177 resultados para Burglar alarms.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
We discuss the phenomenon of system tailoring in the context of data from an observational study of anaesthesia. We found that anaesthetists tailor their monitoring equipment so that the auditory alarms are more informative. However, the occurrence of tailoring by anaesthetists in the operating theatre was infrequent, even though the flexibility to tailor exists on many of the patient monitoring systems used in the study. We present an influence diagram to explain how alarm tailoring can increase situation awareness in the operating theatre but why factors inhibiting tailoring prevent widespread use. Extending the influence diagram, we discuss ways that more informative displays could achieve the results sought by anaesthetists when they tailor their alarm systems. In particular, we argue that we should improve our designs rather than simply provide more flexible tailoring systems. because users often find tailoring a complex task. We conclude that properly designed auditory displays may benefit anaesthetists in achieving greater patient situation awareness and that designers should consider carefully how factors promoting and inhibiting tailoring will affect the end-users' likelihood of conducting tailoring. (C) 2004 Elsevier B.V. All rights reserved.
Resumo:
Melodic alarms proposed in the IEC 60601-1-8 standard for medical electrical equipment were tested for learnability and discriminability. Thirty-three non-anaesthetist participants learned the alarms over two sessions of practice, with or without mnemonics suggested in the standard. Fewer than 30% of participants could identify the alarms with 100% accuracy at the end of practice. Confusions persisted between pairs of alarms, especially if mnemonics were used during learning (p = 0.011). Participants responded faster (p < 0.00001) and more accurately (p = 0.002) to medium priority alarms than to high priority alarms, even though they rated the high priority alarms as sounding more urgent (p < 0.00001). Participants with at least 1 year of formal musical training identified the alarms more accurately (p = 0.0002) than musically untrained participants, and found the task easier overall (p < 0.00001). More intensive studies of the IEC 60601-1-8 alarms are needed for their effectiveness to be determined.
Resumo:
This paper reports the first of several tests of new auditory alarms originally proposed by Block et al. [1] and formalized in IEC 60601-1-8 for use in medical electrical equipment. We test whether participants who are supplied with the IEC-recommended mnemonics while learning label-alarm associations can more accurately identify the alarms after short periods of learning. Results for 18 participants strongly indicate that there is a mutual confusability between certain alarm pairs in both learning conditions, but that mnemonics may strengthen rather than diminish certain key confusions.
Resumo:
This research thesis is concerned with the human factors aspects of industrial alarm systems within human supervisory control tasks. Typically such systems are located in central control rooms, and the information may be presented via visual display units. The thesis develops a human, rather than engineering, centred approach to the assessment, measurement and analysis of the situation. A human factors methodology was employed to investigate the human requirements through: interviews, questionnaires, observation and controlled experiments. Based on the analysis of current industrial alarm systems in a variety of domains (power generation, manufacturing and coronary care), it is suggested that often designers do not pay due considerations to the human requirements. It is suggested that most alarm systems have severe shortcomings in human factors terms. The interviews, questionnaire and observations led to the proposal of 'alarm initiated activities' as a framework for the research to proceed. The framework comprises of six main stages: observe, accept, analyse, investigate, correct and monitor. This framework served as a basis for laboratory research into alarm media. Under consideration were speech-based alarm displays and visual alarm displays. Non-speech auditory displays were the subject of a literature review. The findings suggest that care needs to be taken when selecting the alarm media. Ideally it should be chosen to support the task requirements of the operator, rather than being arbitrarily assigned. It was also indicated that there may be some interference between the alarm initiated activities and the alarm media, i.e. information that supports one particular stage of alarm handling may interfere with another.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
Information fusion in biometrics has received considerable attention. The architecture proposed here is based on the sequential integration of multi-instance and multi-sample fusion schemes. This method is analytically shown to improve the performance and allow a controlled trade-off between false alarms and false rejects when the classifier decisions are statistically independent. Equations developed for detection error rates are experimentally evaluated by considering the proposed architecture for text dependent speaker verification using HMM based digit dependent speaker models. The tuning of parameters, n classifiers and m attempts/samples, is investigated and the resultant detection error trade-off performance is evaluated on individual digits. Results show that performance improvement can be achieved even for weaker classifiers (FRR-19.6%, FAR-16.7%). The architectures investigated apply to speaker verification from spoken digit strings such as credit card numbers in telephone or VOIP or internet based applications.
Resumo:
When classifying a signal, ideally we want our classifier to trigger a large response when it encounters a positive example and have little to no response for all other examples. Unfortunately in practice this does not occur with responses fluctuating, often causing false alarms. There exists a myriad of reasons why this is the case, most notably not incorporating the dynamics of the signal into the classification. In facial expression recognition, this has been highlighted as one major research question. In this paper we present a novel technique which incorporates the dynamics of the signal which can produce a strong response when the peak expression is found and essentially suppresses all other responses as much as possible. We conducted preliminary experiments on the extended Cohn-Kanade (CK+) database which shows its benefits. The ability to automatically and accurately recognize facial expressions of drivers is highly relevant to the automobile. For example, the early recognition of “surprise” could indicate that an accident is about to occur; and various safeguards could immediately be deployed to avoid or minimize injury and damage. In this paper, we conducted initial experiments on the extended Cohn-Kanade (CK+) database which shows its benefits.
Resumo:
The modal strain energy method, which depends on the vibration characteristics of the structure, has been reasonably successful in identifying and localising damage in the structure. However, existing strain energy methods require the first few modes to be measured to provide meaningful damage detection. Use of individual modes with existing strain energy methods may indicate false alarms or may not detect the damage at or near the nodal points. This paper proposes a new modal strain energy based damage index which can detect and localize the damage using any one of the modes measured and illustrates its application for beam structures. It becomes evident that the proposed strain energy based damage index also has potential for damage quantification.