magpie(Cyanopica cyanus).Through field observations,we suggest that Azure-winged Magpie uses referential alarm calls to distinguish two types of threats:’rasp’ calls for terrestrial threats and ’chatter’ calls for aerial threats.A playback experiment revealed that Azure-winged Magpies responded to the two call types with qualitatively different behaviors.They sought cover by flying into the bushes in response to the ’chatter’ calls,and flew to or stayed at higher positions in response to ’rasp’ calls,displaying a shorter response time to ’chatter’ calls.Significant differences in acoustic structure were found between the two types of calls.Given the extensive cognitive abilities of corvids and the fact that referential signals were once thought to be unique to primates,these findings are important for expanding our understanding of social communication and language evolution. 展开更多
关键词 alarm call Animal communication Azure-winged Magpie Referential signal
在线阅读 下载PDF
A lightweight false alarm suppression method in heterogeneous change detection
11
作者 XU Cong HE Zishu LIU Haicheng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期899-905,共7页
Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A light... Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms. 展开更多
关键词 convolutional neural network(CNN) graph convolu-tional network(GCN) heterogeneous change detection LIGHTWEIGHT false alarm suppression
在线阅读 下载PDF
基于EtherCAT的液压支架智能控制系统研究 被引量:2
12
作者 王磊 孙凯 +1 位作者 袁瑞甫 齐俊艳 《河南理工大学学报(自然科学版)》 北大核心 2025年第3期53-63,共11页
目的液压支架是煤矿开采的关键设备之一,为了解决液压支架通信网络通信速率低与同步性差的问题,方法以支撑掩护式液压支架为对象,设计一套完整的智能控制系统,深入探讨液压支架的数据传输与控制问题。EtherCAT通信基于标准的以太网数据... 目的液压支架是煤矿开采的关键设备之一,为了解决液压支架通信网络通信速率低与同步性差的问题,方法以支撑掩护式液压支架为对象,设计一套完整的智能控制系统,深入探讨液压支架的数据传输与控制问题。EtherCAT通信基于标准的以太网数据帧,优化了协议栈的应用层和数据链路层。将EtherCAT总线应用于整个液压支架通信网络,完成液压支架智能控制系统的软硬件设计。将液压支架的单架控制、邻架控制和成组控制等命令结合EtherCAT报文嵌入以太网数据帧中,实现直达I/O的以太网控制。基于建立的液压支架运动模型,利用EtherCAT总线的高精度分布式时钟(DC)同步机制,实现对采煤机位姿及液压支架升降、推进、移动等动作的精确控制。结果采用EtherCAT总线替代传统的CAN总线后,通信速率从1 MB/s提升至100 MB/s,显著增强了数据传输的速度和效率。同时,网络拓扑结构从单一的总线型扩展为更加灵活的混合拓扑结构,适应范围更广。主站对液压支架的统一管理和控制,有效简化了网络管理的复杂性。利用EtherCAT的分布时钟(DC)同步机制,实现了微秒级的运动控制更新周期,确保了液压支架从站与主站之间的快速数据交换。结论通过引入EtherCAT总线技术,显著提升了液压支架的控制效率和通信速率。研究结果不仅完善了智能无人采煤开采技术体系,为后续研究及现场应用提供了重要参考,还对促进煤矿工作面的安全高效生产具有重要意义。 展开更多
关键词 液压支架 ETHERCAT 监控分站 煤矿开采 故障报警
在线阅读 下载PDF
Design of Signal Lamp Filament Monitoring Alarm Instrument
13
作者 Haifeng Zhu 《Journal of Electronic Research and Application》 2024年第5期38-45,共8页
To improve the reliability of the light emitting diode(LED)signal lamp filament current monitoring alarm instrument for metro systems,a new type of hot standby online monitoring apparatus was developed which is based ... To improve the reliability of the light emitting diode(LED)signal lamp filament current monitoring alarm instrument for metro systems,a new type of hot standby online monitoring apparatus was developed which is based on synchronous transmission data(STD)bus technology.In this system,a double hot standby mode can be achieved by adopting bus arbitration.In addition,to detect the effective value of alternating current which is from 0 to 200 mA in the signal lamp lighting circuit,a precision rectifier signal conditioning circuit and an isolated acquisition circuit were designed.This new type of alarm instrument has high detection accuracy and could meet the functional requirements for metro signal systems after comparing it with some industry products that were applied on the spot. 展开更多
关键词 Signal lamp Monitoring alarm instrument Precision rectifier signal conditioning circuit
在线阅读 下载PDF
Critical care nurses and their clinical reasoning for customizing monitor alarms:a mixed-method study
14
作者 Mohamad Al Nakhal Mirna Fawaz +3 位作者 Karim Khabaz Ahmad Rayan Salam Bani Hani Mohammed ALBashtawy 《Frontiers of Nursing》 2024年第4期457-468,共12页
Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators an... Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators and carrying out the necessary associated interventions.Successful use of equipment in the nursing practice environment will be improved by a thorough understanding of the nurse's approach to alarm configuration.Methods:A mixed-method design integrating quantitative and qualitative components was used.The sample of this study recruited a convenience sample of 60 nurses who have worked in critical care areas.This study took place at Lebanese American University Medical Center Rizk Hospital,utilizing a semi-structured interview with participants.Results:The study demonstrated the high incidence of nuisance alarms and the desensitization of critical care nurses to vital ones.According to the nurses,frequent false alarms and a shortage of staff are the 2 main causes of alarm desensitization.Age was significantly associated with the perception of Smart alarms,according to the data(P=0.03).Four interconnected themes and subcategories that reflect the clinical reasoning process for alarm customization were developed as a result of the study's qualitative component:(1)unit alarm environment;(2)nursing style;(3)motivation to customize;and(4)clinical and technological customization.Conclusions:According to this study,nurses believe that alarms are valuable.However,a qualitative analysis of the experiences revealed that customization has been severely limited since the healthcare team depends on nurses to complete these tasks independently.Additionally,a staffing shortage and lack of technical training at the start of placement have also hindered customization. 展开更多
关键词 CUSTOMIZATION critical care unit equipment mixed method monitor alarm MOTIVATION nurse’s perception practice environment
暂未订购
基于YOLOv8火灾检测及告警系统的设计与实现 被引量:1
15
作者 朱贺新 赵元苏 +1 位作者 郭蕊 赵志源 《北京工业职业技术学院学报》 2025年第2期16-20,共5页
经过近十年迭代优化,YOLO模型已成为实时目标检测领域典型代表之一。将YOLOv8应用于火焰烟雾训练,能够在复杂环境中有效检测火焰和烟雾,为火灾预防和早期干预提供技术支持。基于YOLOv8设计的火灾检测与告警系统,包括数据采集、预处理、A... 经过近十年迭代优化,YOLO模型已成为实时目标检测领域典型代表之一。将YOLOv8应用于火焰烟雾训练,能够在复杂环境中有效检测火焰和烟雾,为火灾预防和早期干预提供技术支持。基于YOLOv8设计的火灾检测与告警系统,包括数据采集、预处理、AI检测处理、告警联动、用户界面和审计等模块,能够完成火灾检测、邮件告警、短信通知等任务,具有一定的实用价值和推广前景。 展开更多
关键词 火灾检测 嵌入式 模型训练 告警联动
在线阅读 下载PDF
基于FPGA的脉冲激光告警系统设计
16
作者 张瑞 武振涛 +3 位作者 薛鹏 杨帅 徐承雨 王志斌 《激光杂志》 北大核心 2025年第6期29-35,共7页
针对脉冲激光被广泛应用于编码通信、精确制导、高功率毁伤等激光武器的情况,且目前缺少对脉冲激光威胁进行有效告警的措施,为此提出了一种基于FPGA的脉冲激光告警系统。通过增加积分时间在帧周期内的占比来提高脉冲捕获概率,采用图像... 针对脉冲激光被广泛应用于编码通信、精确制导、高功率毁伤等激光武器的情况,且目前缺少对脉冲激光威胁进行有效告警的措施,为此提出了一种基于FPGA的脉冲激光告警系统。通过增加积分时间在帧周期内的占比来提高脉冲捕获概率,采用图像差分提高信噪比,并快速提取光斑坐标,最后以查表的形式读出来袭激光的方位、俯仰角度。利用FPGA并行处理的优势,能保证对脉冲激光的实时响应。实验结果表明,该系统在220 mW@1064 nm激光器模拟输入的条件下,对脉冲宽度范围为100 ns~100μs的脉冲激光实现告警,测量角度误差小于0.3°,对单脉冲的捕获概率能达到97%,并能实现1064 nm、1313 nm、1550 nm等常用激光波长的识别。 展开更多
关键词 激光告警 脉冲激光 数据处理 FPGA
原文传递
基于改进D-S证据理论的变电站电气设备智能监测报警方法 被引量:7
17
作者 王明溪 《电工技术》 2025年第1期30-32,共3页
为进一步提高电力系统变电站故障电气设备的监测精度与预警效果,结合D-S证据理论与信息融合技术设计了一种新的预警模型。首先利用信息融合技术整合多源数据;其次通过引入冲突因子和证据权值系数改进D-S证据理论,优化证据处理过程;最终... 为进一步提高电力系统变电站故障电气设备的监测精度与预警效果,结合D-S证据理论与信息融合技术设计了一种新的预警模型。首先利用信息融合技术整合多源数据;其次通过引入冲突因子和证据权值系数改进D-S证据理论,优化证据处理过程;最终搭建了全新的变电站电气设备智能监测报警模型。实验结果显示,提出的优化预警模型在报警准确率和报警响应时间上均有显著提升,其中报警准确率最高可达99.5%,最快报警响应时间缩短至0.3s。由此可见,设计的报警模型不仅具有较好的测试性能,还能为变电站电气设备故障预防和准确报警提供更有效的技术支持。 展开更多
关键词 信息融合 D-S证据理论 电力系统 故障监测 报警
在线阅读 下载PDF
强γ环境水下乏燃料操作临界安全监督优化设计研究
18
作者 踪训成 李卫敏 +2 位作者 李翔 舒文 吴明昌 《核科学与工程》 北大核心 2025年第3期564-570,共7页
基于目前乏燃料临界安全监督的现状及存在的问题,提出了若干优化改进建议,采用涂硼计数管代替传统BF_(3)计数管,克服乏燃料强γ射线的干扰,获得更加有效真实的中子计数率;提出建立远程数字化临界监测系统的必要性,系统中设置中子倍增时... 基于目前乏燃料临界安全监督的现状及存在的问题,提出了若干优化改进建议,采用涂硼计数管代替传统BF_(3)计数管,克服乏燃料强γ射线的干扰,获得更加有效真实的中子计数率;提出建立远程数字化临界监测系统的必要性,系统中设置中子倍增时间阈值、中子计数率阈值作为事故前警告报警参数,提醒操作人员注意临界趋势,判断当前的临界安全状况,必要时采取临界控制措施;系统中增加γ剂量临界报警设备,一旦发生临界事故,触发事故性报警,紧急撤离疏散操作人员并进入应急响应状态,减少人员辐射受照。通过设计合理的多样性报警逻辑减少误报警概率,通过优化设计实现乏燃料临界监督科学规范、报警响应快、判断可靠的目标。 展开更多
关键词 乏燃料 临界监督 量化参数 报警
在线阅读 下载PDF
天然气区域生产中的关联工艺参数协同预测与预警
19
作者 赵勇 尹爱军 +3 位作者 成浩 李骞 纪林呈 吴倩颖 《科学技术与工程》 北大核心 2025年第2期560-566,共7页
为提前发现天然气区域生产过程中管线、装置可能发生的超压、泄露等异常工况,现有工业控制报警系统不能准确反映设备真实状态,而采用单参数的预警误判率较高,实用性不足。提出了一种天然气区域生产各上、下游场站关联工艺参数的协同预... 为提前发现天然气区域生产过程中管线、装置可能发生的超压、泄露等异常工况,现有工业控制报警系统不能准确反映设备真实状态,而采用单参数的预警误判率较高,实用性不足。提出了一种天然气区域生产各上、下游场站关联工艺参数的协同预测与预警方法。针对天然气区域内场站多、生产过程复杂、监测数据多样的特点,首先对每个场站的参数进行降维,提取各场站的关键工艺参数;再对关键参数进行关联度评估及分组,以同组的高关联参数为自变量,建立多元非线性套索回归预测模型;同时,建立关键参数的长短期记忆预测模型;结合两种模型预测结果的对比分析确定动态阈值,对区域生产进行协同预警。通过重庆气矿某井区开展的有效性验证,结果表明该方法不仅能有效减少单值异常出现的预警误判,又可提前定位异常场站和异常点位,具有较高的实用价值。 展开更多
关键词 天然气区域生产 报警 工艺参数 关联度 协同预警
在线阅读 下载PDF
心电监护四导心电同步技术与多参数融合技术降低重症监护病房误报警的临床研究
20
作者 陈淑芬 郑进方 +8 位作者 刘振宇 钟洁琳 方小丽 吴爱梅 王秋芳 吴海燕 陈有建 黄若曦 黄厚源 《中国医学装备》 2025年第8期17-21,共5页
目的:评估四导心电同步技术与多参数融合技术识别功能对减少重症监护病房(ICU)误报警数量和提升报警质量的效果。方法:采用四导心电同步技术与多参数融合技术加强临床监护仪报警监测与评估,降低监护仪误报警率。选取2024年10月14日至12... 目的:评估四导心电同步技术与多参数融合技术识别功能对减少重症监护病房(ICU)误报警数量和提升报警质量的效果。方法:采用四导心电同步技术与多参数融合技术加强临床监护仪报警监测与评估,降低监护仪误报警率。选取2024年10月14日至12月27日海南省人民医院ICU、心血管内科监护病房(CCU)和神经外科监护病房(NICU)临床在用的48台监护仪对应的床单元临床报警数据,按照监护仪四导心电同步与多参数融合技术算法的开启与关闭,将其分为A组(开启四导心电同步和多参数融合)、B组(开启四导心电同步,关闭多参数融合)、C组(关闭四导心电同步,开启多参数融合)和D组(关闭四导心电同步和多参数融合),每组12台监护仪,比较不同优化策略下各床单元监护仪产生的总报警及误报警数量。结果:A组、B组和C组监护仪的日均报警数量分别为(134.2±32.4)、(392.5±68.2)和(583.4±126.5)例,均低于D组的(1073.2±168.6)例,差异有统计学意义(Z=3.45、2.94、2.52,P<0.05);A组、B组和C组报警数量的优化率较D组分别提高了87.51%、63.47%和45.67%。A组、B组和C组监护仪的平均误报警率分别为(1.04±0.15)%、(1.73±0.12)%和(2.07±0.08)%,均低于D组的(3.76±0.2)%,差异有统计学意义(Z=3.45、2.94、2.52,P<0.05)。结论:四导心电同步技术和多参数融合技术能够有效优化ICU报警数量,减少科室监护仪误报警比例,降低医护人员警报疲劳。 展开更多
关键词 心电监护仪 四导心电同步技术 多参数融合技术 误报警 报警疲劳
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部