176 resultados para Alarms


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of control, estimation or diagnosis algorithms most often assumes that all available process variables represent the system state at the same instant of time. However, this is never true in current network systems, because of the unknown deterministic or stochastic transmission delays introduced by the communication network. During the diagnosing stage, this will often generate false alarms. Under nominal operation, the different transmission delays associated with the variables that appear in the computation form produce discrepancies of the residuals from zero. A technique aiming at the minimisation of the resulting false alarms rate, that is based on the explicit modelling of communication delays and on their best-case estimation is proposed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El fenómeno del terrorismo de carácter trasnacional,Especialmente aquel que hace referencia a la vertiente yihadista, ha despertado preocupación dentro de la comunidad internacional, específicamente dentro de aquellos centros de poder occidentales que se han visto vulnerados por algún tipo de acción llevada a cabo por grupos de esta índole. Organizaciones como Al–Qaeda, que mediante la concentración y labor de múltiples células vinculadas en su haber, operan y ejecutan acciones terroristas en varias regiones del mundo, son identificadas hoy en día, como una nueva amenaza no estatal dentro de los sistemas de seguridad occidentales. El caso español representa un claro ejemplo de la transnacionalización del terrorismo, en particular aquel que se denomina de carácter yihadista dentro de territorio europeo, puesto que es a partir de los atentados perpetuados en el metro de Madrid, que se activan las alarmas hacia el interior de la Unión Europea y se inician una serie de reformas pertinentes a enfrentar dicha amenaza dentro de los sistemas de seguridad de la mayoría de Estados miembros de la unión.De esta manera, y dentro del campo de estudio que ofrecen las Relaciones Internacionales, la amenaza que el terrorismo de carácter yihadista representa para la seguridad española, puede ser comprendida, a partir del análisis de elementos claves tales como: España como escenario directo de la amenaza terrorista, proximidad geográfica con las regiones del Mediterráneo, Magreb y Sahél, ideología de los grupos yihadistas y finamente la ampliación de la agenda de seguridad española a partir del 11-M, entre otros. Los alcances del terrorismo yihadista son definitivamente percibidos dentro de la comunidad internacional, de allí reside la importancia del estudio de la estrategia contra terrorista elaborada por España para combatir este fenómeno, puesto que no solo se encuentra al interior de su territorio sino además en las regiones aledañas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Los niveles de armamento nuclear existentes en el mundo, aun siguen siendo una grave amenaza para la paz y la seguridad mundial. Después de más de dos décadas de terminada la Guerra Fría los procesos de desarme nucleares no han sido satisfactorios, lo cual representa una peligro latente. Es así como la proliferación nuclear es una de las más grandes preocupaciones de los Estados en tanto que compromete la seguridad y la estabilidad internacional. Actualmente, las dinámicas nucleares han puesto en tela de juicio el mantenimiento de la paz y la seguridad. En particular, la compleja situación de Oriente Medio con el fortalecimiento del programa nuclear iraní que aparentemente busca el desarrollo de un programa de energía nuclear bélico, ha encendido las alarmas de todos los Estados. Analizar la situación de Oriente Medio enfocándose en la “no proliferación”, permite visibilizar la importancia de concentrar esfuerzos para evitar el renacimiento de los programas nucleares con fines militares en el mundo.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Investigations of memory deficits in older individuals have concentrated on their increased likelihood of forgetting events or details of events that were actually encountered (errors of omission). However mounting evidence demonstrates that normal cognitive aging also is associated with an increased propensity for errors of commission-shown in false alarms or false recognition. The present study examined the origins of this age difference. Older and younger adults each performed three types of memory tasks in which details of encountered items might influence performance. Although older adults showed greater false recognition of related lures on a standard (identical) old/new episodic recognition task, older and younger adults showed parallel effects of detail on repetition priming and meaning-based episodic recognition (decreased priming and decreased meaning-based recognition for different relative to same exemplars). The results suggest that the older adults encoded details but used them less effectively than the younger adults in the recognition context requiring their deliberate, controlled use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes. The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects. Implementation is achieved through development of a logic-based inference engine based on Prolog. Threat detection performance is conducted by testing against a range of datasets describing realistic situations and demonstrates a reduction in the number of false alarms generated. The proposed system represents the approach employed in the EU SUBITO project (Surveillance of Unattended Baggage and the Identification and Tracking of the Owner).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The quality control, validation and verification of the European Flood Alert System (EFAS) are described. EFAS is designed as a flood early warning system at pan-European scale, to complement national systems and provide flood warnings more than 2 days before a flood. On average 20–30 alerts per year are sent out to the EFAS partner network which consists of 24 National hydrological authorities responsible for transnational river basins. Quality control of the system includes the evaluation of the hits, misses and false alarms, showing that EFAS has more than 50% of the time hits. Furthermore, the skills of both the meteorological as well as the hydrological forecasts are evaluated, and are included here for a 10-year period. Next, end-user needs and feedback are systematically analysed. Suggested improvements, such as real-time river discharge updating, are currently implemented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The incorporation of numerical weather predictions (NWP) into a flood forecasting system can increase forecast lead times from a few hours to a few days. A single NWP forecast from a single forecast centre, however, is insufficient as it involves considerable non-predictable uncertainties and lead to a high number of false alarms. The availability of global ensemble numerical weather prediction systems through the THORPEX Interactive Grand Global Ensemble' (TIGGE) offers a new opportunity for flood forecast. The Grid-Xinanjiang distributed hydrological model, which is based on the Xinanjiang model theory and the topographical information of each grid cell extracted from the Digital Elevation Model (DEM), is coupled with ensemble weather predictions based on the TIGGE database (CMC, CMA, ECWMF, UKMO, NCEP) for flood forecast. This paper presents a case study using the coupled flood forecasting model on the Xixian catchment (a drainage area of 8826 km2) located in Henan province, China. A probabilistic discharge is provided as the end product of flood forecast. Results show that the association of the Grid-Xinanjiang model and the TIGGE database gives a promising tool for an early warning of flood events several days ahead.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Following trends in operational weather forecasting, where ensemble prediction systems (EPS) are now increasingly the norm, flood forecasters are beginning to experiment with using similar ensemble methods. Most of the effort to date has focused on the substantial technical challenges of developing coupled rainfall-runoff systems to represent the full cascade of uncertainties involved in predicting future flooding. As a consequence much less attention has been given to the communication and eventual use of EPS flood forecasts. Drawing on interviews and other research with operational flood forecasters from across Europe, this paper highlights a number of challenges to communicating and using ensemble flood forecasts operationally. It is shown that operational flood forecasters understand the skill, operational limitations, and informational value of EPS products in a variety of different and sometimes contradictory ways. Despite the efforts of forecasting agencies to design effective ways to communicate EPS forecasts to non-experts, operational flood forecasters were often skeptical about the ability of forecast recipients to understand or use them appropriately. It is argued that better training and closer contacts between operational flood forecasters and EPS system designers can help ensure the uncertainty represented by EPS forecasts is represented in ways that are most appropriate and meaningful for their intended consumers, but some fundamental political and institutional challenges to using ensembles, such as differing attitudes to false alarms and to responsibility for management of blame in the event of poor or mistaken forecasts are also highlighted. Copyright © 2010 Royal Meteorological Society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When using the digital halftone proofing systems, a closer print match can be achieved compared to what earlier couldbe done with the analogue proofing systems. These proofing systems possibilities to produce accurate print match canas well lead to producing bad print matches as several print related parameters can be adjusted manually in the systemby the user. Therefore, more advanced knowledge in graphic arts technology is required by the user of the system.The prepress company Colorcraft AB wishes to control that their color proofs always have the right quality. This projectwas started with the purpose to find a quality control metod for Colorcraft´s digital halftone proofing system(Kodak Approval XP4).Using a software who supports spectral measuring combined with a spectrophotometer and a control bar, a qualitycontrol system was assembled. This system detects variations that lies out of the proofing system´s natural deviation.The prerequisite for this quality control system is that the tolerances are defined with consideration taken to the proofingsystems natural deviations. Othervise the quality control system will generate unnecessecary false alarms and thereforenot be reliable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a system of systems approach to threat detection through integration of heterogeneous independently operable systems. The approach is presented on a realistic situation where a human-controlled base robot, swarm robot(s), and sensors work together to obtain a decision about a possible threat in the environment. The base robot is remotely operated by a human using a haptic control system. The swarm robot(s) are autonomous and can accept directives from the base robot. Finally, sensors directly communicate with (report to) the base robot. In this scenario, heterogeneous systems and human interact in a system of systems architecture. With the inclusion of human expert and sensor verification of swarm robots, the system can successfully perform the threat detection and reduce the false alarms. Finally, a system of systems simulation framework including a base robot, a swarm robot, and two sensors is presented in addition to an experimental evaluation of the proposed SoS architecture

Relevância:

10.00% 10.00%

Publicador:

Resumo:

DDoS attacks are one of the major threats to Internet services. Sophisticated hackers are mimicking the features of legitimate network events, such as flash crowds, to fly under the radar. This poses great challenges to detect DDoS attacks. In this paper, we propose an attack feature independent DDoS flooding attack detection method at local area networks. We employ flow entropy on local area network routers to supervise the network traffic and raise potential DDoS flooding attack alarms when the flow entropy drops significantly in a short period of time. Furthermore, information distance is employed to differentiate DDoS attacks from flash crowds. In general, the attack traffic of one DDoS flooding attack session is generated by many bots from one botnet, and all of these bots are executing the same attack program. As a result, the similarity among attack traffic should higher than that among flash crowds, which are generated by many random users. Mathematical models have been established for the proposed detection strategies. Analysis based on the models indicates that the proposed methods can raise the alarm for potential DDoS flooding attacks and can differentiate DDoS flooding attacks from flash crowds with conditions. The extensive experiments and simulations confirmed the effectiveness of our proposed detection strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study characterized exposure-monitoring activities and findings under the Occupational Safety and Health Administration's (OSHA's) 1984 ethylene oxide (EtO) standard. In-depth mail and telephone surveys were followed by on-site interviews at all EtO-using hospitals in Massachusetts (n = 92, 96% participation rate). By 1993, most hospitals had performed personal exposure monitoring for OSHA's 8-hour action level (95%) and the excursion limit (87%), although most did not meet the 1985 implementation deadline. In 1993, 66% of hospitals reported the installation of EtO alarms to fulfill the standard's "alert" requirement. Alarm installation also lagged behind the 1985 deadline and peaked following a series of EtO citations by OSHA. From 1990 through 1992, 23% of hospitals reported having exceeded the action level once or more; 24% reported having exceeded the excursion limit; and 33% reported that workers were accidentally exposed to EtO in the absence of personal monitoring. Almost a decade after passage of the EtO standard, exposure-monitoring requirements were widely, but not completely, implemented. Work-shift exposures had markedly decreased since the mid-1980s, but overexposures continued to occur widely. OSHA enforcement appears to have stimulated implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dynamically changing background (dynamic background) still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from the security industry either to detect and suppress these false alarms, or dampen the effects of background changes, so as to increase the sensitivity to meaningful events of interest. In this paper, we restrict our focus to one of the most common causes of dynamic background changes: 1) that of swaying tree branches and 2) their shadows under windy conditions. Considering the ultimate goal in a video analytics pipeline, we formulate a new dynamic background detection problem as a signal processing alternative to the previously described but unreliable computer vision-based approaches. Within this new framework, we directly reduce the number of false alarms by testing if the detected events are due to characteristic background motions. In addition, we introduce a new data set suitable for the evaluation of dynamic background detection. It consists of real-world events detected by a commercial surveillance system from two static surveillance cameras. The research question we address is whether dynamic background can be detected reliably and efficiently using simple motion features and in the presence of similar but meaningful events, such as loitering. Inspired by the tree aerodynamics theory, we propose a novel method named local variation persistence (LVP), that captures the key characteristics of swaying motions. The method is posed as a convex optimization problem, whose variable is the local variation. We derive a computationally efficient algorithm for solving the optimization problem, the solution of which is then used to form a powerful detection statistic. On our newly collected data set, we demonstrate that the proposed LVP achieves excellent detection results and outperforms the best alternative adapted from existing art in the dynamic background literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to investigate the acute physiological stress response to an emergency alarm and mobilization during the day and at night. Sixteen healthy males aged 25 ± 4 years (mean ± SD) spent four consecutive days and nights in a sleep laboratory. This research used a within-participants design with repeated measures for time, alarm condition (alarm or control), and trial (day or night). When an alarm sounded, participants were required to mobilize immediately. Saliva samples for cortisol analysis were collected 0 min, 15 min, 30 min, 45 min, 60 min, 90 min, and 120 min after mobilization, and at corresponding times in control conditions. Heart rate was measured continuously throughout the study. Heart rate was higher in the day (F20,442 = 9.140, P < 0.001) and night (F23,459 = 8.356, P < 0.001) alarm conditions compared to the respective control conditions. There was no difference in saliva cortisol between day alarm and day control conditions. Cortisol was higher (F6,183 = 2.450, P < 0.001) following the night alarm and mobilization compared to the night control condition. The magnitude of difference in cortisol between night control and night alarm conditions was greater (F6,174 = 4.071, P < 0.001) than the magnitude of difference between the day control and day alarm conditions. The augmented heart rate response to the day and night alarms supports previous observations in field settings. Variations in the cortisol responses between conditions across the day and night may relate to differences in participants' ability to interpret the alarm when sleeping versus when awake.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decades, the oil, gas and petrochemical industries have registered a series of huge accidents. Influenced by this context, companies have felt the necessity of engaging themselves in processes to protect the external environment, which can be understood as an ecological concern. In the particular case of the nuclear industry, sustainable education and training, which depend too much on the quality and applicability of the knowledge base, have been considered key points on the safely application of this energy source. As a consequence, this research was motivated by the use of the ontology concept as a tool to improve the knowledge management in a refinery, through the representation of a fuel gas sweetening plant, mixing many pieces of information associated with its normal operation mode. In terms of methodology, this research can be classified as an applied and descriptive research, where many pieces of information were analysed, classified and interpreted to create the ontology of a real plant. The DEA plant modeling was performed according to its process flow diagram, piping and instrumentation diagrams, descriptive documents of its normal operation mode, and the list of all the alarms associated to the instruments, which were complemented by a non-structured interview with a specialist in that plant operation. The ontology was verified by comparing its descriptive diagrams with the original plant documents and discussing with other members of the researchers group. All the concepts applied in this research can be expanded to represent other plants in the same refinery or even in other kind of industry. An ontology can be considered a knowledge base that, because of its formal representation nature, can be applied as one of the elements to develop tools to navigate through the plant, simulate its behavior, diagnose faults, among other possibilities