WorldWideScience

Sample records for prevent false alarms

  1. Production of sensitivity and false alarm rate

    International Nuclear Information System (INIS)

    Han Zijie; Kang Wu; Chu Chengsheng; Hao Fanhua; Liu Xiaoya; Cao Lin; Hu Yongbo; Gong Jian; Xiang Yongchun; Zhang Jianhua; Yang Xiangdong

    2007-01-01

    The false alarm rate and sensitivity in nuclear material monitoring system are affected by alarm principle. Two different alarm principles are studied with theory and experiment analysis in this paper. Our research shows that theory analysis and experiment result are accordant very much. This study provides technology support for designing better alarm principle in nuclear material monitoring system. (authors)

  2. Reducing false asystole alarms in intensive care.

    Science.gov (United States)

    Dekimpe, Remi; Heldt, Thomas

    2017-07-01

    High rates of false monitoring alarms in intensive care can desensitize staff and therefore pose a significant risk to patient safety. Like other critical arrhythmia alarms, asystole alarms require immediate attention by the care providers as a true asystole event can be acutely life threatening. Here, it is illustrated that most false asystole alarms can be attributed to poor signal quality, and we propose and evaluate an algorithm to identify data windows of poor signal quality and thereby help suppress false asystole alarms. The algorithm combines intuitive signal-quality features (degree of signal saturation and baseline wander) and information from other physiological signals that might be available. Algorithm training and testing was performed on the MIMIC II and 2015 PhysioNet/Computing in Cardiology Challenge databases, respectively. The algorithm achieved an alarm specificity of 81.0% and sensitivity of 95.4%, missing only one out of 22 true asystole alarms. On a separate neonatal data set, the algorithm was able to reject 89.7% (890 out of 992) of false asystole alarms while keeping all 22 true events. The results show that the false asystole alarm rate can be significantly reduced through basic signal quality evaluation.

  3. The false alarm at Forsmark March 6th 1986

    International Nuclear Information System (INIS)

    Hultaaker, Oe.

    1986-01-01

    118 households were interviewed by telephone. Additional interviews were made with the representatives of the nuclear plant, county alarming center, Radio Uppland and the authorities in question. Six out of ten households heard the false alarm. Less than one out of twenty believed that it was an alarm caused by real danger and seven out of ten think that there will be more false alarms. (G.B.)

  4. False Alarms and Overmonitoring: Major Factors in Alarm Fatigue Among Labor Nurses.

    Science.gov (United States)

    Simpson, Kathleen Rice; Lyndon, Audrey

    2018-06-08

    Nurses can be exposed to hundreds of alarms during their shift, contributing to alarm fatigue. The purposes were to explore similarities and differences in perceptions of clinical alarms by labor nurses caring for generally healthy women compared with perceptions of adult intensive care unit (ICU) and neonatal ICU nurses caring for critically ill patients and to seek nurses' suggestions for potential improvements. Nurses were asked via focus groups about the utility of clinical alarms from medical devices. There was consensus that false alarms and too many devices generating alarms contributed to alarm fatigue, and most alarms lacked clinical relevance. Nurses identified certain types of alarms that they responded to immediately, but the vast majority of the alarms did not contribute to their clinical assessment or planned nursing care. Monitoring only those patients who need it and only those physiologic values that are warranted, based on patient condition, may decrease alarm burden.

  5. Expert System Constant False Alarm Rate (CFAR) Processor

    National Research Council Canada - National Science Library

    Wicks, Michael C

    2006-01-01

    An artificial intelligence system improves radar signal processor performance by increasing target probability of detection and reducing probability of false alarm in a severe radar clutter environment...

  6. Assessment method to predict the rate of unresolved false alarms

    International Nuclear Information System (INIS)

    Reardon, P.T.; Eggers, R.F.; Heaberlin, S.W.

    1982-06-01

    A method has been developed to predict the rate of unresolved false alarms of material loss in a nuclear facility. The computer program DETRES-1 was developed. The program first assigns the true values of control unit components receipts, shipments, beginning and ending inventories. A normal random number generator is used to generate measured values of each component. A loss estimator is calculated from the control unit's measured values. If the loss estimator triggers a detection alarm, a response is simulated. The response simulation is divided into two phases. The first phase is to simulate remeasurement of the components of the detection loss estimator using the same or better measurement methods or inferences from surrounding control units. If this phase of response continues to indicate a material loss, phase of response simulating a production shutdown and comprehensive cleanout is initiated. A new loss estimator is found, and tested against the alarm thresholds. If the estimator value is below the threshold, the original detection alarm is considered resolved; if above the threshold, an unresolved alarm has occurred. A tally is kept of valid alarms, unresolved false alarms, and failure to alarm upon a true loss

  7. Patient characteristics associated with false arrhythmia alarms in intensive care

    Directory of Open Access Journals (Sweden)

    Harris PR

    2017-04-01

    Full Text Available Patricia R Harris,1,2 Jessica K Zègre-Hemsey,3,4 Daniel Schindler,5 Yong Bai,6 Michele M Pelter,2,7 Xiao Hu2,8 1Department of Nursing, School of Health and Natural Sciences, Dominican University of California, San Rafael, 2Department of Physiological Nursing, School of Nursing, University of California, San Francisco, CA, 3School of Nursing, 4Department of Emergency Medicine, School of Medicine, University of North Carolina at Chapel Hill, NC, 5Intensive Care Unit, The Neuroscience Center, Sutter Eden Medical Center, Castro Valley, 6Hu Research Laboratory, Department of Physiological Nursing, School of Nursing, University of California, San Francisco, 7ECG Monitoring Research Lab, Department of Physiological Nursing, School of Nursing, 8Physiological Nursing and Neurological Surgery, Affiliate Faculty of Institute for Computational Health Sciences Core Faculty UCB/UCSF Joint Bio-Engineering Graduate Program, University of California, San Francisco, CA, USA Introduction: A high rate of false arrhythmia alarms in the intensive care unit (ICU leads to alarm fatigue, the condition of desensitization and potentially inappropriate silencing of alarms due to frequent invalid and nonactionable alarms, often referred to as false alarms. Objective: The aim of this study was to identify patient characteristics, such as gender, age, body mass index, and diagnosis associated with frequent false arrhythmia alarms in the ICU. Methods: This descriptive, observational study prospectively enrolled patients who were consecutively admitted to one of five adult ICUs (77 beds at an urban medical center over a period of 31 days in 2013. All monitor alarms and continuous waveforms were stored on a secure server. Nurse scientists with expertise in cardiac monitoring used a standardized protocol to annotate six clinically important types of arrhythmia alarms (asystole, pause, ventricular fibrillation, ventricular tachycardia, accelerated ventricular rhythm, and

  8. Myocardial infarction false alarm: initial electrocardiogram and cardiac enzymes.

    Science.gov (United States)

    Gupta, Esha Das; Sakthiswary, Rajalingham

    2014-05-01

    The objectives of this study were to determine the incidence of a myocardial infarction "false alarm" and evaluate the efficacy of the initial electrocardiogram and cardiac enzymes in diagnosing myocardial infarction in Malaysia. We recruited patients who were admitted with suspected myocardial infarction from June to August 2008. The medical records of these patients were reviewed for the initial electrocardiogram, initial cardiac enzyme levels (creatinine kinase-MB and troponin T), and the final diagnosis upon discharge. The subjects were stratified into 2 groups: true myocardial infarction, and false alarm. 125 patients were enrolled in this study. Following admission and further evaluation, the diagnosis was revised from myocardial infarction to other medical conditions in 48 (38.4%) patients. The sensitivity and specificity of the initial ischemic electrocardiographic changes were 54.5% and 70.8%, respectively. Raised cardiac enzymes had a sensitivity of 44.3% and specificity of 95.8%. A significant proportion of patients in Malaysia are admitted with a false-alarm myocardial infarction. The efficacy of the electrocardiogram in diagnosing myocardial infarction in Malaysia was comparable to the findings of Western studies, but the cardiac enzymes had a much lower sensitivity.

  9. Statistical Study of False Alarms of Geomagnetic Storms

    DEFF Research Database (Denmark)

    Leer, Kristoffer; Vennerstrøm, Susanne; Veronig, A.

    . A subset of these halo CMEs did not cause a geomagnetic storm the following four days and have therefore been considered as false alarms. The properties of these events are investigated and discussed here. Their statistics are compared to the geo-effective CMEs. The ability to identify potential false......Coronal Mass Ejections (CMEs) are known to cause geomagnetic storms on Earth. However, not all CMEs will trigger geomagnetic storms, even if they are heading towards the Earth. In this study, front side halo CMEs with speed larger than 500 km/s have been identified from the SOHO LASCO catalogue...

  10. Reduction of false arrhythmia alarms using signal selection and machine learning

    NARCIS (Netherlands)

    Eerikäinen, L.M.; Vanschoren, J.; Rooijakkers, M.J.; Vullings, R.; Aarts, R.M.

    2016-01-01

    In this paper, we propose an algorithm that classifies whether a generated cardiac arrhythmia alarm is true or false. The large number of false alarms in intensive care is a severe issue. The noise peaks caused by alarms can be high and in a noisy environment nurses can experience stress and

  11. Decreasing the false alarm rate of arrhythmias in intensive care using a machine learning approach

    NARCIS (Netherlands)

    Eerikäinen, L.M.; Vanschoren, J.; Rooijakkers, M.J.; Vullings, R.; Aarts, R.M.

    2015-01-01

    We present a novel algorithm for classifying true and false alarms of five life-threatening arrhythmias in intensive care. This algorithm was entered in the PhysioNet/Computing in Cardiology Challenge 2015 Reducing False Arrhythmia Alarms in the ICU. The algorithm performs a binary classification of

  12. False alarms and incorrect rejections in an information security center: correlation with the frequency of incidents.

    Science.gov (United States)

    Bruno, Thiers; Abrahão, Julia

    2012-01-01

    This study examines the actions taken by operators aimed at preventing and combating information security incidents at a banking organization. The work utilizes the theoretical framework of ergonomics and cognitive psychology. The method is workplace ergonomic analysis. Its focus is directed towards examining the cognitive dimension of the work environment with special attention to the occurrence of correlations between variability in incident frequency and the results of sign detection actions. It categorizes 45,142 operator decisions according to the theory of signal detection (Sternberg, 2000). It analyzes the correlation between incident proportions (indirectly associated with the cognitive efforts demanded from the operator) and operator decisions. The study demonstrated the existence of a positive correlation between incident proportions and false positive decisions (false alarms). However, this correlation could not be observed in relation to decisions of the false-negative type (incorrect rejection).

  13. Neural Network Target Identification System for False Alarm Reduction

    Science.gov (United States)

    Ye, David; Edens, Weston; Lu, Thomas T.; Chao, Tien-Hsin

    2009-01-01

    A multi-stage automated target recognition (ATR) system has been designed to perform computer vision tasks with adequate proficiency in mimicking human vision. The system is able to detect, identify, and track targets of interest. Potential regions of interest (ROIs) are first identified by the detection stage using an Optimum Trade-off Maximum Average Correlation Height (OT-MACH) filter combined with a wavelet transform. False positives are then eliminated by the verification stage using feature extraction methods in conjunction with neural networks. Feature extraction transforms the ROIs using filtering and binning algorithms to create feature vectors. A feed forward back propagation neural network (NN) is then trained to classify each feature vector and remove false positives. This paper discusses the test of the system performance and parameter optimizations process which adapts the system to various targets and datasets. The test results show that the system was successful in substantially reducing the false positive rate when tested on a sonar image dataset.

  14. False alarm reduction in BSN-based cardiac monitoring using signal quality and activity type information.

    Science.gov (United States)

    Tanantong, Tanatorn; Nantajeewarawat, Ekawit; Thiemjarus, Surapa

    2015-02-09

    False alarms in cardiac monitoring affect the quality of medical care, impacting on both patients and healthcare providers. In continuous cardiac monitoring using wireless Body Sensor Networks (BSNs), the quality of ECG signals can be deteriorated owing to several factors, e.g., noises, low battery power, and network transmission problems, often resulting in high false alarm rates. In addition, body movements occurring from activities of daily living (ADLs) can also create false alarms. This paper presents a two-phase framework for false arrhythmia alarm reduction in continuous cardiac monitoring, using signals from an ECG sensor and a 3D accelerometer. In the first phase, classification models constructed using machine learning algorithms are used for labeling input signals. ECG signals are labeled with heartbeat types and signal quality levels, while 3D acceleration signals are labeled with ADL types. In the second phase, a rule-based expert system is used for combining classification results in order to determine whether arrhythmia alarms should be accepted or suppressed. The proposed framework was validated on datasets acquired using BSNs and the MIT-BIH arrhythmia database. For the BSN dataset, acceleration and ECG signals were collected from 10 young and 10 elderly subjects while they were performing ADLs. The framework reduced the false alarm rate from 9.58% to 1.43% in our experimental study, showing that it can potentially assist physicians in diagnosing a vast amount of data acquired from wireless sensors and enhance the performance of continuous cardiac monitoring.

  15. False Alarm Reduction in BSN-Based Cardiac Monitoring Using Signal Quality and Activity Type Information

    Directory of Open Access Journals (Sweden)

    Tanatorn Tanantong

    2015-02-01

    Full Text Available False alarms in cardiac monitoring affect the quality of medical care, impacting on both patients and healthcare providers. In continuous cardiac monitoring using wireless Body Sensor Networks (BSNs, the quality of ECG signals can be deteriorated owing to several factors, e.g., noises, low battery power, and network transmission problems, often resulting in high false alarm rates. In addition, body movements occurring from activities of daily living (ADLs can also create false alarms. This paper presents a two-phase framework for false arrhythmia alarm reduction in continuous cardiac monitoring, using signals from an ECG sensor and a 3D accelerometer. In the first phase, classification models constructed using machine learning algorithms are used for labeling input signals. ECG signals are labeled with heartbeat types and signal quality levels, while 3D acceleration signals are labeled with ADL types. In the second phase, a rule-based expert system is used for combining classification results in order to determine whether arrhythmia alarms should be accepted or suppressed. The proposed framework was validated on datasets acquired using BSNs and the MIT-BIH arrhythmia database. For the BSN dataset, acceleration and ECG signals were collected from 10 young and 10 elderly subjects while they were performing ADLs. The framework reduced the false alarm rate from 9.58% to 1.43% in our experimental study, showing that it can potentially assist physicians in diagnosing a vast amount of data acquired from wireless sensors and enhance the performance of continuous cardiac monitoring.

  16. Game Theoretic Approach for Systematic Feature Selection; Application in False Alarm Detection in Intensive Care Units

    Directory of Open Access Journals (Sweden)

    Fatemeh Afghah

    2018-03-01

    Full Text Available Intensive Care Units (ICUs are equipped with many sophisticated sensors and monitoring devices to provide the highest quality of care for critically ill patients. However, these devices might generate false alarms that reduce standard of care and result in desensitization of caregivers to alarms. Therefore, reducing the number of false alarms is of great importance. Many approaches such as signal processing and machine learning, and designing more accurate sensors have been developed for this purpose. However, the significant intrinsic correlation among the extracted features from different sensors has been mostly overlooked. A majority of current data mining techniques fail to capture such correlation among the collected signals from different sensors that limits their alarm recognition capabilities. Here, we propose a novel information-theoretic predictive modeling technique based on the idea of coalition game theory to enhance the accuracy of false alarm detection in ICUs by accounting for the synergistic power of signal attributes in the feature selection stage. This approach brings together techniques from information theory and game theory to account for inter-features mutual information in determining the most correlated predictors with respect to false alarm by calculating Banzhaf power of each feature. The numerical results show that the proposed method can enhance classification accuracy and improve the area under the ROC (receiver operating characteristic curve compared to other feature selection techniques, when integrated in classifiers such as Bayes-Net that consider inter-features dependencies.

  17. Changes are detected - cameras and video systems are monitoring the plant site, only rarely giving false alarm

    International Nuclear Information System (INIS)

    Zeissler, H.

    1988-01-01

    The main purpose of automatic data acquisition and processing for monitoring goals is to relieve the security personnel from monotonous observation tasks. The novel video systems can be programmed to detect moving target alarm signals, or accept alarm-suppressing image changes. This allows an intelligent alarm evaluation for physical protection in industry, differentiating between real and false alarm signals. (orig.) [de

  18. AN APPROACH TO ALLEVIATE THE FALSE ALARM IN BUILDING CHANGE DETECTION FROM URBAN VHR IMAGE

    Directory of Open Access Journals (Sweden)

    J. Chen

    2016-06-01

    Full Text Available Building change detection from very-high-resolution (VHR urban remote sensing image frequently encounter the challenge of serious false alarm caused by different illumination or viewing angles in bi-temporal images. An approach to alleviate the false alarm in urban building change detection is proposed in this paper. Firstly, as shadows casted by urban buildings are of distinct spectral and shape feature, it adopts a supervised object-based classification technique to extract them in this paper. Secondly, on the opposite direction of sunlight illumination, a straight line is drawn along the principal orientation of building in every extracted shadow region. Starting from the straight line and moving toward the sunlight direction, a rectangular area is constructed to cover partial shadow and rooftop of each building. Thirdly, an algebra and geometry invariant based method is used to abstract the spatial topological relationship of the potential unchanged buildings from all central points of the rectangular area. Finally, based on an oriented texture curvature descriptor, an index is established to determine the actual false alarm in building change detection result. The experiment results validate that the proposed method can be used as an effective framework to alleviate the false alarm in building change detection from urban VHR image.

  19. Manifold adaptation for constant false alarm rate ship detection in South African oceans

    CSIR Research Space (South Africa)

    Schwegmann, CP

    2015-04-01

    Full Text Available prescreening method. It uses a scalar threshold value to determine how bright a pixel needs to be in order to be classified as a ship and thus inversely how many false alarms are permitted. This paper presents by a method of converting the scalar threshold...

  20. Detection of exudates in fundus imagery using a constant false-alarm rate (CFAR) detector

    Science.gov (United States)

    Khanna, Manish; Kapoor, Elina

    2014-05-01

    Diabetic retinopathy is the leading cause of blindness in adults in the United States. The presence of exudates in fundus imagery is the early sign of diabetic retinopathy so detection of these lesions is essential in preventing further ocular damage. In this paper we present a novel technique to automatically detect exudates in fundus imagery that is robust against spatial and temporal variations of background noise. The detection threshold is adjusted dynamically, based on the local noise statics around the pixel under test in order to maintain a pre-determined, constant false alarm rate (CFAR). The CFAR detector is often used to detect bright targets in radar imagery where the background clutter can vary considerably from scene to scene and with angle to the scene. Similarly, the CFAR detector addresses the challenge of detecting exudate lesions in RGB and multispectral fundus imagery where the background clutter often exhibits variations in brightness and texture. These variations present a challenge to common, global thresholding detection algorithms and other methods. Performance of the CFAR algorithm is tested against a publicly available, annotated, diabetic retinopathy database and preliminary testing suggests that performance of the CFAR detector proves to be superior to techniques such as Otsu thresholding.

  1. Multiple-Parameter, Low-False-Alarm Fire-Detection Systems

    Science.gov (United States)

    Hunter, Gary W.; Greensburg, Paul; McKnight, Robert; Xu, Jennifer C.; Liu, C. C.; Dutta, Prabir; Makel, Darby; Blake, D.; Sue-Antillio, Jill

    2007-01-01

    Fire-detection systems incorporating multiple sensors that measure multiple parameters are being developed for use in storage depots, cargo bays of ships and aircraft, and other locations not amenable to frequent, direct visual inspection. These systems are intended to improve upon conventional smoke detectors, now used in such locations, that reliably detect fires but also frequently generate false alarms: for example, conventional smoke detectors based on the blockage of light by smoke particles are also affected by dust particles and water droplets and, thus, are often susceptible to false alarms. In contrast, by utilizing multiple parameters associated with fires, i.e. not only obscuration by smoke particles but also concentrations of multiple chemical species that are commonly generated in combustion, false alarms can be significantly decreased while still detecting fires as reliably as older smoke-detector systems do. The present development includes fabrication of sensors that have, variously, micrometer- or nanometer-sized features so that such multiple sensors can be integrated into arrays that have sizes, weights, and power demands smaller than those of older macroscopic sensors. The sensors include resistors, electrochemical cells, and Schottky diodes that exhibit different sensitivities to the various airborne chemicals of interest. In a system of this type, the sensor readings are digitized and processed by advanced signal-processing hardware and software to extract such chemical indications of fires as abnormally high concentrations of CO and CO2, possibly in combination with H2 and/or hydrocarbons. The system also includes a microelectromechanical systems (MEMS)-based particle detector and classifier device to increase the reliability of measurements of chemical species and particulates. In parallel research, software for modeling the evolution of a fire within an aircraft cargo bay has been developed. The model implemented in the software can

  2. Multi-temporal change image inference towards false alarms reduction for an operational photogrammetric rockfall detection system

    Science.gov (United States)

    Partsinevelos, Panagiotis; Kallimani, Christina; Tripolitsiotis, Achilleas

    2015-06-01

    Rockfall incidents affect civil security and hamper the sustainable growth of hard to access mountainous areas due to casualties, injuries and infrastructure loss. Rockfall occurrences cannot be easily prevented, whereas previous studies for rockfall multiple sensor early detection systems have focused on large scale incidents. However, even a single rock may cause the loss of a human life along transportation routes thus, it is highly important to establish methods for the early detection of small-scale rockfall incidents. Terrestrial photogrammetric techniques are prone to a series of errors leading to false alarm incidents, including vegetation, wind, and non relevant change in the scene under consideration. In this study, photogrammetric monitoring of rockfall prone slopes is established and the resulting multi-temporal change imagery is processed in order to minimize false alarm incidents. Integration of remote sensing imagery analysis techniques is hereby applied to enhance early detection of a rockfall. Experimental data demonstrated that an operational system able to identify a 10-cm rock movement within a 10% false alarm rate is technically feasible.

  3. Taming of the monitors: reducing false alarms in intensive care units

    Czech Academy of Sciences Publication Activity Database

    Plešinger, Filip; Klimeš, Petr; Halámek, Josef; Jurák, Pavel

    2016-01-01

    Roč. 37, č. 8 (2016), s. 1313-1325 ISSN 0967-3334 R&D Projects: GA ČR GAP102/12/2034; GA MŠk(CZ) LO1212; GA MŠk ED0017/01/01 Institutional support: RVO:68081731 Keywords : ECG * critical care * arrhythmia * intensive care unit * ICU monitor * false alarm * beat detection Subject RIV: FS - Medical Facilities ; Equipment Impact factor: 2.058, year: 2016

  4. Controlling misses and false alarms in a machine learning framework for predicting uniformity of printed pages

    Science.gov (United States)

    Nguyen, Minh Q.; Allebach, Jan P.

    2015-01-01

    In our previous work1 , we presented a block-based technique to analyze printed page uniformity both visually and metrically. The features learned from the models were then employed in a Support Vector Machine (SVM) framework to classify the pages into one of the two categories of acceptable and unacceptable quality. In this paper, we introduce a set of tools for machine learning in the assessment of printed page uniformity. This work is primarily targeted to the printing industry, specifically the ubiquitous laser, electrophotographic printer. We use features that are well-correlated with the rankings of expert observers to develop a novel machine learning framework that allows one to achieve the minimum "false alarm" rate, subject to a chosen "miss" rate. Surprisingly, most of the research that has been conducted on machine learning does not consider this framework. During the process of developing a new product, test engineers will print hundreds of test pages, which can be scanned and then analyzed by an autonomous algorithm. Among these pages, most may be of acceptable quality. The objective is to find the ones that are not. These will provide critically important information to systems designers, regarding issues that need to be addressed in improving the printer design. A "miss" is defined to be a page that is not of acceptable quality to an expert observer that the prediction algorithm declares to be a "pass". Misses are a serious problem, since they represent problems that will not be seen by the systems designers. On the other hand, "false alarms" correspond to pages that an expert observer would declare to be of acceptable quality, but which are flagged by the prediction algorithm as "fails". In a typical printer testing and development scenario, such pages would be examined by an expert, and found to be of acceptable quality after all. "False alarm" pages result in extra pages to be examined by expert observers, which increases labor cost. But "false

  5. Global parameter optimization for maximizing radioisotope detection probabilities at fixed false alarm rates

    Energy Technology Data Exchange (ETDEWEB)

    Portnoy, David, E-mail: david.portnoy@jhuapl.edu [Johns Hopkins University Applied Physics Laboratory, 11100 Johns Hopkins Road, Laurel, MD 20723 (United States); Feuerbach, Robert; Heimberg, Jennifer [Johns Hopkins University Applied Physics Laboratory, 11100 Johns Hopkins Road, Laurel, MD 20723 (United States)

    2011-10-01

    Today there is a tremendous amount of interest in systems that can detect radiological or nuclear threats. Many of these systems operate in extremely high throughput situations where delays caused by false alarms can have a significant negative impact. Thus, calculating the tradeoff between detection rates and false alarm rates is critical for their successful operation. Receiver operating characteristic (ROC) curves have long been used to depict this tradeoff. The methodology was first developed in the field of signal detection. In recent years it has been used increasingly in machine learning and data mining applications. It follows that this methodology could be applied to radiological/nuclear threat detection systems. However many of these systems do not fit into the classic principles of statistical detection theory because they tend to lack tractable likelihood functions and have many parameters, which, in general, do not have a one-to-one correspondence with the detection classes. This work proposes a strategy to overcome these problems by empirically finding parameter values that maximize the probability of detection for a selected number of probabilities of false alarm. To find these parameter values a statistical global optimization technique that seeks to estimate portions of a ROC curve is proposed. The optimization combines elements of simulated annealing with elements of genetic algorithms. Genetic algorithms were chosen because they can reduce the risk of getting stuck in local minima. However classic genetic algorithms operate on arrays of Booleans values or bit strings, so simulated annealing is employed to perform mutation in the genetic algorithm. The presented initial results were generated using an isotope identification algorithm developed at Johns Hopkins University Applied Physics Laboratory. The algorithm has 12 parameters: 4 real-valued and 8 Boolean. A simulated dataset was used for the optimization study; the 'threat' set of

  6. Global parameter optimization for maximizing radioisotope detection probabilities at fixed false alarm rates

    International Nuclear Information System (INIS)

    Portnoy, David; Feuerbach, Robert; Heimberg, Jennifer

    2011-01-01

    Today there is a tremendous amount of interest in systems that can detect radiological or nuclear threats. Many of these systems operate in extremely high throughput situations where delays caused by false alarms can have a significant negative impact. Thus, calculating the tradeoff between detection rates and false alarm rates is critical for their successful operation. Receiver operating characteristic (ROC) curves have long been used to depict this tradeoff. The methodology was first developed in the field of signal detection. In recent years it has been used increasingly in machine learning and data mining applications. It follows that this methodology could be applied to radiological/nuclear threat detection systems. However many of these systems do not fit into the classic principles of statistical detection theory because they tend to lack tractable likelihood functions and have many parameters, which, in general, do not have a one-to-one correspondence with the detection classes. This work proposes a strategy to overcome these problems by empirically finding parameter values that maximize the probability of detection for a selected number of probabilities of false alarm. To find these parameter values a statistical global optimization technique that seeks to estimate portions of a ROC curve is proposed. The optimization combines elements of simulated annealing with elements of genetic algorithms. Genetic algorithms were chosen because they can reduce the risk of getting stuck in local minima. However classic genetic algorithms operate on arrays of Booleans values or bit strings, so simulated annealing is employed to perform mutation in the genetic algorithm. The presented initial results were generated using an isotope identification algorithm developed at Johns Hopkins University Applied Physics Laboratory. The algorithm has 12 parameters: 4 real-valued and 8 Boolean. A simulated dataset was used for the optimization study; the 'threat' set of spectra

  7. Global parameter optimization for maximizing radioisotope detection probabilities at fixed false alarm rates

    Science.gov (United States)

    Portnoy, David; Feuerbach, Robert; Heimberg, Jennifer

    2011-10-01

    Today there is a tremendous amount of interest in systems that can detect radiological or nuclear threats. Many of these systems operate in extremely high throughput situations where delays caused by false alarms can have a significant negative impact. Thus, calculating the tradeoff between detection rates and false alarm rates is critical for their successful operation. Receiver operating characteristic (ROC) curves have long been used to depict this tradeoff. The methodology was first developed in the field of signal detection. In recent years it has been used increasingly in machine learning and data mining applications. It follows that this methodology could be applied to radiological/nuclear threat detection systems. However many of these systems do not fit into the classic principles of statistical detection theory because they tend to lack tractable likelihood functions and have many parameters, which, in general, do not have a one-to-one correspondence with the detection classes. This work proposes a strategy to overcome these problems by empirically finding parameter values that maximize the probability of detection for a selected number of probabilities of false alarm. To find these parameter values a statistical global optimization technique that seeks to estimate portions of a ROC curve is proposed. The optimization combines elements of simulated annealing with elements of genetic algorithms. Genetic algorithms were chosen because they can reduce the risk of getting stuck in local minima. However classic genetic algorithms operate on arrays of Booleans values or bit strings, so simulated annealing is employed to perform mutation in the genetic algorithm. The presented initial results were generated using an isotope identification algorithm developed at Johns Hopkins University Applied Physics Laboratory. The algorithm has 12 parameters: 4 real-valued and 8 Boolean. A simulated dataset was used for the optimization study; the "threat" set of spectra

  8. A False Alarm Reduction Method for a Gas Sensor Based Electronic Nose

    Directory of Open Access Journals (Sweden)

    Mohammad Mizanur Rahman

    2017-09-01

    Full Text Available Electronic noses (E-Noses are becoming popular for food and fruit quality assessment due to their robustness and repeated usability without fatigue, unlike human experts. An E-Nose equipped with classification algorithms and having open ended classification boundaries such as the k-nearest neighbor (k-NN, support vector machine (SVM, and multilayer perceptron neural network (MLPNN, are found to suffer from false classification errors of irrelevant odor data. To reduce false classification and misclassification errors, and to improve correct rejection performance; algorithms with a hyperspheric boundary, such as a radial basis function neural network (RBFNN and generalized regression neural network (GRNN with a Gaussian activation function in the hidden layer should be used. The simulation results presented in this paper show that GRNN has more correct classification efficiency and false alarm reduction capability compared to RBFNN. As the design of a GRNN and RBFNN is complex and expensive due to large numbers of neuron requirements, a simple hyperspheric classification method based on minimum, maximum, and mean (MMM values of each class of the training dataset was presented. The MMM algorithm was simple and found to be fast and efficient in correctly classifying data of training classes, and correctly rejecting data of extraneous odors, and thereby reduced false alarms.

  9. Probabilities of False Alarm for Vital Sign Detection on the Basis of a Doppler Radar System

    Directory of Open Access Journals (Sweden)

    Nguyen Thi Phuoc Van

    2018-02-01

    Full Text Available Vital detection on the basis of Doppler radars has drawn a great deal of attention from researchers because of its high potential for applications in biomedicine, surveillance, and finding people alive under debris during natural hazards. In this research, the signal-to-noise ratio (SNR of the remote vital-sign detection system is investigated. On the basis of different types of noise, such as phase noise, Gaussian noise, leakage noise between the transmitting and receiving antennae, and so on, the SNR of the system has first been examined. Then the research has focused on the investigation of the detection and false alarm probabilities of the system when the transmission link between the human and the radar sensor system took the Nakagami-m channel model. The analytical model for the false alarm and the detection probabilities of the system have been derived. The proposed theoretical models for the SNR and detection probability match with the simulation and measurement results. These theoretical models have the potential to be used as good references for the hardware development of the vital-sign detection radar sensor system.

  10. A false-alarm aware methodology to develop robust and efficient multi-scale infrared small target detection algorithm

    Science.gov (United States)

    Moradi, Saed; Moallem, Payman; Sabahi, Mohamad Farzan

    2018-03-01

    False alarm rate and detection rate are still two contradictory metrics for infrared small target detection in an infrared search and track system (IRST), despite the development of new detection algorithms. In certain circumstances, not detecting true targets is more tolerable than detecting false items as true targets. Hence, considering background clutter and detector noise as the sources of the false alarm in an IRST system, in this paper, a false alarm aware methodology is presented to reduce false alarm rate while the detection rate remains undegraded. To this end, advantages and disadvantages of each detection algorithm are investigated and the sources of the false alarms are determined. Two target detection algorithms having independent false alarm sources are chosen in a way that the disadvantages of the one algorithm can be compensated by the advantages of the other one. In this work, multi-scale average absolute gray difference (AAGD) and Laplacian of point spread function (LoPSF) are utilized as the cornerstones of the desired algorithm of the proposed methodology. After presenting a conceptual model for the desired algorithm, it is implemented through the most straightforward mechanism. The desired algorithm effectively suppresses background clutter and eliminates detector noise. Also, since the input images are processed through just four different scales, the desired algorithm has good capability for real-time implementation. Simulation results in term of signal to clutter ratio and background suppression factor on real and simulated images prove the effectiveness and the performance of the proposed methodology. Since the desired algorithm was developed based on independent false alarm sources, our proposed methodology is expandable to any pair of detection algorithms which have different false alarm sources.

  11. Intelligent software solution for reliable high efficiency/low false alarm border monitoring

    International Nuclear Information System (INIS)

    Rieck, W.; Iwatschenko, M.

    2001-01-01

    Full text: Radioactivity Monitoring at border stations requires detection systems that are reliably operating under special conditions such as: different types and shapes of vehicles; different velocities; stop and go traffic. ESM has developed a solution that achieves under all such conditions the lowest possible detection limit and avoids false alarms generated by naturally occurring radioactive material (NORM). NBR (Natural Background Reduction) data evaluation - One of the main reasons for the success of the ESM gate monitors is the unique and proprietary NBR-technology of instantaneous discrimination of artificial and natural gamma radiation using large area plastic scintillators. Thus the FHT 1388 gate monitors show 2 unique features: Possible setting of different alarm levels for NORM and artificial gamma sources; Self adjusting compensation of the background shielding of the truck in respect to the detection of artificial sources. Both properties are a preposition for the highly sensitive detection of artificial gamma sources. While at scrap yards and steel mills usually all radioactivity (including NORM) must be detected, the main object of interest in respect to the measuring task at border stations, airports or harbours is clearly the detection of even very small signals of artificial radioactivity. The reliable rejection of the influence of natural radioactivity is of special importance in the case of detection of illicit trafficking, since construction material, fertilisers or soil often lead to much higher detector signals than the alarming levels for dangerous sources of interest. Beside the varying content of natural radioactivity in the load of a truck, different loads and trucks show different influence on the reduction of the ambient radiation due to the passing vehicle. Thus software approaches assuming a specific reduction of the background count rate (regarding relative magnitude and shape) must fail when trucks of different shape and load

  12. Semantic similarity between old and new items produces false alarms in recognition memory.

    Science.gov (United States)

    Montefinese, Maria; Zannino, Gian Daniele; Ambrosini, Ettore

    2015-09-01

    In everyday life, human beings can report memories of past events that did not occur or that occurred differently from the way they remember them because memory is an imperfect process of reconstruction and is prone to distortion and errors. In this recognition study using word stimuli, we investigated whether a specific operationalization of semantic similarity among concepts can modulate false memories while controlling for the possible effect of associative strength and word co-occurrence in an old-new recognition task. The semantic similarity value of each new concept was calculated as the mean cosine similarity between pairs of vectors representing that new concept and each old concept belonging to the same semantic category. Results showed that, compared with (new) low-similarity concepts, (new) high-similarity concepts had significantly higher probability of being falsely recognized as old, even after partialling out the effect of confounding variables, including associative relatedness and lexical co-occurrence. This finding supports the feature-based view of semantic memory, suggesting that meaning overlap and sharing of semantic features (which are greater when more similar semantic concepts are being processed) have an influence on recognition performance, resulting in more false alarms for new high-similarity concepts. We propose that the associative strength and word co-occurrence among concepts are not sufficient to explain illusory memories but is important to take into account also the effects of feature-based semantic relations, and, in particular, the semantic similarity among concepts.

  13. Revisiting the false alarm in the 2014 El Niño prediction

    Science.gov (United States)

    Shin, C. S.; Huang, B.

    2016-12-01

    In early 2014, most dynamic forecast models predicted a developing strong El Niño in the following winter. However, this forecast turned out to be a representative case of the false alarms since 2000. In this study, a set of CFSv2 ensemble seasonal reforecast is conducted to examine some possible causes of the unrealistic El Niño prediction in 2014. Zooming in on the NINO3.4 index, the ensemble-mean reforecast initialized in April 2014 predicted a very strong El Niño as the 1997-98 one with most ensemble members warmer than the observations. In contrast, the ensemble-mean reforecast initialized in January (July) 2014 predicted a slower growth (a decline) of the NINO3.4 index for 12-month lead (from November to the spring in 2015), with the spreads of the ensemble members enveloping the observations. Since the observed SST anomalies in equatorial eastern Pacific changed its polarity in late March from the coldest SST anomalies in February accompanied by strong easterly wind to warmer SST in mid April, the atmospheric and oceanic instantaneous initial states in early April 2014 may misrepresent these intra-seasonal variations, possibly resulting in warm bias in equatorial Pacific even at 0-month lead. Our experiments show that colder ocean surface initial conditions in tropical eastern Pacific tend to hinder developing warm SST anomalies in equatorial eastern Pacific and weaken the Bjerknes-type air-sea feedback in the summer of 2014, which reduce excessive westerly wind (warm SST anomalies) in equatorial western Pacific (near the Dateline) and decrease the air-sea feedback. As a result, the predicted amplitude of NINO3.4 at the peak phase is comparable to the observed one, suggesting that the initial condition errors are partially responsible for the false alarm in the 2014 El Niño prediction issued in the spring. Nonetheless, the initial condition errors could not account for easterly wind burst observed in mid June associated with enhanced extratropical anti

  14. Life-threatening false alarm rejection in ICU: using the rule-based and multi-channel information fusion method.

    Science.gov (United States)

    Liu, Chengyu; Zhao, Lina; Tang, Hong; Li, Qiao; Wei, Shoushui; Li, Jianqing

    2016-08-01

    False alarm (FA) rates as high as 86% have been reported in intensive care unit monitors. High FA rates decrease quality of care by slowing staff response times while increasing patient burdens and stresses. In this study, we proposed a rule-based and multi-channel information fusion method for accurately classifying the true or false alarms for five life-threatening arrhythmias: asystole (ASY), extreme bradycardia (EBR), extreme tachycardia (ETC), ventricular tachycardia (VTA) and ventricular flutter/fibrillation (VFB). The proposed method consisted of five steps: (1) signal pre-processing, (2) feature detection and validation, (3) true/false alarm determination for each channel, (4) 'real-time' true/false alarm determination and (5) 'retrospective' true/false alarm determination (if needed). Up to four signal channels, that is, two electrocardiogram signals, one arterial blood pressure and/or one photoplethysmogram signal were included in the analysis. Two events were set for the method validation: event 1 for 'real-time' and event 2 for 'retrospective' alarm classification. The results showed that 100% true positive ratio (i.e. sensitivity) on the training set were obtained for ASY, EBR, ETC and VFB types, and 94% for VTA type, accompanied by the corresponding true negative ratio (i.e. specificity) results of 93%, 81%, 78%, 85% and 50% respectively, resulting in the score values of 96.50, 90.70, 88.89, 92.31 and 64.90, as well as with a final score of 80.57 for event 1 and 79.12 for event 2. For the test set, the proposed method obtained the score of 88.73 for ASY, 77.78 for EBR, 89.92 for ETC, 67.74 for VFB and 61.04 for VTA types, with the final score of 71.68 for event 1 and 75.91 for event 2.

  15. False alarms and mine seismicity: An example from the Gentry Mountain mining region, Utah

    International Nuclear Information System (INIS)

    Taylor, S.R.

    1992-01-01

    Mining regions are a cause of concern for monitoring of nuclear test ban treaties because they present the opportunity for clandestine nuclear tests (i.e. decoupled explosions). Mining operations are often characterized by high seismicity rates and can provide the cover for excavating voids for decoupling. Chemical explosions (seemingly as part of normal mining activities) can be used to complicate the signals from a simultaneous decoupled nuclear explosion. Thus, most concern about mines has dealt with the issue of missed violations to a test ban treaty. In this study, we raise the diplomatic concern of false alarms associated with mining activities. Numerous reports and papers have been published about anomalous seismicity associated with mining activities. As part of a large discrimination study in the western US (Taylor et al., 1989), we had one earthquake that was consistently classified as an explosion. The magnitude 3.5 disturbance occurred on May 14, 1981 and was conspicuous in its lack of Love waves, relative lack of high- frequency energy, low Lg/Pg ratio, and high m b - M s . A moment-tensor solution by Patton and Zandt (1991) indicated the event had a large implosional component. The event occurred in the Gentry Mountain coal mining region in the eastern Wasatch Plateau, Utah. Using a simple source representation, we modeled the event as a tabular excavation collapse that occurred as a result of normal mining activities. This study raises the importance of having a good catalogue of seismic data and information about mining activities from potential proliferant nations

  16. Lifelong opioidergic vulnerability through early life separation: a recent extension of the false suffocation alarm theory of panic disorder.

    Science.gov (United States)

    Preter, Maurice; Klein, Donald F

    2014-10-01

    The present paper is the edited version of our presentations at the "First World Symposium On Translational Models Of Panic Disorder", in Vitoria, E.S., Brazil, on November 16-18, 2012. We also review relevant work that appeared after the conference. Suffocation-False Alarm Theory (Klein, 1993) postulates the existence of an evolved physiologic suffocation alarm system that monitors information about potential suffocation. Panic attacks maladaptively occur when the alarm is erroneously triggered. The expanded Suffocation-False Alarm Theory (Preter and Klein, 2008) hypothesizes that endogenous opioidergic dysregulation may underlie the respiratory pathophysiology and suffocation sensitivity in panic disorder. Opioidergic dysregulation increases sensitivity to CO2, separation distress and panic attacks. That sudden loss, bereavement and childhood separation anxiety are also antecedents of "spontaneous" panic requires an integrative explanation. Our work unveiling the lifelong endogenous opioid system impairing effects of childhood parental loss (CPL) and parental separation in non-ill, normal adults opens a new experimental, investigatory area. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Both differences in encoding processes and monitoring at retrieval reduce false alarms when distinctive information is studied.

    Science.gov (United States)

    Hanczakowski, Maciej; Mazzoni, Giuliana

    2011-04-01

    A reduction in false alarms to critical lures is observed in the DRM paradigm (Roediger & McDermott, 1995) when distinctive information is presented at encoding. Two mechanisms have been proposed to account for this reduction. According to the monitoring theory (e.g., the distinctiveness heuristic), lack of diagnostic recollection serves as a basis for discarding non-presented lures. According to the encoding theory, presenting distinctive information at study leads to impoverished relational processing, which results in a reduction in memorial information elicited by critical lures. In the present study a condition was created in which the use of the distinctiveness heuristic was precluded by associating, within the same study, lures with distinctive information in a context different from the study session. Under that condition reduction in false alarms to distinctive critical lures was still observed. This result supports the predictions of the encoding theory. However, when in the same study the use of the distinctiveness heuristic was not precluded, reductions in false alarms to unrelated lures were also observed when distinctive information was presented at study, indicating that both mechanisms are likely to contribute to the rejection of false memories.

  18. Cancer prevention and control: alarming challenges in China.

    Science.gov (United States)

    Bode, Ann M; Dong, Zigang; Wang, Hongyang

    2016-03-01

    China is geographically the third largest country in the world and the most populated low-to-middle-income country. Cancer incidence and mortality rates for some cancers in the USA and European countries have steadily decreased over the last decades, whereas the incidence and mortality of certain cancers in China have been increasing at an alarming speed. Rapid industrialization and urbanization in China have been accompanied by incredible changes in lifestyle and environment combined with an aging population. Mortality caused by lung, colorectal and breast cancers has been steadily increasing, whereas cancer mortality from gastric, esophageal and cervical tumors has tended to decrease. Similar to what has occurred in the United States, unhealthy lifestyles in China, including heavy smoking and poor diet combined with pollution, have contributed to increased cancer risk. China is facing many challenges in cancer treatment and prevention for the general population. The major areas that need to be addressed in the control of cancer in China include cancers associated with environmental pollution, tobacco use, occupational carcinogens, infection, excessive alcohol consumption, dietary deficiencies and obesity. In this perspective, we review the problems in each area and suggest ideas for future directions in cancer research and strategies and actions to reduce the incidence of cancer in China.

  19. Minimum detectable activity and false alarm rate relationships for alpha continuous air monitors

    International Nuclear Information System (INIS)

    Hoover, M.D.; Newton, G.J.

    1994-01-01

    The U.S. Department of Energy rule for Occupational Radiation Protection (10 CFR Part 835, December 1993) and the DOE Radiological Control Manual (the RCM) (DOE/EH-0256T, Rev. 1, April 1994) require the use of continuous air monitors (CAMs) in normally occupied areas where an individual is likely to be exposed to a concentration of airborne radioactivity exceeding the derived air concentration (DAC) or where there is a need to alert potentially exposed individuals to unexpected increases in airborne radioactivity levels. The DAC is the airborne concentration that equals the annual limit on intake divided by the volume of air breathed by an average worker for a working year of 2000 h (assuming a breathing volume of 2400 m 3 ). It is equivalent to the airborne concentration to which a worker could be exposed for an entire working year (2000 h) without exceeding the allowable annual limit on intake. The rule and the RCM further require that real-time air monitors have an alarm capability and sufficient sensitivity to alert potentially exposed individuals that immediate action is necessary in order to minimize or terminate inhalation exposures. The RCM also recommends that real-time air monitors should be capable of measuring 1 DAC when averaged over 8 h (8 DAC-h) under laboratory conditions. In response to these recommendations, we are developing procedures for determining the basic sensitivity of alpha CAMs under laboratory conditions and for documenting practical alarm set points for routine use of CAMs under a range of radon and thoron concentrations

  20. Attention Cueing and Activity Equally Reduce False Alarm Rate in Visual-Auditory Associative Learning through Improving Memory.

    Science.gov (United States)

    Nikouei Mahani, Mohammad-Ali; Haghgoo, Hojjat Allah; Azizi, Solmaz; Nili Ahmadabadi, Majid

    2016-01-01

    In our daily life, we continually exploit already learned multisensory associations and form new ones when facing novel situations. Improving our associative learning results in higher cognitive capabilities. We experimentally and computationally studied the learning performance of healthy subjects in a visual-auditory sensory associative learning task across active learning, attention cueing learning, and passive learning modes. According to our results, the learning mode had no significant effect on learning association of congruent pairs. In addition, subjects' performance in learning congruent samples was not correlated with their vigilance score. Nevertheless, vigilance score was significantly correlated with the learning performance of the non-congruent pairs. Moreover, in the last block of the passive learning mode, subjects significantly made more mistakes in taking non-congruent pairs as associated and consciously reported lower confidence. These results indicate that attention and activity equally enhanced visual-auditory associative learning for non-congruent pairs, while false alarm rate in the passive learning mode did not decrease after the second block. We investigated the cause of higher false alarm rate in the passive learning mode by using a computational model, composed of a reinforcement learning module and a memory-decay module. The results suggest that the higher rate of memory decay is the source of making more mistakes and reporting lower confidence in non-congruent pairs in the passive learning mode.

  1. Cancer prevention and control: alarming challenges in China

    OpenAIRE

    Bode, Ann M.; Dong, Zigang; Wang, Hongyang

    2015-01-01

    China is geographically the third largest country in the world and the most populated low-to-middle-income country. Cancer incidence and mortality rates for some cancers in the USA and European countries have steadily decreased over the last decades, whereas the incidence and mortality of certain cancers in China have been increasing at an alarming speed. Rapid industrialization and urbanization in China have been accompanied by incredible changes in lifestyle and environment combined with an...

  2. Integrated built-in-test false and missed alarms reduction based on forward infinite impulse response & recurrent finite impulse response dynamic neural networks

    Science.gov (United States)

    Cui, Yiqian; Shi, Junyou; Wang, Zili

    2017-11-01

    Built-in tests (BITs) are widely used in mechanical systems to perform state identification, whereas the BIT false and missed alarms cause trouble to the operators or beneficiaries to make correct judgments. Artificial neural networks (ANN) are previously used for false and missed alarms identification, which has the features such as self-organizing and self-study. However, these ANN models generally do not incorporate the temporal effect of the bottom-level threshold comparison outputs and the historical temporal features are not fully considered. To improve the situation, this paper proposes a new integrated BIT design methodology by incorporating a novel type of dynamic neural networks (DNN) model. The new DNN model is termed as Forward IIR & Recurrent FIR DNN (FIRF-DNN), where its component neurons, network structures, and input/output relationships are discussed. The condition monitoring false and missed alarms reduction implementation scheme based on FIRF-DNN model is also illustrated, which is composed of three stages including model training, false and missed alarms detection, and false and missed alarms suppression. Finally, the proposed methodology is demonstrated in the application study and the experimental results are analyzed.

  3. Ship Detection in Optical Remote Sensing Images Based on Wavelet Transform and Multi-Level False Alarm Identification

    Directory of Open Access Journals (Sweden)

    Fang Xu

    2017-09-01

    Full Text Available Ship detection by Unmanned Airborne Vehicles (UAVs and satellites plays an important role in a spectrum of related military and civil applications. To improve the detection efficiency, accuracy, and speed, a novel ship detection method from coarse to fine is presented. Ship targets are viewed as uncommon regions in the sea background caused by the differences in colors, textures, shapes, or other factors. Inspired by this fact, a global saliency model is constructed based on high-frequency coefficients of the multi-scale and multi-direction wavelet decomposition, which can characterize different feature information from edge to texture of the input image. To further reduce the false alarms, a new and effective multi-level discrimination method is designed based on the improved entropy and pixel distribution, which is robust against the interferences introduced by islands, coastlines, clouds, and shadows. The experimental results on optical remote sensing images validate that the presented saliency model outperforms the comparative models in terms of the area under the receiver operating characteristic curves core and the accuracy in the images with different sizes. After the target identification, the locations and the number of the ships in various sizes and colors can be detected accurately and fast with high robustness.

  4. False alarms and mine seismicity: An example from the Gentry Mountain mining region, Utah. Los Alamos Source Region Project

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, S.R.

    1992-09-23

    Mining regions are a cause of concern for monitoring of nuclear test ban treaties because they present the opportunity for clandestine nuclear tests (i.e. decoupled explosions). Mining operations are often characterized by high seismicity rates and can provide the cover for excavating voids for decoupling. Chemical explosions (seemingly as part of normal mining activities) can be used to complicate the signals from a simultaneous decoupled nuclear explosion. Thus, most concern about mines has dealt with the issue of missed violations to a test ban treaty. In this study, we raise the diplomatic concern of false alarms associated with mining activities. Numerous reports and papers have been published about anomalous seismicity associated with mining activities. As part of a large discrimination study in the western US (Taylor et al., 1989), we had one earthquake that was consistently classified as an explosion. The magnitude 3.5 disturbance occurred on May 14, 1981 and was conspicuous in its lack of Love waves, relative lack of high- frequency energy, low Lg/Pg ratio, and high m{sub b} {minus} M{sub s}. A moment-tensor solution by Patton and Zandt (1991) indicated the event had a large implosional component. The event occurred in the Gentry Mountain coal mining region in the eastern Wasatch Plateau, Utah. Using a simple source representation, we modeled the event as a tabular excavation collapse that occurred as a result of normal mining activities. This study raises the importance of having a good catalogue of seismic data and information about mining activities from potential proliferant nations.

  5. The Role of Secondary Frontal Waves in Causing Missed or False Alarm Flood Forecasts During Landfalling Atmospheric Rivers

    Science.gov (United States)

    Martin, A.; Ralph, F. M.; Lavers, D. A.; Kalansky, J.; Kawzenuk, B.

    2015-12-01

    The previous ten years has seen an explosion in research devoted to the Atmospheric River (AR) phenomena, features of the midlatitude circulation responsible for large horizontal water vapor transport. Upon landfall, ARs can be associated with 30-50% of annual precipitation in some regions, while also causing the largest flooding events in places such as coastal California. Little discussed is the role secondary frontal waves play in modulating precipitation during a landfalling AR. Secondary frontal waves develop along an existing cold front in response to baroclinic frontogenesis, often coinciding with a strong upper-tropospheric jet. If the secondary wave develops along a front associated with a landfalling AR, the resulting precipitation may be much greater or much less than originally forecasted - especially in regions where orographic uplift of horizontally transported water vapor is responsible for a large portion of precipitation. In this study, we present several cases of secondary frontal waves that have occurred in conjunction with a landfalling AR on the US West Coast. We put the impact of these cases in historical perspective using quantitative precipitation forecasts, satellite data, reanalyses, and estimates of damage related to flooding. We also discuss the dynamical mechanisms behind secondary frontal wave development and relate these mechanisms to the high spatiotemporal variability in precipitation observed during ARs with secondary frontal waves. Finally, we demonstrate that even at lead times less than 24 hours, current quantitative precipitation forecasting methods have difficulty accurately predicting the rainfall in the area near the secondary wave landfall, in some cases leading to missed or false alarm flood warnings, and suggest methods which may improve quantitative precipitation forecasts for this type of system in the future.

  6. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  7. Optimal Alarm Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — An optimal alarm system is simply an optimal level-crossing predictor that can be designed to elicit the fewest false alarms for a fixed detection probability. It...

  8. Correlator bank detection of gravitational wave chirps--False-alarm probability, template density, and thresholds: Behind and beyond the minimal-match issue

    International Nuclear Information System (INIS)

    Croce, R.P.; Demma, Th.; Pierro, V.; Pinto, I.M.; Longo, M.; Marano, S.; Matta, V.

    2004-01-01

    The general problem of computing the false-alarm probability vs the detection-threshold relationship for a bank of correlators is addressed, in the context of maximum-likelihood detection of gravitational waves in additive stationary Gaussian noise. Specific reference is made to chirps from coalescing binary systems. Accurate (lower-bound) approximants for the cumulative distribution of the whole-bank supremum are deduced from a class of Bonferroni-type inequalities. The asymptotic properties of the cumulative distribution are obtained, in the limit where the number of correlators goes to infinity. The validity of numerical simulations made on small-size banks is extended to banks of any size, via a Gaussian-correlation inequality. The result is used to readdress the problem of relating the template density to the fraction of potentially observable sources which could be dismissed as an effect of template space discreteness

  9. The false alarm hypothesis: Food allergy is associated with high dietary advanced glycation end-products and proglycating dietary sugars that mimic alarmins.

    Science.gov (United States)

    Smith, Peter K; Masilamani, Madhan; Li, Xiu-Min; Sampson, Hugh A

    2017-02-01

    The incidence of food allergy has increased dramatically in the last few decades in westernized developed countries. We propose that the Western lifestyle and diet promote innate danger signals and immune responses through production of "alarmins." Alarmins are endogenous molecules secreted from cells undergoing nonprogrammed cell death that signal tissue and cell damage. High molecular group S (HMGB1) is a major alarmin that binds to the receptor for advanced glycation end-products (RAGE). Advanced glycation end-products (AGEs) are also present in foods. We propose the "false alarm" hypothesis, in which AGEs that are present in or formed from the food in our diet are predisposing to food allergy. The Western diet is high in AGEs, which are derived from cooked meat, oils, and cheese. AGEs are also formed in the presence of a high concentration of sugars. We propose that a diet high in AGEs and AGE-forming sugars results in misinterpretation of a threat from dietary allergens, promoting the development of food allergy. AGEs and other alarmins inadvertently prime innate signaling through multiple mechanisms, resulting in the development of allergic phenotypes. Current hypotheses and models of food allergy do not adequately explain the dramatic increase in food allergy in Western countries. Dietary AGEs and AGE-forming sugars might be the missing link, a hypothesis supported by a number of convincing epidemiologic and experimental observations, as discussed in this article. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  10. Functional difference between sustained and transient modulations of cognitive control in the simon task: evidence from false alarm responses on no-go trials.

    Science.gov (United States)

    Hasegawa, Kunihiro; Takahashi, Shin'ya

    2013-01-01

    Cognitive control in response compatibility tasks is modulated by the task context. Two types of contextual modulations have been demonstrated; sustained (block-wise) and transient (trial-by-trial). Recent research suggests that these modulations have different underlying mechanisms. This study presents new evidence supporting this claim by comparing false alarm (FA) responses on no-go trials of the Simon task between the sustained and transient contexts. In Experiment 1, the sustained context was manipulated so that a block included a larger number of incongruent trials. Results showed that participants made more FA responses by the hand opposite to the stimulus location. This suggests a generation of response bias in which the task-irrelevant location information is utilized in a reversed manner (i.e., to respond with the right hand to a stimulus presented on the left side and vice versa). Next, Experiment 2 examined the effect of the transient context and found that overall FA rate was lower when a no-go trial was preceded by an incongruent trial than by a congruent trial, whereas such response bias as that shown in Experiment 1 was not demonstrated. This suggests that the transient conflict context enhances inhibition of the task-irrelevant process but does not make the task-irrelevant information actively usable. Based on these results, we propound two types of cognitive control modulations as adaptive behaviors: response biasing based on utilization of the task-irrelevant information under the sustained conflict context and transient enhancement of inhibition of the task-irrelevant process based on the online conflict monitoring.

  11. Alarms, Chemical

    Science.gov (United States)

    cited in applicable qualitative materiel requirements, small development requirements, technical characteristics, and other requirements and documentation that pertain to automatic chemical agent alarms.

  12. Alarming atmospheres

    DEFF Research Database (Denmark)

    Højlund, Marie; Kinch, Sofie

    2014-01-01

    Nurses working in the Neuro-Intensive Care Unit at Aarhus University Hospital lack the tools to prepare children for the alarming atmosphere they will enter when visiting a hospitalised relative. The complex soundscape dominated by alarms and sounds from equipment is mentioned as the main stressor...

  13. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  14. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  15. Security Alarm for Motorcycle

    Directory of Open Access Journals (Sweden)

    Ismail Ismail

    2015-11-01

    Full Text Available A security alarm for motorcycle has been developed. This equipment consists of two parts. Part one is as a remote control, where it produces a radio signal with frequency of 37.5 MHz to turn on (activate or to turn off alarm. Part two consists of sensor, receiver to receive signal from part one, and alarm. This part two will be attached to motorcycle while part one will be kept as a key by the owner of motorcycle. This equipment has been tested in the laboratory and it worked well. When part two is activated by pushing the “set button” in part one, then any movement of part two (as a movement of motor cycle by about 20 cm from initial position will cause the alarm sounds continuously. The alarm will be off whenever the “reset button” in part one is pushed. Part one (a remote control can activate part two with a maximum of twelve meter separation apart. This shows that the equipment can be used as a security alarm to prevent the motorcycle to be stolen in the future.

  16. Systems analysis of a security alarm system

    International Nuclear Information System (INIS)

    Schiff, A.

    1975-01-01

    When the Lawrence Livermore Laboratory found that its security alarm system was causing more false alarms and maintenance costs than LLL felt was tolerable, a systems analysis was undertaken to determine what should be done about the situation. This report contains an analysis of security alarm systems in general and ends with a review of the existing Security Alarm Control Console (SACC) and recommendations for its improvement, growth and change. (U.S.)

  17. Criticality accident alarm system

    International Nuclear Information System (INIS)

    Malenfant, R.E.

    1991-01-01

    The American National Standard ANSI/ANS-8.3-1986, Criticality Accident Alarm System provides guidance for the establishment and maintenance of an alarm system to initiate personnel evacuation in the event of inadvertent criticality. In addition to identifying the physical features of the components of the system, the characteristics of accidents of concern are carefully delineated. Unfortunately, this ANSI Standard has led to considerable confusion in interpretation, and there is evidence that the ''minimum accident of concern'' may not be appropriate. Furthermore, although intended as a guide, the provisions of the standard are being rigorously applied, sometimes with interpretations that are not consistent. Although the standard is clear in the use of absorbed dose in free air of 20 rad, at least one installation has interpreted the requirement to apply to dose in soft tissue. The standard is also clear in specifying the response to both neutrons and gamma rays. An assembly of uranyl fluoride enriched to 5% 235 U was operated to simulate a potential accident. The dose, delivered in a free run excursion 2 m from the surface of the vessel, was greater than 500 rad, without ever exceeding a rate of 20 rad/min, which is the set point for activating an alarm that meets the standard. The presence of an alarm system would not have prevented any of the five major accidents in chemical operations nor is it absolutely certain that the alarms were solely responsible for reducing personnel exposures following the accident. Nevertheless, criticality alarm systems are now the subject of great effort and expense. 13 refs

  18. Alarm filtering and presentation

    International Nuclear Information System (INIS)

    Bray, M.A.

    1989-01-01

    This paper discusses alarm filtering and presentation in the control room of nuclear and other process control plants. Alarm generation and presentation is widely recognized as a general process control problem. Alarm systems often fail to provide meaningful alarms to operators. Alarm generation and presentation is an area in which computer aiding is feasible and provides clear benefits. Therefore, researchers have developed several computerized alarm filtering and presentation approaches. This paper discusses problems associated with alarm generation and presentation. Approaches to improving the alarm situation and installation issues of alarm system improvements are discussed. The impact of artificial intelligence (AI) technology on alarm system improvements is assessed. (orig.)

  19. Controlled cross-over study in normal subjects of naloxone-preceding-lactate infusions; respiratory and subjective responses: relationship to endogenous opioid system, suffocation false alarm theory and childhood parental loss.

    Science.gov (United States)

    Preter, M; Lee, S H; Petkova, E; Vannucci, M; Kim, S; Klein, D F

    2011-02-01

    The expanded suffocation false alarm theory (SFA) hypothesizes that dysfunction in endogenous opioidergic regulation increases sensitivity to CO2, separation distress and panic attacks. In panic disorder (PD) patients, both spontaneous clinical panics and lactate-induced panics markedly increase tidal volume (TV), whereas normals have a lesser effect, possibly due to their intact endogenous opioid system. We hypothesized that impairing the opioidergic system by naloxone could make normal controls parallel PD patients' response when lactate challenged. Whether actual separations and losses during childhood (childhood parental loss, CPL) affected naloxone-induced respiratory contrasts was explored. Subjective panic-like symptoms were analyzed although pilot work indicated that the subjective aspect of anxious panic was not well modeled by this specific protocol. Randomized cross-over sequences of intravenous naloxone (2 mg/kg) followed by lactate (10 mg/kg), or saline followed by lactate, were given to 25 volunteers. Respiratory physiology was objectively recorded by the LifeShirt. Subjective symptomatology was also recorded. Impairment of the endogenous opioid system by naloxone accentuates TV and symptomatic response to lactate. This interaction is substantially lessened by CPL. Opioidergic dysregulation may underlie respiratory pathophysiology and suffocation sensitivity in PD. Comparing specific anti-panic medications with ineffective anti-panic agents (e.g. propranolol) can test the specificity of the naloxone+lactate model. A screen for putative anti-panic agents and a new pharmacotherapeutic approach are suggested. Heuristically, the experimental unveiling of the endogenous opioid system impairing effects of CPL and separation in normal adults opens a new experimental, investigatory area.

  20. Controlled cross-over study in normal subjects of naloxone-preceding-lactate infusions; respiratory and subjective responses: relationship to endogenous opioid system, suffocation false alarm theory and childhood parental loss

    Science.gov (United States)

    Preter, M.; Lee, S. H.; Petkova, E.; Vannucci, M.; Kim, S.; Klein, D. F.

    2015-01-01

    Background The expanded suffocation false alarm theory (SFA) hypothesizes that dysfunction in endogenous opioidergic regulation increases sensitivity to CO2, separation distress and panic attacks. In panic disorder (PD) patients, both spontaneous clinical panics and lactate-induced panics markedly increase tidal volume (TV), whereas normals have a lesser effect, possibly due to their intact endogenous opioid system. We hypothesized that impairing the opioidergic system by naloxone could make normal controls parallel PD patients' response when lactate challenged. Whether actual separations and losses during childhood (childhood parental loss, CPL) affected naloxone-induced respiratory contrasts was explored. Subjective panic-like symptoms were analyzed although pilot work indicated that the subjective aspect of anxious panic was not well modeled by this specific protocol. Method Randomized cross-over sequences of intravenous naloxone (2 mg/kg) followed by lactate (10 mg/kg), or saline followed by lactate, were given to 25 volunteers. Respiratory physiology was objectively recorded by the LifeShirt. Subjective symptomatology was also recorded. Results Impairment of the endogenous opioid system by naloxone accentuates TV and symptomatic response to lactate. This interaction is substantially lessened by CPL. Conclusions Opioidergic dysregulation may underlie respiratory pathophysiology and suffocation sensitivity in PD. Comparing specific anti-panic medications with ineffective anti-panic agents (e.g. propranolol) can test the specificity of the naloxone + lactate model. A screen for putative anti-panic agents and a new pharmacotherapeutic approach are suggested. Heuristically, the experimental unveiling of the endogenous opioid system impairing effects of CPL and separation in normal adults opens a new experimental, investigatory area. PMID:20444308

  1. 46 CFR 97.37-9 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Carbon dioxide alarm. 97.37-9 Section 97.37-9 Shipping... Markings for Fire and Emergency Equipment, Etc. § 97.37-9 Carbon dioxide alarm. (a) All carbon dioxide alarms shall be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING...

  2. 46 CFR 78.47-9 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Carbon dioxide alarm. 78.47-9 Section 78.47-9 Shipping... and Emergency Equipment, Etc. § 78.47-9 Carbon dioxide alarm. (a) All carbon dioxide alarms shall be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING RELEASED.” (b) [Reserved] ...

  3. 46 CFR 169.732 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Carbon dioxide alarm. 169.732 Section 169.732 Shipping... Control, Miscellaneous Systems, and Equipment Markings § 169.732 Carbon dioxide alarm. Each carbon dioxide alarm must be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING RELEASED.” ...

  4. 46 CFR 196.37-9 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Carbon dioxide alarm. 196.37-9 Section 196.37-9 Shipping... Markings for Fire and Emergency Equipment, etc. § 196.37-9 Carbon dioxide alarm. (a) All carbon dioxide alarms shall be conspicuously identified: “WHEN ALARM SOUNDS—VACATE AT ONCE. CARBON DIOXIDE BEING...

  5. 46 CFR 108.627 - Carbon dioxide alarm.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Carbon dioxide alarm. 108.627 Section 108.627 Shipping... EQUIPMENT Equipment Markings and Instructions § 108.627 Carbon dioxide alarm. Each carbon dioxide alarm must be identified by marking: “WHEN ALARM SOUNDS VACATE AT ONCE. CARBON DIOXIDE BEING RELEASED” next to...

  6. Improving Universal Suicide Prevention Screening in Primary Care by Reducing False Negatives

    Science.gov (United States)

    2017-09-01

    craig.bryan@utah.edu 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) University of Utah 8. PERFORMING ORGANIZATION REPORT...screening methods by reducing false negative rates; and (c) to systematically quantify false negative rates across various patient subgroups (e.g., gender ...c) to systematically quantify false negative rates across various patient subgroups (e.g., gender , race, age, deployment history, etc.) to identify

  7. Toxicity alarm: Case history

    International Nuclear Information System (INIS)

    Hogan, D.; Retallack, J.

    1993-01-01

    In late fall 1991, the Novacor petrochemical plant near Joffre, Alberta experienced a toxicity alarm, the first since its startup 14 years ago. Fish exposed to a normal toxicity test were stressed within 2 h and showed 100% mortality after 24 h. A history of the events leading up to, during, and after the toxicity alarm is presented. The major effluent sources were three cooling water systems. Although these sources are well characterized, the event causes were not immediately clear. Initial toxic screening indicated that one was very toxic, another moderately toxic, and the third not toxic at all. All three systems utilized the same chemical treatment program to avoid fouling: stabilized phosphates with minor variants. The most toxic of the cooling systems operated at 10-12 cycles, had three chemicals for biocide control, and had three makeup streams. Toxic and nontoxic system characteristics were compared. An in-depth modified toxicity identification and evaluation program was then performed to identify and evaluate the cause of the toxicity alarm for future prevention. The most probable causes of toxicity were identified by elimination. The combination of high numbers of cycles, hydrocarbons in the makeup water, and bromine added as an antifoulant resulted in formation of aromatic bromamines which are capable of causing the toxic condition experienced. 2 tabs

  8. Bilevel alarm monitoring multiplexer

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1977-06-01

    This report describes the operation of the Bilevel Alarm Monitoring Multiplexer used in the Adaptive Intrusion Data System (AIDS) to transfer and control alarm signals being sent to the Nova 2 computer, the Memory Controlled Data Processor, and its own integral Display Panel. The multiplexer can handle 48 alarm channels and format the alarms into binary formats compatible with the destination of the alarm data

  9. System for alarms analysis and optimization in petrochemicals plants; Sistema para analise e otimizacao de alarmes em plantas petroquimicas

    Energy Technology Data Exchange (ETDEWEB)

    Leitao, Gustavo; Pifer, Aderson; Guedes, Luiz Affonso [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil); Saito, Kaku; Aquino, Leonardo [PETROBRAS, Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES)

    2008-07-01

    The present work presents a group of algorithms, techniques and functionalities on alarms management which can be used efficiently on the treatment of 'disturbances' caused by the informal management of the alarm systems. Among the disturbances handled by these techniques, there is the recognition of intermittent alarms and false alarms, location of alarm floods and correlation between alarms, aiming the identification of communal root causes. The results will be presented through a case study on petrochemical alarm plants. At last, the results obtained by the utilization of such functionalities will be presented and discussed. (author)

  10. Prevention, development, and control of psychophysical false reactions in cases of imminent or existing catastrophes

    International Nuclear Information System (INIS)

    Brickenstein, R.

    1981-01-01

    If a random group of people or a solid community feel threatened in their economical, ideologic-religious, or physical existences, individual reactions which occur frequently, such as pathologically increased fear, dread can become new common symptoms, the so-called summation phenomenous. Especially general uneasiness, emotional conditions indicating crises and tendency to panic belong to these symptoms. In a mass of people, all preconditions of the development of a panic are existing. This can be acute in the abortive form, but also chronic. Measures of preventing or controlling a panic can be successful only if they take into consideration the genesis and the art of the different sorts of panic. Therefore, it is urgently necessary for any organisatory or political or military leader to know these in order to be able to prevent a catastrophe. (orig.) [de

  11. 21 CFR 870.1100 - Blood pressure alarm.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Blood pressure alarm. 870.1100 Section 870.1100...) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1100 Blood pressure alarm. (a) Identification. A blood pressure alarm is a device that accepts the signal from a blood pressure...

  12. 46 CFR 78.47-75 - Ventilation alarm failure.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Ventilation alarm failure. 78.47-75 Section 78.47-75... Fire and Emergency Equipment, Etc. § 78.47-75 Ventilation alarm failure. (a) The alarm required by § 72... FAILURE IN VEHICULAR SPACE.” (b) [Reserved] [CGFR 66-33, 31 FR 15284, Dec. 6, 1966] ...

  13. Help seeking behavior and onset-to-alarm time in patients with acute stroke: sub-study of the preventive antibiotics in stroke study.

    Science.gov (United States)

    Zock, E; Kerkhoff, H; Kleyweg, R P; van Bavel-Ta, T B V; Scott, S; Kruyt, N D; Nederkoorn, P J; van de Beek, D

    2016-11-25

    Patients with acute stroke often do not seek immediate medical help, which is assumed to be driven by lack of knowledge of stroke symptoms. We explored the process of help seeking behavior in patients with acute stroke, evaluating knowledge about stroke symptoms, socio-demographic and clinical characteristics, and onset-to-alarm time (OAT). In a sub-study of the Preventive Antibiotics in Stroke Study (PASS), 161 acute stroke patients were prospectively included in 3 Dutch hospitals. A semi-structured questionnaire was used to assess knowledge, recognition and interpretation of stroke symptoms. With in-depth interviews, response actions and reasons were explored. OAT was recorded and associations with socio-demographic, clinical parameters were assessed. Knowledge about stroke symptoms does not always result in correct recognition of own stroke symptoms, neither into correct interpretation of the situation and subsequent action. In our study population of 161 patients with acute stroke, median OAT was 30 min (interquartile range [IQR] 10-150 min). Recognition of one-sided weakness and/or sensory loss (p = 0.046) and adequate interpretation of the stroke situation (p = 0.003), stroke at daytime (p = 0.002), severe stroke (p = 0.003), calling the emergency telephone number (p = 0.004), and transport by ambulance (p = 0.040) were associated with shorter OAT. Help seeking behavior after acute stroke is a complex process. A shorter OAT after stroke is associated with correct recognition of one-sided weakness and/or sensory loss, adequate interpretation of the stroke situation by the patient and stroke characteristics and logistics of stroke care, but not by knowledge of stroke symptoms.

  14. Alarm points for fixed oxygen monitors

    International Nuclear Information System (INIS)

    Miller, G.C.

    1987-05-01

    Oxygen concentration monitors were installed in a vault where numerous pipes carried inert cryogens and gases to the Mirror Fusion Test Facility (MFTF-B) experimental vessel at Lawrence Livermore National Laboratory (LLNL). The problems associated with oxygen-monitoring systems and the reasons why such monitors were installed were reviewed. As a result of this review, the MFTF-B monitors were set to sound an evacuation alarm when the oxygen concentration fell below 18%. We chose the 18% alarm criterion to minimize false alarms and to allow time for personnel to escape in an oxygen-deficient environment

  15. Transportable criticality alarm system

    International Nuclear Information System (INIS)

    Clem, W.E.

    1988-09-01

    The Transportable Criticality Alarm System was developed at the Hanford Site in 1982 to comply with the requirements of US Department of Energy Order DOE 5480.1, 12/18/80, and ANSI/ANS-8.3- 1979. The portable unit that it replaced failed to comply with the new requirements in that it did not provide the necessary warning of malfunctions, nor did it provide the Hanford Site standard criticality alarm signal. Modern technology allowed the Transportable Criticality Alarm System to comply with the criticality requirements cited and to incorporate other features that make it more usable, maintainable, and reliable. The Transportable Criticality Alarm System (TCAS) provides temporary criticality coverage in manned areas where the facility criticality alarm system is not operable. This gamma radiation-sensitive system has been in use for the past 6 yr at the Hanford Site. 2 refs., 4 figs., 1 tab

  16. Alarm criteria for the fixed gamma radiation monitoring stations

    International Nuclear Information System (INIS)

    Kjelle, P.E.

    1987-01-01

    For the type of measurement considered here, an alarm based on the dose excess has been shown to be a more certain method of indicating that a true alarm situation exists than an alarm based on the dose-rate exceeding a given dose-rate level. The method offers a number of advantages: Dose-rate levels can be recorded over long periods without any necessity of making manual changes in the alarm level due to seasonal variations in the background level. A relatively low level can be specified without an unnecessary number of false alarms being triggered by gamma-emitting radon daughters. (orig./HP)

  17. Perspectives on use of personal alarms by older fallers

    Directory of Open Access Journals (Sweden)

    Kylie Johnston

    2010-08-01

    Full Text Available Kylie Johnston1, Karen Grimmer-Somers1, Michele Sutherland21International Centre for Allied Health Evidence, University of South Australia, Adelaide; 2Falls Prevention Unit, Department of Health, Government of South Australia, Adelaide, AustraliaBackground: Personal alarms are proposed as a reliable mechanism for older people to obtain assistance after falling. However, little is known about how older people feel about owning and using personal alarms.Aim: This paper reports on experiences of independently living older people, who have recently fallen, regarding alarm use and their independence.Method: Volunteers older than 65 years who had sustained a fall in the previous six months were sought via community invitations. Semistructured telephone interviews were conducted to gain information about their fall and their perspectives on personal alarm use. Interviews were content-analyzed to identify key concepts and themes.Results: Thirty-one interviews were conducted. Twenty callers owned personal alarms. Four subgroups of older fallers were identified; the first group used personal alarms effectively and were advocates for their benefits, the second group owned an alarm but did not use it effectively, the third group did not own alarms mostly because of cost, although were receptive to an alarm should one be provided, and the fourth group did not have an alarm and would not use it even if it was provided.Discussion: Personal alarms produce positive experiences when used effectively by the right people. The cost of personal alarms prohibits some older fallers from being effective alarm users. However, other elderly fallers remain unwilling to consider alarm use even if one was provided. In view of their cost, personal alarms should be targeted to people who will benefit most. ­Alternative strategies should be considered when alarms are unlikely to be used appropriately.Keywords: personal alarm devices, falls, older people, patient perspective

  18. Advanced alarm management system

    International Nuclear Information System (INIS)

    Easter, J.R.

    1995-01-01

    The Westinghouse Advanced Alarm Management System (AWARE) is one of the Man-Machine Design Interfaces (MMI) which has great flexibility with regard to hardware type and configuration, alarm system concept, plant scope, engineering scope and installation. The AWARE System provides the capability to better manage the quantity prioritization and presentation of real-time process alarm messages in the control room. The messages are specific, precise and dynamic. The AWARE System can provide a large reduction in the number of messages that the control room staff must address at any one time, thus making the alarm message system a useful tool for the operators during situations that normally produce a high volume of messages as well as improving the clarity of the presentation of process abnormalities during small disturbances. The operating staff is now provided with the basis for a better understanding of the current plant state and for taking the appropriate control actions. (2 refs., 3 figs.)

  19. Speech Alarms Pilot Study

    Science.gov (United States)

    Sandor, Aniko; Moses, Haifa

    2016-01-01

    Speech alarms have been used extensively in aviation and included in International Building Codes (IBC) and National Fire Protection Association's (NFPA) Life Safety Code. However, they have not been implemented on space vehicles. Previous studies conducted at NASA JSC showed that speech alarms lead to faster identification and higher accuracy. This research evaluated updated speech and tone alerts in a laboratory environment and in the Human Exploration Research Analog (HERA) in a realistic setup.

  20. Sensor fusion for intelligent alarm analysis

    International Nuclear Information System (INIS)

    Nelson, C.L.; Fitzgerald, D.S.

    1996-01-01

    The purpose of an intelligent alarm analysis system is to provide complete and manageable information to a central alarm station operator by applying alarm processing and fusion techniques to sensor information. This paper discusses the sensor fusion approach taken to perform intelligent alarm analysis for the Advanced Exterior Sensor (AES). The AES is an intrusion detection and assessment system designed for wide-area coverage, quick deployment, low false/nuisance alarm operation, and immediate visual assessment. It combines three sensor technologies (visible, infrared, and millimeter wave radar) collocated on a compact and portable remote sensor module. The remote sensor module rotates at a rate of 1 revolution per second to detect and track motion and provide assessment in a continuous 360 degree field-of-regard. Sensor fusion techniques are used to correlate and integrate the track data from these three sensors into a single track for operator observation. Additional inputs to the fusion process include environmental data, knowledge of sensor performance under certain weather conditions, sensor priority, and recent operator feedback. A confidence value is assigned to the track as a result of the fusion process. This helps to reduce nuisance alarms and to increase operator confidence in the system while reducing the workload of the operator

  1. Gynecological cancer alarm symptoms:

    DEFF Research Database (Denmark)

    Balasubramaniam, Kirubakaran; Ravn, Pernille; dePont Christensen, René

    2016-01-01

    INTRODUCTION: To determine the proportion of patients who were referred to specialist care after reporting gynecological cancer alarm symptoms to their general practitioner. To investigate whether contact with specialist care was associated with lifestyle factors or socioeconomic status. MATERIAL...... and odds ratios (ORs) for associations between specialist care contact, lifestyle factors and socioeconomic status. RESULTS: The study included 25 866 non-pregnant women; 2957 reported the onset of at least one gynecological cancer alarm symptom, and 683 of these (23.1%) reported symptoms to their general......: Educational level influence contact with specialist care among patients with gynecological cancer alarm symptoms. Future studies should investigate inequalities in access to the secondary healthcare system. This article is protected by copyright. All rights reserved....

  2. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  3. The LEP alarm system

    International Nuclear Information System (INIS)

    Tyrrell, M.W.

    1992-01-01

    Unlike alarm systems for previous accelerators, the LEP alarm system caters not only for the operation of the accelerator but also for technical services and provides the direct channel for personnel safety. It was commissioned during 1989 and has seen a continued development up to the present day. The system, comprising over 50 computers including 5 different platforms and 4 different operating systems, is described. The hierarchical structure of the software is outlined from the interface to the equipment groups, through the front end computers to the central server, and finally to the operator consoles. Reasons are given for choosing a conventional, as opposed to a 'knowledge based' approach. Finally, references are made to a prototype real time expert system for surveying the power converters of LEP, which was conducted during 1990 as part of the alarm development program. (author)

  4. 10 CFR 74.57 - Alarm resolution.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Alarm resolution. 74.57 Section 74.57 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) MATERIAL CONTROL AND ACCOUNTING OF SPECIAL NUCLEAR MATERIAL Formula... unresolved beyond the time period specified for its resolution in the licensee's fundamental nuclear material...

  5. 46 CFR 28.250 - High water alarms.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false High water alarms. 28.250 Section 28.250 Shipping COAST... Individuals On Board, or for Fish Tender Vessels Engaged in the Aleutian Trade § 28.250 High water alarms. On... operating station to indicate high water level in each of the following normally unmanned spaces: (a) A...

  6. Criticality alarm device

    International Nuclear Information System (INIS)

    Kasai, Kenji.

    1994-01-01

    The device of the present invention is utilized, for example, to a reprocessing facility for storing and processing nuclear fuels and measures and controls the nuclear fuel assembly system so as not to exceed criticality. That is, a conventional criticality alarm device applies a predetermined processing to neutron fluxes generated from a nuclear fuel assembly system containing nuclear fuels and outputs an alarm. The device of the present invention comprises (1) a neutron flux supply source for increasing and decreasing neutron fluxes periodically and supplying them to nuclear fuel assemblies, (2) a detector for detecting neutron fluxes in the nuclear fuel assemblies, (3) a critical state judging section for judging the critical state of the nuclear fuel assemblies based on the periodically changing signals obtained from the detector (2) and (4) an alarm section for outputting criticality alarms depending on the result of the judgement. The device of the present invention can accurately recognize the critical state of the nuclear fuel assembly system and can forecast reaching of the nuclear fuel assembly to criticality or prompt neutron critical state. (I.S.)

  7. False alarm rates of liquid explosives detection systems

    NARCIS (Netherlands)

    Dzhongova, E.; Anderson, D.; Ruiter, J. de; Novakovic, V.; Ruiz Oses, M.

    2017-01-01

    Restrictions on the carriage of liquids, aerosol, and gels (LAGs) by airline passengers have been in place since November 2006, following the discovery of a terrorist plot involving homemade liquid explosives to be used on transatlantic flights (Wikipedia, 2006). Restrictions on the carriage of LAGs

  8. Constant False Alarm Rate (CFAR) Autotrend Evaluation Report

    Science.gov (United States)

    2011-12-01

    represent a level of uncertainty in the performance analysis. The performance analysis produced the following Key Performance Indicators ( KPIs ) as...Identity KPI Key Performance Indicator MooN M-out-of-N MSPU Modernized Signal Processor Unit NFF No Fault Found PAT Parameter Allocation Table PD

  9. Design of and experience with the gamma-detecting criticality accident alarm system at ALKEM MOX fuel fabrication plant

    International Nuclear Information System (INIS)

    Kindleben, G.

    1988-01-01

    At ALKEM mixed oxide fuel fabrication plant there are two criticality accident alarm systems in operation and another one is planned for different buildings. They use ionization chambers for gamma-measuring. The measuring channels are self controlled with implemented test sources. The order of limit transgression at the detectors is registrated. The interpretation indicates the room of the radiation source, which is signaled by flash lights. Extensive radiation protection shieldings make detector-placing a complex problem with secondary gamma-radiation to be taken into account. Most of the appearing defects can easily be repaired by exchange of components. Some of them have been eliminated by technical modification. Redundancy prevents total system failure. Some false alarms occurred during the operation time of the alarm systems. The main reason is pulse induction, resulting from lightning strike. Measures to prevent such events have been taken, while further measures are being considered

  10. False Advertising

    OpenAIRE

    Rhodes, Andrew; Wilson, Chris M

    2016-01-01

    There is widespread evidence that some firms use false advertising to overstate the value of their products. We consider a model in which a policymaker is able to punish such false claims. We characterize an equilibrium where false advertising actively influences rational buyers, and analyze the effects of policy under different welfare objectives. We establish precise conditions where policy optimally permits a positive level of false advertising, and show how these conditions vary intuitive...

  11. Dynamic alarm response procedures

    International Nuclear Information System (INIS)

    Martin, J.; Gordon, P.; Fitch, K.

    2006-01-01

    The Dynamic Alarm Response Procedure (DARP) system provides a robust, Web-based alternative to existing hard-copy alarm response procedures. This paperless system improves performance by eliminating time wasted looking up paper procedures by number, looking up plant process values and equipment and component status at graphical display or panels, and maintenance of the procedures. Because it is a Web-based system, it is platform independent. DARP's can be served from any Web server that supports CGI scripting, such as Apache R , IIS R , TclHTTPD, and others. DARP pages can be viewed in any Web browser that supports Javascript and Scalable Vector Graphics (SVG), such as Netscape R , Microsoft Internet Explorer R , Mozilla Firefox R , Opera R , and others. (authors)

  12. 47 CFR 80.307 - Compulsory use of radiotelegraph auto alarm.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Compulsory use of radiotelegraph auto alarm. 80.307 Section 80.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL... Safety Watches § 80.307 Compulsory use of radiotelegraph auto alarm. The radiotelegraph auto alarm...

  13. Alarm personal dosemeter

    International Nuclear Information System (INIS)

    Nunomiya, Tomoya; Yamauchi, Hideshi; Shibata, Tetsuo

    2007-01-01

    Fuji Electric advanced the development of the conventional alarm personal dosemeter (APD) by adopting JIS Z 4312 (2002), which reflects IEC61526 (1998), and by improving the radiation performance characteristics, electromagnetic performance characteristics and mechanical performance characteristics of the APD (acquiring a CE marking). This new dosemeter will target overseas market in the future. The APD is a suitable dosemeter for detecting and monitoring radiation exposure to personnel working in the controlled areas of nuclear facilities, such as nuclear power stations. The APD product line includes 'gamma ray', 'gamma ray + beta ray' and 'gamma ray + neutron' models. (author)

  14. Speech Alarms Pilot Study

    Science.gov (United States)

    Sandor, A.; Moses, H. R.

    2016-01-01

    Currently on the International Space Station (ISS) and other space vehicles Caution & Warning (C&W) alerts are represented with various auditory tones that correspond to the type of event. This system relies on the crew's ability to remember what each tone represents in a high stress, high workload environment when responding to the alert. Furthermore, crew receive a year or more in advance of the mission that makes remembering the semantic meaning of the alerts more difficult. The current system works for missions conducted close to Earth where ground operators can assist as needed. On long duration missions, however, they will need to work off-nominal events autonomously. There is evidence that speech alarms may be easier and faster to recognize, especially during an off-nominal event. The Information Presentation Directed Research Project (FY07-FY09) funded by the Human Research Program included several studies investigating C&W alerts. The studies evaluated tone alerts currently in use with NASA flight deck displays along with candidate speech alerts. A follow-on study used four types of speech alerts to investigate how quickly various types of auditory alerts with and without a speech component - either at the beginning or at the end of the tone - can be identified. Even though crew were familiar with the tone alert from training or direct mission experience, alerts starting with a speech component were identified faster than alerts starting with a tone. The current study replicated the results from the previous study in a more rigorous experimental design to determine if the candidate speech alarms are ready for transition to operations or if more research is needed. Four types of alarms (caution, warning, fire, and depressurization) were presented to participants in both tone and speech formats in laboratory settings and later in the Human Exploration Research Analog (HERA). In the laboratory study, the alerts were presented by software and participants were

  15. Reducing hospital noise: a review of medical device alarm management.

    Science.gov (United States)

    Konkani, Avinash; Oakley, Barbara; Bauld, Thomas J

    2012-01-01

    Increasing noise in hospital environments, especially in intensive care units (ICUs) and operating rooms (ORs), has created a formidable challenge for both patients and hospital staff. A major contributing factor for the increasing noise levels in these environments is the number of false alarms generated by medical devices. This study focuses on discovering best practices for reducing the number of false clinical alarms in order to increase patient safety and provide a quiet environment for both work and healing. The researchers reviewed Pub Med, Web of Knowledge and Google Scholar sources to obtain original journal research and review articles published through January 2012. This review includes 27 critically important journal articles that address different aspects of medical device alarms management, including the audibility, identification, urgency mapping, and response time of nursing staff and different solutions to such problems. With current technology, the easiest and most direct method for reducing false alarms is to individualize alarm settings for each patient's condition. Promoting an institutional culture change that emphasizes the importance of individualization of alarms is therefore an important goal. Future research should also focus on the development of smart alarms.

  16. Alarm pocket dosimeter

    Energy Technology Data Exchange (ETDEWEB)

    Hiraki, H; Kitamura, S [Matsushita Electric Industrial Co. Ltd., Kadoma, Osaka (Japan)

    1975-04-01

    This instrument is a highly reliable pocket dosimeter which has been developed for personal monitoring use. The dosimeter generates an alarm sound when the exposure dose reaches a preset value. Using a tiny GM tube for a radiation detector and measuring the integrated dose by means of a digital counting method, this new pocket dosimeter has high accuracy and stability. Using a sealed alkali storage battery for the power supply, and with an automatic control charger, this dosimetry system is easy and economical to operate and maintain. Detectable radiation by the dosimeter are X and ..gamma.. rays. Standard preset dose values are 30, 50, 80 and 100 mR. Detection accuracy is betwen +10% and -20%. The dosimeter is continuously usable for more than 14 hours after charging for 2 hours. The dosimeter has the following features; good realiability, shock-proof loud and clear alarm sound, the battery charger also serves as a stock container for the dosimeters, and no switching operation required for the power supply due to the internal automatic switch. Therefore, the dosimetry system is very useful for personal monitoring management in many radiation industry establishments.

  17. Network-Based Real-time Integrated Fire Detection and Alarm (FDA) System with Building Automation

    Science.gov (United States)

    Anwar, F.; Boby, R. I.; Rashid, M. M.; Alam, M. M.; Shaikh, Z.

    2017-11-01

    Fire alarm systems have become increasingly an important lifesaving technology in many aspects, such as applications to detect, monitor and control any fire hazard. A large sum of money is being spent annually to install and maintain the fire alarm systems in buildings to protect property and lives from the unexpected spread of fire. Several methods are already developed and it is improving on a daily basis to reduce the cost as well as increase quality. An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm. This work proposes an improved framework for FDA system to ensure a robust intelligent network of FDA control panels in real-time. A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. The framework shares information and communicates with each fire alarm panels connected in peer to peer configuration and declare the network state using network address declaration from any building connected in network. The fiber-optic connection was proposed to reduce signal noises, thus increasing large area coverage, real-time communication and long-term safety. Based on this proposed method an experimental setup was designed and a prototype system was developed to validate the performance in practice. Also, the distributed network system was proposed to connect with an optional remote monitoring terminal panel to validate proposed network performance and ensure fire survivability where the information is sequentially transmitted. The proposed FDA system is different from traditional fire alarm and detection system in terms of topology as it manages group of buildings in an optimal and efficient manner.Introduction

  18. Transactions of the criticality alarm systems workshop

    International Nuclear Information System (INIS)

    1988-01-01

    The first Criticality Alarm workshop was held by the US Department of Energy Albuquerque Operations Office in 1985. This second workshop is the first held on an international level. There were 98 persons in attendance. They represented the Department of Energy (DOE) field offices, DOE contractors, the Nuclear Regulatory Commission (NRC), NRC licensees, and agencies in the United Kingdom, France, West Germany, and Japan. Topics were on practices experience, and development. A key value of the workshop was the sharing of critical alarm system experiences, problems, and advances in the state of the art. In addition, several Criticality Alarm Systems (CAS) equipment systems were exhibited. Papers were presented on: nature of criticality accidents; lessons learned from past accidents; application of ANS 8.3 standard; gamma and neutron detection systems; research and development in progress; testing at Oak Ridge and Los Alamos; methods used to place detectors; centralized readout feature; false alarms; trip-point settings; and testing and maintenance. The individual papers have been cataloged separately

  19. Alarm management a comprehensive guide

    CERN Document Server

    Hollifield, Bill R

    2011-01-01

    In this second edition, Alarm Management: A Comprehensive Guide, various problems of alarm systems are covered with precise guidance on how they come about and how to effectively correct them. It is written by individuals with vast experience in the different plants, processes, and environments requiring effective alarm management. The second edition is filled with good examples and explanations of procedures, with practical lists and tips on how one should proceed. It is based on hundreds of successful projects.

  20. Fundamental Principles of Alarm Design

    DEFF Research Database (Denmark)

    Us, Tolga; Jensen, Niels; Lind, Morten

    2011-01-01

    Traditionally alarms are designed on the basis of empirical guidelines rather than on a sound scientific framework rooted in a theoretical foundation for process and control system design. This paper proposes scientific principles and a methodology for design of alarms based on a functional...... be applied to any engineering system which can be modeled by MFM. The methodology provides a set of alarms which can facilitate event interpretation and operator support for abnormal situation management. The proposed design methodology provides the information content of the alarms, but does not deal...

  1. Alarm management system

    International Nuclear Information System (INIS)

    Woods, D.D.; Elm, W.C.; Lipner, M.H.; Butterworth, G.E.; Easter, J.R.

    1989-01-01

    An alarm management system is described, comprising: a light water pressurized nuclear power plant; sensors coupled to the plant indicating the state of the plant; a sensor signal processor, operatively connected to the sensors, for producing state signals indicating the state of the sensors monitoring the power plant from the sensor signals and for combining the state signals using rule based algorithms to produce abnormality indication signals; a message processor, operatively connected to the sensor signal processor for receiving the abnormality indication signals; a spatially dedicated parallel display for each function, operatively connected to the message processor, for displaying the portion of the messages simultaneously; and a serial display, operatively connected to the message processor, for displaying the message in the queues in priority order within category within function upon request, the message processor outputting messages from the queue to the parallel display as display space becomes available on the parallel display due to an abnormality being resolved

  2. Habituating alarming atmospheres

    DEFF Research Database (Denmark)

    Højlund, Marie

    This paper proposes embodied rhythmic sound habituation as a possible resource when designing contextualized technologies in critical atmospheres. The main contribution is collating the concept of rhythm as presented by Henri Lefebvre with the concept of sound habituation to help operationalize...... functionality for the staff, but are stressful for visitors and patients, as they are designed to demand attention even though they have no direct functional meaning to them. By introducing sounds from the ward, integrated in the furniture as simple sound sample triggers, KidKit invites children to become...... accustomed to the alarming sounds through rhythmic interaction in the waiting room, and bringing the furniture with them afterwards as a secure anchor, when entering the ward. This rhythmic habituation can enable the child to focus her attention on the meeting with the hospitalized relative....

  3. Alarm systems a guide to design, management and procurement

    CERN Document Server

    Engineering Equipment and Materials Users' Association. London

    2013-01-01

    Alarm systems form an essential part of the operator interfaces to large modern industrial facilities. They provide vital support to the operators by warning them of situations that need their attention and have an important role in preventing, controlling and mitigating the effects of abnormal situations. Since it was first published in 1999, EEMUA 191 has become the globally accepted and leading guide to good practice for all aspects of alarm systems. The guide, developed by users of alarm systems with input from the GB Health and Safety Executive, gives comprehensive guidance on designing, managing and procuring an effective alarm system. The new Third Edition has been comprehensively updated and includes guidance on implementing the alarm management philosophy in practice; applications in geographically distributed processes; and performance metrics and KPIs.

  4. Clinical Alarms in intensive care: implications of alarm fatigue for the safety of patients

    Directory of Open Access Journals (Sweden)

    Adriana Carla Bridi

    2014-12-01

    Full Text Available OBJECTIVES: to identify the number of electro-medical pieces of equipment in a coronary care unit, characterize their types, and analyze implications for the safety of patients from the perspective of alarm fatigue.METHOD: this quantitative, observational, descriptive, non-participatory study was conducted in a coronary care unit of a cardiology hospital with 170 beds.RESULTS: a total of 426 alarms were recorded in 40 hours of observation: 227 were triggered by multi-parametric monitors and 199 were triggered by other equipment (infusion pumps, dialysis pumps, mechanical ventilators, and intra-aortic balloons; that is an average of 10.6 alarms per hour.CONCLUSION: the results reinforce the importance of properly configuring physiological variables, the volume and parameters of alarms of multi-parametric monitors within the routine of intensive care units. The alarms of equipment intended to protect patients have increased noise within the unit, the level of distraction and interruptions in the workflow, leading to a false sense of security.

  5. Clinical Alarms in intensive care: implications of alarm fatigue for the safety of patients1

    Science.gov (United States)

    Bridi, Adriana Carla; Louro, Thiago Quinellato; da Silva, Roberto Carlos Lyra

    2014-01-01

    OBJECTIVES: to identify the number of electro-medical pieces of equipment in a coronary care unit, characterize their types, and analyze implications for the safety of patients from the perspective of alarm fatigue. METHOD: this quantitative, observational, descriptive, non-participatory study was conducted in a coronary care unit of a cardiology hospital with 170 beds. RESULTS: a total of 426 alarms were recorded in 40 hours of observation: 227 were triggered by multi-parametric monitors and 199 were triggered by other equipment (infusion pumps, dialysis pumps, mechanical ventilators, and intra-aortic balloons); that is an average of 10.6 alarms per hour. CONCLUSION: the results reinforce the importance of properly configuring physiological variables, the volume and parameters of alarms of multi-parametric monitors within the routine of intensive care units. The alarms of equipment intended to protect patients have increased noise within the unit, the level of distraction and interruptions in the workflow, leading to a false sense of security. PMID:25591100

  6. 46 CFR 97.37-50 - Ventilation alarm failure.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Ventilation alarm failure. 97.37-50 Section 97.37-50... OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-50 Ventilation alarm failure. (a) The...-inch letters “VENTILATION FAILURE IN VEHICULAR SPACE.” (b) [Reserved] [CGFR 66-33, 31 FR 15286, Dec. 6...

  7. Line supervision of alarm communications

    International Nuclear Information System (INIS)

    Chritton, M.R.

    1991-01-01

    The objective of this paper is to explain the role and application of alarm communication link supervision in security systems such as for nuclear facilities. The vulnerabilities of the various types of alarm communication links will be presented. Throughout the paper, an effort has been made to describe only those technologies commercially available and to avoid speculative theoretical solutions

  8. Alarm processing - Ways to the future

    Energy Technology Data Exchange (ETDEWEB)

    Pirus, D [EDF - Septen Service Etudes et Projets Thermiques et Nucleires, Villeurbanne Cedex (France)

    1997-09-01

    After a brief presentation of the main characteristics an efficient alarm system should have, a presentation of the N4 alarm processing and presentation is described in terms of reduction in alarm occurrence, alarm handling and operator presentation. The EDF experiments on the future alarm processing expected for the next generation of the French nuclear plants are then presented. This alarm system will manage the alarms functionally in order to present to the operators the real consequences on the whole plant of a dedicated alarm and try to imbed deeply the alarm presentation within the operating formats and the procedures. (author).

  9. Alarm processing - Ways to the future

    International Nuclear Information System (INIS)

    Pirus, D.

    1997-01-01

    After a brief presentation of the main characteristics an efficient alarm system should have, a presentation of the N4 alarm processing and presentation is described in terms of reduction in alarm occurrence, alarm handling and operator presentation. The EDF experiments on the future alarm processing expected for the next generation of the French nuclear plants are then presented. This alarm system will manage the alarms functionally in order to present to the operators the real consequences on the whole plant of a dedicated alarm and try to imbed deeply the alarm presentation within the operating formats and the procedures. (author)

  10. Development of radiation alarm monitor

    International Nuclear Information System (INIS)

    Myung Jae Song; Myung Chan Lee; Jung Kwan Son

    1997-01-01

    The Radiation Alarm Monitor is developed domestically in order to protect radiation workers from over exposure. The Radiation Alarm Monitor with microprocessor installed can record the information of radiation field before and after accidents. It can also provide the data to analyze the accident and to set a counterplan. It features a wide detection range of radiation (I OmR/h - I OOR/h), radiation work and data storage, portability, high precision (5%) due to calibration, and adaptation of a powerful alarm system. In order to protect workers from over exposure, light and sound alarm had been designed to initiate when accident occurs such as an unexpected change of radiation field such as radiation rate and accumulated dosed between 90 min. before the alarm and 30 min. after the alarm. In addition, the Radiation Alarm Monitor interfaces with computer so that the accident can be analyzed. After the testing conditions in other countries for the Radiation Alarm Monitor were compared, the most stringent test, ANSI N42. 17-A, was selected. The performance testing was car-ried out under various conditions of temperature, humidity, vibration and electromagnetic wave hindrance by Korea Research Institute of Standards and Science (KRISS). As a result, the Radiation Alan-n Monitor passed all test. Also, for the Radiation Alarm Monitor, environmental adaptability tests under the environmental conditions of NPP sites had been performed. The Radiation Alan-n Monitor had been reviewed by radiation workers at NPPs and their opinions had been collected. Operating procedure will be written and distributed to every NPP sites. Radiation Alarm Monitor will be modified for use under the specific environmental conditions of each site. It will be distributed to NPP sites and will be used by radiation workers

  11. Criticality alarm device

    International Nuclear Information System (INIS)

    Sasaki, Takashi.

    1995-01-01

    In a critical alarm device comprising an n-number of radiation detectors and a 2/3 logic module, the 2/3 logic module comprises a rectifier inputting an output of an AC power and outputting it as a full wave-rectified, DC voltage, an analog/digital converter inputting the output from the rectifier, putting it to analog/digital conversion and continuously storing it into a memory, a latch circuit inputting critical signals from the 2/3 logic and holding them and outputting latch signals, and a means for outputting timing signals for data storage to a memory based on clocks at a predetermined period and outputting timing signals for stopping the data storage to the memory after passing a predetermined period from the inputting time point if the latch signals are inputted from the latch circuit. Then, judgement whether the generation of criticality is caused by an actual radiation detection or by noises from the power source is enabled, to provide extremely high reliability. (N.H.)

  12. False assumptions.

    Science.gov (United States)

    Swaminathan, M

    1997-01-01

    Indian women do not have to be told the benefits of breast feeding or "rescued from the clutches of wicked multinational companies" by international agencies. There is no proof that breast feeding has declined in India; in fact, a 1987 survey revealed that 98% of Indian women breast feed. Efforts to promote breast feeding among the middle classes rely on such initiatives as the "baby friendly" hospital where breast feeding is promoted immediately after birth. This ignores the 76% of Indian women who give birth at home. Blaming this unproved decline in breast feeding on multinational companies distracts attention from more far-reaching and intractable effects of social change. While the Infant Milk Substitutes Act is helpful, it also deflects attention from more pressing issues. Another false assumption is that Indian women are abandoning breast feeding to comply with the demands of employment, but research indicates that most women give up employment for breast feeding, despite the economic cost to their families. Women also seek work in the informal sector to secure the flexibility to meet their child care responsibilities. Instead of being concerned about "teaching" women what they already know about the benefits of breast feeding, efforts should be made to remove the constraints women face as a result of their multiple roles and to empower them with the support of families, governmental policies and legislation, employers, health professionals, and the media.

  13. DTR, Taut Wire System: An alarm barrier with experience

    International Nuclear Information System (INIS)

    Kraft, A.J.

    1986-01-01

    The Taut Wire Fence Alarm System concept was developed and introduced more that fifteen years ago in Israel. A sudden expansion of the nations's border lines, the difficulty to monitor intrusions along those elongated lines and the need for timely as well as accurate armed response to an intrusion attempt dictated the need for an alarming barrier. Traditionally, protection of perimeters was accomplished by the installation of a fence or other type obstacles (man made or natural) and surveillance by manned patrols, fixed observation posts, and/or electronic devices. Defense planners recognized therefore the need for an alarming barrier. A concentrated effort by scientists solved the problem by developing the first Taut Wire Fence Alarm System in a configuration of an alarm barrier. The system was specified to have an extremely low false alarm rate (FAR/NAR), high probability of detection, the capability to follow various terrains, operability in a wide range of environmental conditions, a capability to delay an intruder, ease of installation by unskilled labor, and low maintenance requirements. The authors try here to explain the various constraints and considerations given during the design stages of the Taut Wire Alarm System so as to bring the present magnitude of users to a better understanding of the system's operation

  14. Some points of advanced alarm system design

    International Nuclear Information System (INIS)

    Hollo, E.

    1977-01-01

    A description of some of the more relevant questions relating to advanced alarm systems for nuclear power plant installations. The development of such alarm systems embodies three main tasks: development of formal alarm handling methods, design of alarm patterns, development of alarm analysis systems. The major aspects of these tests are dealt with and the close relation between the alarm analysis and the plant disturbance analysis procedure is emphasized. (author)

  15. Semi-supervised detection of intracranial pressure alarms using waveform dynamics

    International Nuclear Information System (INIS)

    Scalzo, Fabien; Hu, Xiao

    2013-01-01

    Patient monitoring systems in intensive care units (ICU) are usually set to trigger alarms when abnormal values are detected. Alarms are generated by threshold-crossing rules that lead to high false alarm rates. This is a recognized issue that causes alarm fatigue, waste of human resources, and increased patient risks. Recently developed smart alarm models require alarms to be validated by experts during the training phase. The manual annotation process involved is time-consuming and virtually impossible to achieve for the thousands of alarms recorded in the ICU every week. To tackle this problem, we investigate in this study if the use of semi-supervised learning methods, that can naturally integrate unlabeled data samples in the model, can be used to improve the accuracy of the alarm detection. As a proof of concept, the detection system is evaluated on intracranial pressure (ICP) signal alarms. Specific morphological and trending features are extracted from the ICP signal waveform to capture the dynamic of the signal prior to alarms. This study is based on a comprehensive dataset of 4791 manually labeled alarms recorded from 108 neurosurgical patients. A comparative analysis is provided between kernel spectral regression (SR-KDA) and support vector machine (SVM) both modified for the semi-supervised setting. Results obtained during the experimental evaluations indicate that the two models can significantly reduce false alarms using unlabeled samples; especially in the presence of a restrained number of labeled examples. At a true alarm recognition rate of 99%, the false alarm reduction rates improved from 9% (supervised) to 27% (semi-supervised) for SR-KDA, and from 3% (supervised) to 16% (semi-supervised) for SVM. (paper)

  16. Ultrasonic Technology in Duress Alarms.

    Science.gov (United States)

    Lee, Martha A.

    2000-01-01

    Provides the pros and cons of the most commonly used technologies in personal duress alarm systems in the school environment. Discussed are radio frequency devices, infrared systems, and ultrasonic technology. (GR)

  17. A new method for defining and managing process alarms and for correcting process operation when an alarm occurs

    International Nuclear Information System (INIS)

    Brooks, Robin; Thorpe, Richard; Wilson, John

    2004-01-01

    A new mathematical treatment of alarms that considers them as multi-variable interactions between process variables has provided the first-ever method to calculate values for alarm limits. This has resulted in substantial reductions in false alarms and hence in alarm annunciation rates in field trials. It has also unified alarm management, process control and product quality control into a single mathematical framework so that operations improvement and hence economic benefits are obtained at the same time as increased process safety. Additionally, an algorithm has been developed that advises what changes should be made to Manipulable process variables to clear an alarm. The multi-variable Best Operating Zone at the heart of the method is derived from existing historical data using equation-free methods. It does not require a first-principles process model or an expensive series of process identification experiments. Integral with the method is a new format Process Operator Display that uses only existing variables to fully describe the multi-variable operating space. This combination of features makes it an affordable and maintainable solution for small plants and single items of equipment as well as for the largest plants. In many cases, it also provides the justification for the investments about to be made or already made in process historian systems. Field Trials have been and are being conducted at IneosChlor and Mallinckrodt Chemicals, both in the UK, of the new geometric process control (GPC) method for improving the quality of both process operations and product by providing Process Alarms and Alerts of much high quality than ever before. The paper describes the methods used, including a simple visual method for Alarm Rationalisation that quickly delivers large sets of Consistent Alarm Limits, and the extension to full Alert Management with highlights from the Field Trials to indicate the overall effectiveness of the method in practice

  18. A new method for defining and managing process alarms and for correcting process operation when an alarm occurs

    Energy Technology Data Exchange (ETDEWEB)

    Brooks, Robin [Curvaceous Software Limited, P.O. Box 43, Gerrards Cross, Bucks SL98UX (United Kingdom)]. E-mail: enquiries@curvaceous.com; Thorpe, Richard [Curvaceous Software Limited, P.O. Box 43, Gerrards Cross, Bucks SL98UX (United Kingdom); Wilson, John [Curvaceous Software Limited, P.O. Box 43, Gerrards Cross, Bucks SL98UX (United Kingdom)

    2004-11-11

    A new mathematical treatment of alarms that considers them as multi-variable interactions between process variables has provided the first-ever method to calculate values for alarm limits. This has resulted in substantial reductions in false alarms and hence in alarm annunciation rates in field trials. It has also unified alarm management, process control and product quality control into a single mathematical framework so that operations improvement and hence economic benefits are obtained at the same time as increased process safety. Additionally, an algorithm has been developed that advises what changes should be made to Manipulable process variables to clear an alarm. The multi-variable Best Operating Zone at the heart of the method is derived from existing historical data using equation-free methods. It does not require a first-principles process model or an expensive series of process identification experiments. Integral with the method is a new format Process Operator Display that uses only existing variables to fully describe the multi-variable operating space. This combination of features makes it an affordable and maintainable solution for small plants and single items of equipment as well as for the largest plants. In many cases, it also provides the justification for the investments about to be made or already made in process historian systems. Field Trials have been and are being conducted at IneosChlor and Mallinckrodt Chemicals, both in the UK, of the new geometric process control (GPC) method for improving the quality of both process operations and product by providing Process Alarms and Alerts of much high quality than ever before. The paper describes the methods used, including a simple visual method for Alarm Rationalisation that quickly delivers large sets of Consistent Alarm Limits, and the extension to full Alert Management with highlights from the Field Trials to indicate the overall effectiveness of the method in practice.

  19. A new method for defining and managing process alarms and for correcting process operation when an alarm occurs.

    Science.gov (United States)

    Brooks, Robin; Thorpe, Richard; Wilson, John

    2004-11-11

    A new mathematical treatment of alarms that considers them as multi-variable interactions between process variables has provided the first-ever method to calculate values for alarm limits. This has resulted in substantial reductions in false alarms and hence in alarm annunciation rates in field trials. It has also unified alarm management, process control and product quality control into a single mathematical framework so that operations improvement and hence economic benefits are obtained at the same time as increased process safety. Additionally, an algorithm has been developed that advises what changes should be made to Manipulable process variables to clear an alarm. The multi-variable Best Operating Zone at the heart of the method is derived from existing historical data using equation-free methods. It does not require a first-principles process model or an expensive series of process identification experiments. Integral with the method is a new format Process Operator Display that uses only existing variables to fully describe the multi-variable operating space. This combination of features makes it an affordable and maintainable solution for small plants and single items of equipment as well as for the largest plants. In many cases, it also provides the justification for the investments about to be made or already made in process historian systems. Field Trials have been and are being conducted at IneosChlor and Mallinckrodt Chemicals, both in the UK, of the new geometric process control (GPC) method for improving the quality of both process operations and product by providing Process Alarms and Alerts of much high quality than ever before. The paper describes the methods used, including a simple visual method for Alarm Rationalisation that quickly delivers large sets of Consistent Alarm Limits, and the extension to full Alert Management with highlights from the Field Trials to indicate the overall effectiveness of the method in practice.

  20. Central alarm system replacement in NPP Krsko

    International Nuclear Information System (INIS)

    Cicvaric, D.; Susnic, M.; Djetelic, N.

    2004-01-01

    Current NPP Krsko central alarm system consists of three main segments. Main Control Board alarm system (BETA 1000), Ventilation Control Board alarm system (BETA 1000) and Electrical Control Board alarm system (BETA 1100). All sections are equipped with specific BetaTone audible alarms and silence, acknowledge as well as test push buttons. The main reason for central alarm system replacement is system obsolescence and problems with maintenance, due to lack of spare parts. Other issue is lack of system redundancy, which could lead to loss of several Alarm Light Boxes in the event of particular power supply failure. Current central alarm system does not provide means of alarm optimization, grouping or prioritization. There are three main options for central alarm system replacement: Conventional annunciator system, hybrid annunciator system and advanced alarm system. Advanced alarm system implementation requires Main Control Board upgrade, integration of process instrumentation and plant process computer as well as long time for replacement. NPP Krsko has decided to implement hybrid alarm system with patchwork approach. The new central alarm system will be stand alone, digital, with advanced filtering and alarm grouping options. Sequence of event recorder will be linked with plant process computer and time synchronized with redundant GPS signal. Advanced functions such as link to plant procedures will be implemented with plant process computer upgrade in outage 2006. Central alarm system replacement is due in outage 2004.(author)

  1. 29 CFR 1910.165 - Employee alarm systems.

    Science.gov (United States)

    2010-07-01

    ... OCCUPATIONAL SAFETY AND HEALTH STANDARDS Fire Protection Other Fire Protection Systems § 1910.165 Employee... notification to assigned personnel whenever a deficiency exists in the system. The employer shall assure that... 29 Labor 5 2010-07-01 2010-07-01 false Employee alarm systems. 1910.165 Section 1910.165 Labor...

  2. The Best Ever Alarm System Toolkit

    International Nuclear Information System (INIS)

    Kasemir, Kay; Chen, Xihui; Danilova, Ekaterina N.

    2009-01-01

    Learning from our experience with the standard Experimental Physics and Industrial Control System (EPICS) alarm handler (ALH) as well as a similar intermediate approach based on script-generated operator screens, we developed the Best Ever Alarm System Toolkit (BEAST). It is based on Java and Eclipse on the Control System Studio (CSS) platform, using a relational database (RDB) to store the configuration and log actions. It employs a Java Message Service (JMS) for communication between the modular pieces of the toolkit, which include an Alarm Server to maintain the current alarm state, an arbitrary number of Alarm Client user interfaces (GUI), and tools to annunciate alarms or log alarm related actions. Web reports allow us to monitor the alarm system performance and spot deficiencies in the alarm configuration. The Alarm Client GUI not only gives the end users various ways to view alarms in tree and table, but also makes it easy to access the guidance information, the related operator displays and other CSS tools. It also allows online configuration to be simply modified from the GUI. Coupled with a good 'alarm philosophy' on how to provide useful alarms, we can finally improve the configuration to achieve an effective alarm system.

  3. Prioritizing alarms from sensor-based detection models in livestock production - A review on model performance and alarm reducing methods

    DEFF Research Database (Denmark)

    Dominiak, Katarina Sylow; Kristensen, Anders Ringgaard

    2017-01-01

    The objective of this review is to present, evaluate and discuss methods for reducing false alarms in sensor-based detection models developed for livestock production as described in the scientific literature. Papers included in this review are all peer-reviewed and present sensor-based detection...

  4. Functional alarming and information retrieval

    International Nuclear Information System (INIS)

    Goodstein, L.P.

    1985-08-01

    This paper deals with two facets of the design and efficient utilisation by operating personnel of computer-based interfaces for monitoring and the supervisory control of complex industrial systems - e.g., power stations, chemical plants, etc. These are alarming and information retrieval both of which are extremely sensitive to computerisation. For example, the advent of computers for display requires that some means of assuring easy and rapid access to large amounts of relevant stored information be found. In this paper, alarming and information retrieval are linked together through a multilevel functional description of the target plant. This representation serves as a framework for structuring the access to information as well as defining associated ''alarms'' at the various descriptive levels. Particular attention is paid to the level where mass and energy flows and balances are relevant. It is shown that the number of alarms here is reduced considerably while information about content and interrelationships is enhanced - which at the same time eases the retrieval problem. (author)

  5. Accident alarm equipment for steam generator, especially liquid sodium heated steam generator

    International Nuclear Information System (INIS)

    Matal, O.; Jung, J.; Banovec, J.

    1982-01-01

    The alarm equipment consists of a system of sensors mounted onto the steam generator and its accessories. Each of the sensors is used for a different accident characteristic, such as the flow of sodium, the acoustic spectrum, the concentration of hydrogen in sodium. The system of sensors is connected to the common accident alarm system. The equipment will not issue the alarm signal if it receives a message from only one sensor, only when the message is confirmed from other sensors. This excludes false alarm. (M.D.)

  6. Algorithm of reducing the false positives in IDS based on correlation Analysis

    Science.gov (United States)

    Liu, Jianyi; Li, Sida; Zhang, Ru

    2018-03-01

    This paper proposes an algorithm of reducing the false positives in IDS based on correlation Analysis. Firstly, the algorithm analyzes the distinguishing characteristics of false positives and real alarms, and preliminary screen the false positives; then use the method of attribute similarity clustering to the alarms and further reduces the amount of alarms; finally, according to the characteristics of multi-step attack, associated it by the causal relationship. The paper also proposed a reverse causation algorithm based on the attack association method proposed by the predecessors, turning alarm information into a complete attack path. Experiments show that the algorithm simplifies the number of alarms, improve the efficiency of alarm processing, and contribute to attack purposes identification and alarm accuracy improvement.

  7. Object oriented design in the AGSDCS alarm system

    International Nuclear Information System (INIS)

    Morris, J.T.

    1994-01-01

    The alarm subsystem of the Alternating Gradient Synchrotron Distributed Control System (AGSDCS) has been redesigned to enhance reliability, flexibility, and ease of maintenance. The alarm system is functionally divided into Alarm Generators, Alarm Displays, and a central Alarm Receiver. The task was simplified by defining a set of C++ classes that could be reused by all components of the alarm system. The AlarmData class represents instances of alarm conditions. The AlarmFilter class is used by both the Alarm Receiver and Alarm Displays to select the alarms that are of interest to a particular user. The AlarmDatabase class is used by the Alarm Receiver to manage the central alarm database. The Alarm Displays use the AlarmDatabase class to manage the local database representing the alarms on their screens. ((orig.))

  8. A Human Factors Perspective on Alarm System Research and Development 2000 to 2010

    Energy Technology Data Exchange (ETDEWEB)

    Curt Braun; John Grimes; Eric Shaver; Ronald Boring (Principal Investigator)

    2011-09-01

    By definition, alarms serve to notify human operators of out-of-parameter conditions that could threaten equipment, the environment, product quality and, of course, human life. Given the complexities of industrial systems, human machine interfaces, and the human operator, the understanding of how alarms and humans can best work together to prevent disaster is continually developing. This review examines advances in alarm research and development from 2000 to 2010 and includes the writings of trade professionals, engineering and human factors researchers, and standards organizations with the goal of documenting advances in alarms system design, research, and implementation.

  9. Hornbills can distinguish between primate alarm calls.

    Science.gov (United States)

    Rainey, Hugo J.; Zuberbühler, Klaus; Slater, Peter J. B.

    2004-01-01

    Some mammals distinguish between and respond appropriately to the alarm calls of other mammal and bird species. However, the ability of birds to distinguish between mammal alarm calls has not been investigated. Diana monkeys (Cercopithecus diana) produce different alarm calls to two predators: crowned eagles (Stephanoaetus coronatus) and leopards (Panthera pardus). Yellow-casqued hornbills (Ceratogymna elata) are vulnerable to predation by crowned eagles but are not preyed on by leopards and might therefore be expected to respond to the Diana monkey eagle alarm call but not to the leopard alarm call. We compared responses of hornbills to playback of eagle shrieks, leopard growls, Diana monkey eagle alarm calls and Diana monkey leopard alarm calls and found that they distinguished appropriately between the two predator vocalizations as well as between the two Diana monkey alarm calls. We discuss possible mechanisms leading to these responses. PMID:15209110

  10. Fire auto alarm system intelligent trend

    International Nuclear Information System (INIS)

    Du Chengbao

    1997-01-01

    The author gives the course and trend of the fire alarm system going to more computerized and more intelligent. It is described that only the system applied artificial intelligent and confusion control is the true intelligent fire alarm system. The author gives the detailed analysis on the signal treatment of artificial intelligent applied to analogue fire alarm system as well as the alarm system controlled by confusion technology and artificial nervous net

  11. 46 CFR 76.15-30 - Alarms.

    Science.gov (United States)

    2010-10-01

    ... than paint and lamp lockers and similar small spaces, shall be fitted with an approved audible alarm in... required to be fitted with a delayed discharge. Such alarms shall be so arranged as to sound during the 20 second delay period prior to the discharge of carbon dioxide into the space, and the alarm shall depend...

  12. The False Memory and the Mirror Effects: The Role of Familiarity and Backward Association in Creating False Recollections

    Science.gov (United States)

    Anaki, D.; Faran, Y.; Ben-Shalom, D.; Henik, A.

    2005-01-01

    The mirror effect refers to a phenomenon where the hit rate is higher for low frequency words while the false alarm rate is higher for high frequency distractors. Using a false memory paradigm (Roediger & McDermott, 1995), we examined whether false memory for non-presented lures would be influenced by the lure's familiarity. The results revealed…

  13. SUBSURFACE VISUAL ALARM SYSTEM ANALYSIS

    International Nuclear Information System (INIS)

    D.W. Markman

    2001-01-01

    The ''Subsurface Fire Hazard Analysis'' (CRWMS M andO 1998, page 61), and the document, ''Title III Evaluation Report for the Surface and Subsurface Communication System'', (CRWMS M andO 1999a, pages 21 and 23), both indicate the installed communication system is adequate to support Exploratory Studies Facility (ESF) activities with the exception of the mine phone system for emergency notification purposes. They recommend the installation of a visual alarm system to supplement the page/party phone system The purpose of this analysis is to identify data communication highway design approaches, and provide justification for the selected or recommended alternatives for the data communication of the subsurface visual alarm system. This analysis is being prepared to document a basis for the design selection of the data communication method. This analysis will briefly describe existing data or voice communication or monitoring systems within the ESF, and look at how these may be revised or adapted to support the needed data highway of the subsurface visual alarm. system. The existing PLC communication system installed in subsurface is providing data communication for alcove No.5 ventilation fans, south portal ventilation fans, bulkhead doors and generator monitoring system. It is given that the data communication of the subsurface visual alarm system will be a digital based system. It is also given that it is most feasible to take advantage of existing systems and equipment and not consider an entirely new data communication system design and installation. The scope and primary objectives of this analysis are to: (1) Briefly review and describe existing available data communication highways or systems within the ESF. (2) Examine technical characteristics of an existing system to disqualify a design alternative is paramount in minimizing the number of and depth of a system review. (3) Apply general engineering design practices or criteria such as relative cost, and degree

  14. HYBRID ALARM SYSTEMS: COMBINING SPATIAL ALARMS AND ALARM LISTS FOR OPTIMIZED CONTROL ROOM OPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Ronald L. Boring; J.J. Persensky

    2012-07-01

    The US Department of Energy (DOE) is sponsoring research, development, and deployment on Light Water Reactor Sustainability (LWRS), in which the Idaho National Laboratory (INL) is working closely with nuclear utilities to develop technologies and solutions to help ensure the safe operational life extension of current nuclear power plants. One of the main areas of focus is control room modernization. Within control room modernization, alarm system upgrades present opportunities to meet the broader goals of the LWRS project in demonstrating the use and safety of the advanced instrumentation and control (I&C) technologies and the short-term and longer term objectives of the plant. In this paper, we review approaches for and human factors issues behind upgrading alarms in the main control room of nuclear power plants.

  15. Ionization smoke detector and alarm system

    International Nuclear Information System (INIS)

    1974-01-01

    An ionization smoke detector particularly suited to residential use is disclosed. The detector is battery-operated and is connected with a non-latching, pulsating alarm circuit. The detector has a sensing chamber formed by a perforated metallic shell and an electrode within which an insulated radiation source is centrally positioned to generate an ionization current for detecting smoke or other similar aerosols. The alarm circuit provides a pulsating alarm signal when smoke levels above a pre-determined value are sensed. The alarm circuit also includes a low voltage detection circuit for sounding the alarm when the end of useful battery life is approaching. (Auth.)

  16. Alarm Fatigue vs User Expectations Regarding Context-Aware Alarm Handling in Hospital Environments Using CallMeSmart.

    Science.gov (United States)

    Solvoll, Terje; Arntsen, Harald; Hartvigsen, Gunnar

    2017-01-01

    Surveys and research show that mobile communication systems in hospital settings are old and cause frequent interruptions. In the quest to remedy this, an Android based communication system called CallMeSmart tries to encapsulate most of the frequent communication into one hand held device focusing on reducing interruptions and at the same time make the workday easier for healthcare workers. The objective of CallMeSmart is to use context-awareness techniques to automatically monitor the availability of physicians' and nurses', and use this information to prevent or route phone calls, text messages, pages and alarms that would otherwise compromise patient care. In this paper, we present the results from interviewing nurses on alarm fatigue and their expectations regarding context-aware alarm handling using CallMeSmart.

  17. A questionnaire comparison of two alarm systems

    International Nuclear Information System (INIS)

    Collier, Steven G.

    1997-11-01

    A questionnaire was developed, based on guidelines for alarm system design given in NUREG/CR-6105. The intentions were both to develop a subjective instrument for rating the effectiveness of alarm systems and to learn lessons on alarm system design from a comparison of two systems. The questionnaire was administered to reactor operations staff at two locations with different alarm systems embedded in a simulation of the same underlying PWR power plant: Loviisa NPP and Halden Man-Machine Laboratory. The questionnaire, considered as a measuring instrument, had good to high reliability and moderate to good content validity. The questionnaire is considered suitable for further use in the shortened form resulting from this study. Further work is also recommended. The degree of reliability and validity also lend a degree of validation to the NUREG guidelines. The questionnaire was able to show differences between ratings of the two alarm systems. The Loviisa system showed more consistency with other control room features and was better at drawing the operators' attention to important alarms. Both systems were not rated particularly well on alarm prioritisation and spurious alarms. The Halden system was better at showing naturally occurring relationships between alarms. Some of these differences may have been due to the subjects' greater familiarity with the Loviisa alarm system. The results nevertheless show that the questionnaire can measure subjective responses to alarm systems. (author)

  18. Alarm system for ABWR main control panels

    Energy Technology Data Exchange (ETDEWEB)

    Kobayashi, Yuji; Saito, Koji [Toshiba Corp., Yokohoma (Japan)

    1997-09-01

    TOSHIBA has developed integrated digital control and instrumentation system for ABWR, which is the third-generation man machine interface system for main control room that we call A-PODIA (Advanced PODIA). A-Podia has been introduced the first actual ABWR plant in Japan. in A-PODIA, TOSHIBA has realized improvement of alarm system that all operator crews in the control room can recognize plant anomalies easily. The alarm system can recognize essential alarms for plant safety easily and understand annunciators with each integrated annunciators and their prioritized color easily by classifying alarms into plant-level essential annunciators, system-level integrated annunciators and equipment level individual annunciators with hierarchical structure. This paper describes conventional alarm system and the design philosophy, alarm system design and operation of ``Alarm System for ABWR Main Control Panels``. (author). 5 refs, 8 figs, 1 tab.

  19. Evaluating alternative responses to safeguards alarms

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; McCord, R.K.

    1982-01-01

    This paper describes a quantitative approach to help evaluate and respond to safeguards alarms. These alarms may be generated internally by a facility's safeguards systems or externally by individuals claiming to have stolen special nuclear material (SNM). This approach can be used to identify the most likely cause of an alarm - theft, hoax, or error - and to evaluate alternative responses to alarms. Possible responses include conducting investigations, initiating measures to recover stolen SNM, and replying to external threats. Based on the results of each alarm investigation step, the evaluation revises the likelihoods of possible causes of an alarm, and uses this information to determine the optimal sequence of further responses. The choice of an optimal sequence of responses takes into consideration the costs and benefits of successful thefts or hoaxes. These results provide an analytical basis for setting priorities and developing contingency plans for responding to safeguards alarms

  20. Alarm system for ABWR main control panels

    International Nuclear Information System (INIS)

    Kobayashi, Yuji; Saito, Koji

    1997-01-01

    TOSHIBA has developed integrated digital control and instrumentation system for ABWR, which is the third-generation man machine interface system for main control room that we call A-PODIA (Advanced PODIA). A-Podia has been introduced the first actual ABWR plant in Japan. in A-PODIA, TOSHIBA has realized improvement of alarm system that all operator crews in the control room can recognize plant anomalies easily. The alarm system can recognize essential alarms for plant safety easily and understand annunciators with each integrated annunciators and their prioritized color easily by classifying alarms into plant-level essential annunciators, system-level integrated annunciators and equipment level individual annunciators with hierarchical structure. This paper describes conventional alarm system and the design philosophy, alarm system design and operation of ''Alarm System for ABWR Main Control Panels''. (author). 5 refs, 8 figs, 1 tab

  1. Alarm-Processing in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Otazo, J; Fernandez, R

    2000-01-01

    Information overload due to the activation of a great number of alarms in a short time is a common problem for the operator in the control room of a industrial plant, mainly in complex process like the nuclear power plants.The problem is the conventional conception of the alarm system, that defines each alarm like a separated and independent entity of the global situation of the plant.A direct consequence is the generation of multiple alarms during a significative disturbance in the process, being most of them redundant and irrelevant to the actual process state wich involves an extra load to the operator, who wastes time in acting selecting the important alarms of the group that appears or lead to a an erroneous action.The present work first describes the techniques developed in the last years to attack the avalanche of alarms problem.Later we present our approach to alarm-processing: an expert system as alarm-filter.Our objective is collect in the system the state of the art in the development of advanced alarm systems, offering an improvement of the information flow to the operators through the suppression of nonsignificant alarms and a structured visualization of the process state.Such support is important during a disturbance for the identification of plant state, diagnosis, consequence prediction and corrective actions.The system is arranged in three stages: alarm-generation, alarm-filter and alarm-presentation.The alarm-generation uses conventional techniques or receives them from an external system.The alarm-filter uses suppression techniques based on: irrelevance analysis with the operation mode and the state of components, causal reasoning and static importance analysis.The alarm presentation is made through a structured way using a priority scheme with three level.The knowledge representation of each alarm is based on frames and a graph of alarms for global knowledge, where the connections between nodes represent causal and irrelevance relations

  2. Differences in alarm events between disposable and reusable electrocardiography lead wires.

    Science.gov (United States)

    Albert, Nancy M; Murray, Terri; Bena, James F; Slifcak, Ellen; Roach, Joel D; Spence, Jackie; Burkle, Alicia

    2015-01-01

    Disposable electrocardiographic lead wires (ECG-LWs) may not be as durable as reusable ones. To examine differences in alarm events between disposable and reusable ECG-LWs. Two cardiac telemetry units were randomized to reusable ECG-LWs, and 2 units alternated between disposable and reusable ECG-LWs for 4 months. A remote monitoring team, blinded to ECG-LW type, assessed frequency and type of alarm events by using total counts and rates per 100 patient days. Event rates were compared by using generalized linear mixed-effect models for differences and noninferiority between wire types. In 1611 patients and 9385.5 patient days of ECG monitoring, patient characteristics were similar between groups. Rates of alarms for no telemetry, leads fail, or leads off were lower in disposable ECG-LWs (adjusted relative risk [95% CI], 0.71 [0.53-0.96]; noninferiority P < .001; superiority P = .03) and monitoring (artifact) alarms were significantly noninferior (adjusted relative risk [95% CI]: 0.88, [0.62-1.24], P = .02; superiority P = .44). No between-group differences existed in false or true crisis alarms. Disposable ECG-LWs were noninferior to reusable ECG-LWs for all false-alarm events (N [rate per 100 patient days], disposable 2029 [79.1] vs reusable 6673 [97.9]; adjusted relative risk [95% CI]: 0.81 [0.63-1.06], P = .002; superiority P = .12.) Disposable ECG-LWs with patented push-button design had superior performance in reducing alarms created by no telemetry, leads fail, or leads off and significant noninferiority in all false-alarm rates compared with reusable ECG-LWs. Fewer ECG alarms may save nurses time, decrease alarm fatigue, and improve patient safety. ©2015 American Association of Critical-Care Nurses.

  3. Video systems for alarm assessment

    International Nuclear Information System (INIS)

    Greenwoll, D.A.; Matter, J.C.; Ebel, P.E.

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs

  4. Video systems for alarm assessment

    Energy Technology Data Exchange (ETDEWEB)

    Greenwoll, D.A.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Ebel, P.E. (BE, Inc., Barnwell, SC (United States))

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs.

  5. Using Reduced Inoculum Densities of Mycobacterium tuberculosis in MGIT Pyrazinamide Susceptibility Testing to Prevent False-Resistant Results and Improve Accuracy: A Multicenter Evaluation

    Directory of Open Access Journals (Sweden)

    Glenn P. Morlock

    2017-01-01

    Full Text Available The primary platform used for pyrazinamide (PZA susceptibility testing of Mycobacterium tuberculosis is the MGIT culture system (Becton Dickinson. Since false-resistant results have been associated with the use of this system, we conducted a multicenter evaluation to determine the effect of using a reduced cell density inoculum on the rate of false resistance. Two reduced inoculum densities were compared with that prescribed by the manufacturer (designated as “BD” method. The reduced inoculum methods (designated as “A” and “C” were identical to the manufacturer’s protocol in all aspects with the exception of the cell density of the inoculum. Twenty genetically and phenotypically characterized M. tuberculosis isolates were tested in duplicate by ten independent laboratories using the three inoculum methods. False-resistant results declined from 21.1% using the standard “BD” method to 5.7% using the intermediate (“A” inoculum and further declined to 2.8% using the most dilute (“C” inoculum method. The percentages of the resistant results that were false-resistant declined from 55.2% for the “BD” test to 28.8% and 16.0% for the “A” and “C” tests, respectively. These results represent compelling evidence that the occurrence of false-resistant MGIT PZA susceptibility test results can be mitigated through the use of reduced inoculum densities.

  6. Improvement of human cell line activation test (h-CLAT) using short-time exposure methods for prevention of false-negative results.

    Science.gov (United States)

    Narita, Kazuto; Ishii, Yuuki; Vo, Phuc Thi Hong; Nakagawa, Fumiko; Ogata, Shinichi; Yamashita, Kunihiko; Kojima, Hajime; Itagaki, Hiroshi

    2018-01-01

    Recently, animal testing has been affected by increasing ethical, social, and political concerns regarding animal welfare. Several in vitro safety tests for evaluating skin sensitization, such as the human cell line activation test (h-CLAT), have been proposed. However, similar to other tests, the h-CLAT has produced false-negative results, including in tests for acid anhydride and water-insoluble chemicals. In a previous study, we demonstrated that the cause of false-negative results from phthalic anhydride was hydrolysis by an aqueous vehicle, with IL-8 release from THP-1 cells, and that short-time exposure to liquid paraffin (LP) dispersion medium could reduce false-negative results from acid anhydrides. In the present study, we modified the h-CLAT by applying this exposure method. We found that the modified h-CLAT is a promising method for reducing false-negative results obtained from acid anhydrides and chemicals with octanol-water partition coefficients (LogK ow ) greater than 3.5. Based on the outcomes from the present study, a combination of the original and the modified h-CLAT is suggested for reducing false-negative results. Notably, the combination method provided a sensitivity of 95% (overall chemicals) or 93% (chemicals with LogK ow > 2.0), and an accuracy of 88% (overall chemicals) or 81% (chemicals with LogK ow > 2.0). We found that the combined method is a promising evaluation scheme for reducing false-negative results seen in existing in vitro skin-sensitization tests. In the future, we expect a combination of original and modified h-CLAT to be applied in a newly developed in vitro test for evaluating skin sensitization.

  7. An alarm multiplexer communication system

    International Nuclear Information System (INIS)

    Herrera, G.V.

    1986-01-01

    A low cost Alarm Multiplexer Communication System (AMCS) has been developed to perform the security sensor monitoring and control functions and to provide remote relay control capability for integrated security systems. AMCS has a distributed multiplexer/repeater architecture with up to four dual communication loops and dual control computers that guarantee total system operation under any single point failure condition. Each AMCS can control up to 4096 sensors and 2048 remote relays. AMCS reports alarm status information to and is controlled by either one or two Host computers. This allows for independent operation of primary and backup security command centers. AMCS communicates with the Host computers over an asynchronous serial communication link and has a message protocol which allows AMCS to fully recover from lost messages or large blocks of data communication errors. This paper describes the AMCS theory of operation, AMCS fault modes, and AMCS system design methodology. Also, cost and timing information is presented. AMCS is being used and considered for several DOE and DOD facilities

  8. Ecological alarm system for Itaipu

    Energy Technology Data Exchange (ETDEWEB)

    Faehser, L.

    1984-05-01

    At Itaipu, on the Rio Parana, Brazil and Paraguay are constructing the world's largest hydro-electric power plant with a capacity seven times as high as that of Assuan. An information system is intended to give fair warning in case of threatening ecological conditions. The computer-supported alarm system had four objectives: 1. presentation of the present ecological situation; 2. evaluation of the ecological risks; 3. warning about ecological deficits; 4. suggestions for establishing ecological stability. In a first step the available inventory data concerning soil, topography, vegetation and water were evaluated by expert groups according to their risk grade (0-4) and ecological weight (1-10). The product of these evaluations indicates the ecological deficit (0-40). At a threshold value of 30, the information system automatically signals ecological alarm and locates the centre of danger via computer-plotted maps and tables. The necessary data are supplied periodically by selected measurement stations. Quantification of ecological facts enables the persons who are responsible for decisions at Itaipu to recognize, avoid, or diminish elements of danger even if they have little or no ecological knowledge. The file of data that has been compiled so far should be extended parallel with the development in the Itaipu area. With the help of factor analysis connections of cause and effect can be detected in this extremely complex reservoir system which has hardly been explored yet.

  9. Look Again: An Investigation of False Positive Detections in Combat Models

    National Research Council Canada - National Science Library

    Wainwright, Ryan K

    2008-01-01

    .... Existing combat models tend to overlook or downplay false positive detections. Signal Detection Theory provides the framework for analysis of an observer's hits, misses, correct rejections, and false alarms...

  10. Urethral alarm probe for permanent prostate implants

    International Nuclear Information System (INIS)

    Cutajar, D.; Lerch, M.; Takacs, G.

    2008-01-01

    We have developed a urethral dosimetry system for real time dose verification along the urethra during permanent implant prostate brachytherapy. The urethral alarm uses 'spectroscopic dosimetry' to calculate the dose rate along the urethra in real time. The application of spectroscopic dosimetry for the urethral alarm probe was verified using Monte Carlo calculations. In phantom depth dose measurements as well as isotropy measurements were performed to verify the usefulness of the urethra alarm probe as an in vivo real time dosimeter. (author)

  11. Alarm management for storage and transportation terminals; Gerenciamento de alarmes para terminais de transferencia e estocagem

    Energy Technology Data Exchange (ETDEWEB)

    Loureiro, Patricia [PETROBRAS, Rio de Janeiro, RJ (Brazil); Feldman, Rafael Noac [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    Recently, in many industrial segments, it has been taken into account the issues related to the high amount of alarms that are announced in the control rooms, even if the industrial process is under normal conditions. Recent studies and surveys have shown that the three major problems related to it are: alarms that remain active during normal operation; alarms that remain chattering during an operational period; the phenomenon called Alarm flood, that occurs when an extensive amount of alarms is announced and the operator does not have enough time to take effective actions. In order to reduce or to eliminate the two above mentioned causes, alarm analysis and housekeeping, called Alarm Rationalization, have been efficient in major cases, because such facts occur mainly due to inadequate limits definition and/or equipment and instruments out of service or in maintenance. Such alarms are called in the literature as bad-actors or villains, and their occurrences may reach up to 50% of the daily total amount of alarms. This paper aims to present the main results of a project named Alarm Management for Transfer and Storage Terminals. The project development is based on two different terminal surveys, in order not only to identify the most frequent causes of undesirable alarms, but also to generate design standards. The main phases of the project are: alarm rationalization based on bad-actors detection; generate a set of design and operation standards; generate an Alarm Philosophy document for the Terminals. (author)

  12. Identification and Isolation of Human Alarm Pheromones

    National Research Council Canada - National Science Library

    Mujica-Parodi, Lilianne R; Strey, Helmut

    2006-01-01

    .... Task I, Optimization of Sample Collection, focused on the collection of the putative alarm pheromone via axillary sweat samples obtained during reference (physical exercise) and arousal (skydive) conditions...

  13. Advanced alarm systems: Display and processing issues

    Energy Technology Data Exchange (ETDEWEB)

    O`Hara, J.M. [Brookhaven National Lab., Upton, NY (United States); Wachtel, J.; Perensky, J. [US Nuclear Regulatory Commission, Washington, DC (United States). Office of Nuclear Regulatory Research

    1995-05-01

    This paper describes a research program sponsored by the US Nuclear Regulatory Commission to address the human factors engineering (HFE) deficiencies associated with nuclear power plant alarm systems. The overall objective of the study is to develop HFE review guidance for alarm systems. In support of this objective, human performance issues needing additional research were identified. Among the important issues were alarm processing strategies and alarm display techniques. This paper will discuss these issues and briefly describe our current research plan to address them.

  14. Failure of Quality Control Measures To Prevent Reporting of False Resistance to Imipenem, Resulting in a Pseudo-Outbreak of Imipenem-Resistant Pseudomonas aeruginosa

    Science.gov (United States)

    Carmeli, Yehuda; Eichelberger, Karen; Soja, Don; Dakos, Joanna; Venkataraman, Lata; DeGirolami, Paola; Samore, Matthew

    1998-01-01

    False results showing an outbreak of Pseudomonas aeruginosa with resistance to imipenem were traced to a defective lot of microdilution MIC testing panels. These panels contained two- to threefold lower concentrations of imipenem than expected and resulted in artifactual two- to fourfold increases in MICs of imipenem. The quality-control MIC results for Pseudomonas aeruginosa ATCC 27853 were 4 μg/ml, the highest value within the range recommended by the National Committee for Clinical Laboratory Standards. We recommend that this value be considered out of the quality-control range. PMID:9466787

  15. TMACS test procedure TP001: Alarm management. Revision 6

    International Nuclear Information System (INIS)

    Scanlan, P.K.

    1994-01-01

    The TMACS Software Project Test Procedures translate the project's acceptance criteria into test steps. Software releases are certified when the affected Test Procedures are successfully performed and the customers authorize installation of these changes. This Test Procedure addresses the Alarm Management requirements of the TMACS. The features to be tested are: real-time alarming on high and low level and discrete alarms, equipment alarms, dead-band filtering, alarm display color coding, alarm acknowledgement, and alarm logging

  16. Advanced pulse oximeter signal processing technology compared to simple averaging. I. Effect on frequency of alarms in the operating room.

    Science.gov (United States)

    Rheineck-Leyssius, A T; Kalkman, C J

    1999-05-01

    To determine the effect of a new signal processing technique (Oxismart, Nellcor, Inc., Pleasanton, CA) on the incidence of false pulse oximeter alarms in the operating room (OR). Prospective observational study. Nonuniversity hospital. 53 ASA physical status I, II, and III consecutive patients undergoing general anesthesia with tracheal intubation. In the OR we compared the number of alarms produced by a recently developed third generation pulse oximeter (Nellcor Symphony N-3000) with Oxismart signal processing technique and a conventional pulse oximeter (Criticare 504). Three pulse oximeters were used simultaneously in each patient: a Nellcor pulse oximeter, a Criticare with the signal averaging time set at 3 seconds (Criticareaverage3s) and a similar unit with the signal averaging time set at 21 seconds (Criticareaverage21s). For each pulse oximeter, the number of false (artifact) alarms was counted. One false alarm was produced by the Nellcor (duration 55 sec) and one false alarm by the Criticareaverage21s monitor (5 sec). The incidence of false alarms was higher in Criticareaverage3s. In eight patients, Criticareaverage3s produced 20 false alarms (p signal processing compared with the Criticare monitor with the longer averaging time of 21 seconds.

  17. The CANDU alarm analysis tool (CAAT)

    Energy Technology Data Exchange (ETDEWEB)

    Davey, E C; Feher, M P; Lupton, L R [Control Centre Technology Branch, ON (Canada)

    1997-09-01

    AECL undertook the development of a software tool to assist alarm system designers and maintainers based on feedback from several utilities and design groups. The software application is called the CANDU Alarm Analysis Tool (CAAT) and is being developed to: Reduce by one half the effort required to initially implement and commission alarm system improvements; improve the operational relevance, consistency and accuracy of station alarm information; record the basis for alarm-related decisions; provide printed reports of the current alarm configuration; and, make day-to-day maintenance of the alarm database less tedious and more cost-effective. The CAAT assists users in accessing, sorting and recording relevant information, design rules, decisions, and provides reports in support of alarm system maintenance, analysis of design changes, or regulatory inquiry. The paper discusses the need for such a tool, outlines the application objectives and principles used to guide tool development, describes the how specific tool features support user design and maintenance tasks, and relates the lessons learned from early application experience. (author). 4 refs, 2 figs.

  18. Display-And-Alarm Circuit For Accelerometer

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1995-01-01

    Compact accelerometer assembly consists of commercial accelerometer retrofit with display-and-alarm circuit. Provides simple means for technician attending machine to monitor vibrations. Also simpifies automatic safety shutdown by providing local alarm or shutdown signal when vibration exceeds preset level.

  19. T-Farm complex alarm upgrades

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, J.B.

    1995-01-01

    The alarm and controls associated with the T, TX, and TY farms are located in the 242-T control room. The design data for replacement and upgrades of the alarm panels is in this document. This task was canceled previous to the 90% design review point.

  20. The CANDU alarm analysis tool (CAAT)

    International Nuclear Information System (INIS)

    Davey, E.C.; Feher, M.P.; Lupton, L.R.

    1997-01-01

    AECL undertook the development of a software tool to assist alarm system designers and maintainers based on feedback from several utilities and design groups. The software application is called the CANDU Alarm Analysis Tool (CAAT) and is being developed to: Reduce by one half the effort required to initially implement and commission alarm system improvements; improve the operational relevance, consistency and accuracy of station alarm information; record the basis for alarm-related decisions; provide printed reports of the current alarm configuration; and, make day-to-day maintenance of the alarm database less tedious and more cost-effective. The CAAT assists users in accessing, sorting and recording relevant information, design rules, decisions, and provides reports in support of alarm system maintenance, analysis of design changes, or regulatory inquiry. The paper discusses the need for such a tool, outlines the application objectives and principles used to guide tool development, describes the how specific tool features support user design and maintenance tasks, and relates the lessons learned from early application experience. (author). 4 refs, 2 figs

  1. Useful and usable alarm systems : recommended properties

    International Nuclear Information System (INIS)

    Veland, Oeystein; Kaarstad, Magnhild; Seim, Lars Aage; Foerdestroemmen, Nils T.

    2001-01-01

    This document describes the result of a study on alarm systems conducted by IFE in Halden. The study was initiated by the Norwegian Petroleum Directorate. The objective was to identify and formulate a set of important properties for useful and usable alarm systems. The study is mainly based on review of the latest international recognised guidelines and standards on alarm systems available at the time of writing, with focus on realistic solutions from research and best practice from different industries. In addition, IFE experiences gathered through specification and design of alarm systems and experimental activities in HAMMLAB and bilateral projects, have been utilized where relevant. The document presents a total of 43 recommendations divided into a number of general recommendations and more detailed recommendations on alarm generation, structuring, prioritisation, presentation and handling. (Author)

  2. Plant experience with an expert system for alarm diagnosis

    International Nuclear Information System (INIS)

    Gimmy, K.L.

    1986-01-01

    An expert system called Diagnosis of Multiple Alarms (DMA) is in routine use at four nuclear reactors operated by the DuPont Company. The system is wired to plant alarm annunciators and does event-tree analysis to see if a pattern exists. Any diagnosis is displayed to the plant operator and the corrective procedure to be followed is also identified. The display is automatically superseded if a higher priority diagnosis is made. The system is integrated with operator training and procedures. Operating results have been positive. DMA has diagnosed several hard-to-locate small leaks. There have been some false diagnosis, and realistic plant environments must be considered in such expert systems. 2 refs., 5 figs

  3. Alarm processing system using AI techniques for nuclear power plant

    International Nuclear Information System (INIS)

    Yang, Joon On; Chang, Soon Heung

    1990-01-01

    An alarm processing system (APS) has been developed using artificial intelligence (AI) techniques. The alarms of nuclear power plants (NPP's) are classified into the generalized and special alarms. The generalized alarms are also classified into the global and local alarms. For each type of alarms, the specific processing rules are applied to filter and suppress unnecessary and potentially misleading alarms. The local processing are based on 'model-based reasoning.' The global and special alarms are processed by using the general cause-consequence check rules. The priorities of alarms are determined according to the plant state and the consistencies between them

  4. Comprehensive smoke alarm coverage in lower economic status homes: alarm presence, functionality, and placement.

    Science.gov (United States)

    Sidman, Elanor A; Grossman, David C; Mueller, Beth A

    2011-08-01

    The objectives of this study are to estimate smoke alarm coverage and adherence with national guidelines in low- to mid-value owner-occupied residences, and to identify resident demographic, behavioral, and building characteristics and other fire and burn safety practices associated with smoke alarm utilization. Baseline visits were conducted with 779 households in King County, Washington, for a randomized trial of smoke alarm functionality. Presence, functionality, features, and location of pre-existing smoke alarms were ascertained by staff observation and testing. Household and building descriptors were collected using questionnaires. Households were classified by presence of smoke alarms, functional alarms, and functional and properly mounted alarms placed in hallways and on each floor but not in recommended avoidance locations. Smoke alarms were present in 89%, and functional units in 78%, of households. Only 6-38% met all assessed functionality and placement recommendations. Homes frequently lacked alarms in any bedrooms or on each floor. Building age, but not renovation status, was associated with all dimensions of smoke alarm coverage; post-1980 constructions were 1.7 times more likely to comply with placement recommendations than were pre-1941 homes (95% CI: 1.1-2.6). Respondent education and race/ethnicity, children wood stoves and fireplaces, number of smoke alarms, recency of smoke alarm testing, carbon monoxide monitors, and fire ladders displayed varying relationships with alarm presence, functionality, and placement. Strategies for maintaining smoke alarms in functional condition and improving compliance with placement recommendations are necessary to achieve universal coverage, and will benefit the majority of households.

  5. Development and Application of a Clinical Microsystem Simulation Methodology for Human Factors-Based Research of Alarm Fatigue.

    Science.gov (United States)

    Kobayashi, Leo; Gosbee, John W; Merck, Derek L

    2017-07-01

    (1) To develop a clinical microsystem simulation methodology for alarm fatigue research with a human factors engineering (HFE) assessment framework and (2) to explore its application to the comparative examination of different approaches to patient monitoring and provider notification. Problems with the design, implementation, and real-world use of patient monitoring systems result in alarm fatigue. A multidisciplinary team is developing an open-source tool kit to promote bedside informatics research and mitigate alarm fatigue. Simulation, HFE, and computer science experts created a novel simulation methodology to study alarm fatigue. Featuring multiple interconnected simulated patient scenarios with scripted timeline, "distractor" patient care tasks, and triggered true and false alarms, the methodology incorporated objective metrics to assess provider and system performance. Developed materials were implemented during institutional review board-approved study sessions that assessed and compared an experimental multiparametric alerting system with a standard monitor telemetry system for subject response, use characteristics, and end-user feedback. A four-patient simulation setup featuring objective metrics for participant task-related performance and response to alarms was developed along with accompanying structured HFE assessment (questionnaire and interview) for monitor systems use testing. Two pilot and four study sessions with individual nurse subjects elicited true alarm and false alarm responses (including diversion from assigned tasks) as well as nonresponses to true alarms. In-simulation observation and subject questionnaires were used to test the experimental system's approach to suppressing false alarms and alerting providers. A novel investigative methodology applied simulation and HFE techniques to replicate and study alarm fatigue in controlled settings for systems assessment and experimental research purposes.

  6. Reactor alarm system development and application issues

    Energy Technology Data Exchange (ETDEWEB)

    Drexler, J E; Oicese, G O [INVAP S.E. (Argentina)

    1997-09-01

    The new hardware and software technologies, and the need in research reactors for assistance systems in operation and maintenance, have given an appropriate background to develop a computer based system named ``Reactor Alarm System`` (RAS). RAS is a software package, user oriented, with emphasis on production, experiments and maintenance goals. It is designed to run on distributed systems conformed with microcomputers under QNX operating system. RAS main features are: (a) Alarm Panel Display; (b) Alarm Page; (c) Alarm Masking and Inhibition; (d) Alarms Color and Attributes; (e) Condition Classification; and (f) Arrangement Presentation. RAS design allows it to be installed as a part of a computer based Supervision and Control System in new installations or retrofit existing reactor instrumentation systems. The analysis of human factors during development stage and successive user feedback from different applications, brought out several RAS improvements: (a) Multiple-copy alarm summaries; (b) Improved alarm handling; (c) Extended dictionary; and (d) Enhanced hardware availability. It has proved successful in providing new capabilities for operators, and also has shown the continuous increase of user-demands, reflecting the expectations placed today on computer-based systems. (author). 6 figs, 1 tabs.

  7. Reactor alarm system development and application issues

    International Nuclear Information System (INIS)

    Drexler, J.E.; Oicese, G.O.

    1997-01-01

    The new hardware and software technologies, and the need in research reactors for assistance systems in operation and maintenance, have given an appropriate background to develop a computer based system named ''Reactor Alarm System'' (RAS). RAS is a software package, user oriented, with emphasis on production, experiments and maintenance goals. It is designed to run on distributed systems conformed with microcomputers under QNX operating system. RAS main features are: a) Alarm Panel Display; b) Alarm Page; c) Alarm Masking and Inhibition; d) Alarms Color and Attributes; e) Condition Classification; and f) Arrangement Presentation. RAS design allows it to be installed as a part of a computer based Supervision and Control System in new installations or retrofit existing reactor instrumentation systems. The analysis of human factors during development stage and successive user feedback from different applications, brought out several RAS improvements: a) Multiple-copy alarm summaries; b) Improved alarm handling; c) Extended dictionary; and d) Enhanced hardware availability. It has proved successful in providing new capabilities for operators, and also has shown the continuous increase of user-demands, reflecting the expectations placed today on computer-based systems. (author). 6 figs, 1 tabs

  8. Alarm criteria in radiation portal monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Burr, Tom [Los Alamos National Laboratory, Statistical Sciences Group, Mail Stop F600, Los Alamos, NM 87545 (United States)]. E-mail: tburr@lanl.gov; Gattiker, James R. [Los Alamos National Laboratory, Statistical Sciences Group, Mail Stop F600, Los Alamos, NM 87545 (United States); Myers, Kary [Los Alamos National Laboratory, Statistical Sciences Group, Mail Stop F600, Los Alamos, NM 87545 (United States); Tompkins, George [Los Alamos National Laboratory, Risk Analysis and Decision Support Systems, Stop F609, Los Alamos, NM 87545 (United States)

    2007-05-15

    Gamma detectors at border crossings are intended to detect illicit nuclear material. These detectors collect counts that are used to determine whether to trigger an alarm. Several candidate alarm rules are evaluated, with attention to background suppression caused by the vehicle. Because the count criterion leads to many nuisance alarms and because background suppression by the vehicle is smaller for ratios of counts, analysis of a ratio criterion is included. Detection probability results that consider the effects of 5 factors are given for 2 signal-injection studies, 1 for counts, and 1 for count ratios.

  9. Alarm criteria in radiation portal monitoring

    International Nuclear Information System (INIS)

    Burr, Tom; Gattiker, James R.; Myers, Kary; Tompkins, George

    2007-01-01

    Gamma detectors at border crossings are intended to detect illicit nuclear material. These detectors collect counts that are used to determine whether to trigger an alarm. Several candidate alarm rules are evaluated, with attention to background suppression caused by the vehicle. Because the count criterion leads to many nuisance alarms and because background suppression by the vehicle is smaller for ratios of counts, analysis of a ratio criterion is included. Detection probability results that consider the effects of 5 factors are given for 2 signal-injection studies, 1 for counts, and 1 for count ratios

  10. Wallac automatic alarm dosimeter type RAD21

    International Nuclear Information System (INIS)

    Burgess, P. H.; Iles, W.J.

    1980-02-01

    The Automatic Alarm Dosimeter type RAD 21 is a batterypowered personal dosemeter and exposure rate alarm monitor, designed to be worn on the body, covering an exposure range from 0.1 to 999.9 mR and has an audible alarm which can be pre-set over the range 1 mR h -1 to 250 mR h -1 . The instrument is designed to measure x- and γ radiation over the energy range 50 keV to 3 MeV. The facilities and controls, the radiation, electrical, environmental and mechanical characteristics, and the manual, have been evaluated. (U.K.)

  11. Recommended practice for the design of a computer driven Alarm Display Facility for central control rooms of nuclear power generating stations

    International Nuclear Information System (INIS)

    Ben-Yaacov, G.

    1984-01-01

    This paper's objective is to explain the process by which design can prevent human errors in nuclear plant operation. Human factor engineering principles, data, and methods used in the design of computer driven alarm display facilities are discussed. A ''generic'', advanced Alarm Display Facility is described. It considers operator capabilities and limitations in decision-making processes, response dynamics, and human memory limitations. Highlighted are considerations of human factor criteria in the designing and layout of alarm displays. Alarm data sources are described, and their use within the Alarm Display Facility are illustrated

  12. Percutaneous nephrolithotomy; alarming variables for postoperative bleeding

    Directory of Open Access Journals (Sweden)

    Shakhawan H.A. Said

    2017-03-01

    Conclusion: According to our present results stone complexity (GSS grade 3 and 4, history of ipsilateral renal stone surgery, and occurrence of intraoperative pelvicalyceal perforation are alarming variables for post-PCNL bleeding.

  13. Addressing the alarm analysis barrier - a tool for improving alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Davey, E C; Basso, R A; Feher, M P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada)

    1996-12-31

    This paper describes a software application tool for the initial specification and maintenance of the thousands of alarms in nuclear and other process control plants. The software program is used by system designers and maintainers to analyze, characterize, record and maintain the alarm information and configuration decisions for an alarm system. The tool provides a comprehensive design and information handling environment for: the existing alarm functions in current CANDU plants; the new alarm processing and presentation concepts developed under CANDU Owners Group (COG) sponsorship that are available to be applied to existing CANDU plants on a retrofit basis; and, the alarm functions to be implemented in new CANDU plants. (author). 3 refs., 1 fig.

  14. Addressing the alarm analysis barrier - a tool for improving alarm systems

    International Nuclear Information System (INIS)

    Davey, E.C.; Basso, R.A.; Feher, M.P.

    1995-01-01

    This paper describes a software application tool for the initial specification and maintenance of the thousands of alarms in nuclear and other process control plants. The software program is used by system designers and maintainers to analyze, characterize, record and maintain the alarm information and configuration decisions for an alarm system. The tool provides a comprehensive design and information handling environment for: the existing alarm functions in current CANDU plants; the new alarm processing and presentation concepts developed under CANDU Owners Group (COG) sponsorship that are available to be applied to existing CANDU plants on a retrofit basis; and, the alarm functions to be implemented in new CANDU plants. (author). 3 refs., 1 fig

  15. Development of electric power transmission line anomaly approaching alarm system. Sodensen ijo sekkin keiho sochi no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Kusaba, Masaro; Tabata, Takatoshi; Miyazaki, Shusuke [Kyushu Electric Power Co., Inc., Fukuoka (Japan)

    1989-03-30

    In order to plan preventive measures from the occurrence of electric power transmission line accident, a power transmission line anomaly approaching alarm system was developed to automatically alarm the operators and surveillants. The surveillance system, composed of camera, surveillance unit proper and alarm receiving portion, generates alarm and indicate hazard to the operators, when animal invades a hazardous area designated on the monitor. Wireless telegraph for the alarm transmission use used frequency around a 322MHz band with the Radio Ray law and preventive measures from noise, taken into consideration. The prototype is characterized by unnecessary ancillary fitting to the surveillance object, rare erroneous operations and high reliability. While the hazardous area can be simply designated, changed and released, as made by volume on the control panel. It is moreover easy to designate, as done by confirming the surveillance object on the display. It is also possible in multidimensional surveillance and easy to use on site. 7 figs.

  16. Low Power Wireless Smoke Alarm System in Home Fires

    Directory of Open Access Journals (Sweden)

    Juan Aponte Luis

    2015-08-01

    Full Text Available A novel sensing device for fire detection in domestic environments is presented. The fire detector uses a combination of several sensors that not only detect smoke, but discriminate between different types of smoke. This feature avoids false alarms and warns of different situations. Power consumption is optimized both in terms of hardware and software, providing a high degree of autonomy of almost five years. Data gathered from the device are transmitted through a wireless communication to a base station. The low cost and compact design provides wide application prospects.

  17. False alarms, real challenges--one university's communication response to the 2001 anthrax crisis.

    Science.gov (United States)

    Clarke, Christopher E; Chess, Caron

    2006-01-01

    Considerable research exists on how government agencies at the federal, state, and local levels communicated during the fall 2001 anthrax attacks. However, there is little research on how other institutions handled this crisis, in terms of their response to potential anthrax contamination (aka "white powder scares") and their approach to disseminating important health and safety information. In this article, we investigate a major university's communication response to the anthrax crisis. First, we describe its communication experiences relating to a large white powder scare that occurred in October 2001. Second, we describe the university's broader communication efforts in terms of several important elements of risk communication research, including influence of source attributes, key messages, preferred channels, responses to information requests, and organizational influences. This study underlines that an institution does not have to be directly affected by a crisis to find itself on the communication "front lines." Moreover, other institutions may find it useful to learn from the experiences of this university, so that they may communicate more effectively during future crises.

  18. False alarms and missed events: the impact and origins of perceived inaccuracy in tornado warning systems.

    Science.gov (United States)

    Ripberger, Joseph T; Silva, Carol L; Jenkins-Smith, Hank C; Carlson, Deven E; James, Mark; Herron, Kerry G

    2015-01-01

    Theory and conventional wisdom suggest that errors undermine the credibility of tornado warning systems and thus decrease the probability that individuals will comply (i.e., engage in protective action) when future warnings are issued. Unfortunately, empirical research on the influence of warning system accuracy on public responses to tornado warnings is incomplete and inconclusive. This study adds to existing research by analyzing two sets of relationships. First, we assess the relationship between perceptions of accuracy, credibility, and warning response. Using data collected via a large regional survey, we find that trust in the National Weather Service (NWS; the agency responsible for issuing tornado warnings) increases the likelihood that an individual will opt for protective action when responding to a hypothetical warning. More importantly, we find that subjective perceptions of warning system accuracy are, as theory suggests, systematically related to trust in the NWS and (by extension) stated responses to future warnings. The second half of the study matches survey data against NWS warning and event archives to investigate a critical follow-up question--Why do some people perceive that their warning system is accurate, whereas others perceive that their system is error prone? We find that subjective perceptions are--in part-a function of objective experience, knowledge, and demographic characteristics. When considered in tandem, these findings support the proposition that errors influence perceptions about the accuracy of warning systems, which in turn impact the credibility that people assign to information provided by systems and, ultimately, public decisions about how to respond when warnings are issued. © 2014 Society for Risk Analysis.

  19. Reducing False Alarms in Ion Mobility Spectrometry Detectors: Determination of Accurate and Precise Reduced Mobility Values

    Science.gov (United States)

    2017-11-01

    Front view of the drift gas showerhead assembly showing the Faraday plate and insulating ceramic cemented in the center, (left) the drift gas...drift gas was preheated using a heater built in-house at WSU, which consisted of an 8 in. length of 1/8 in. stainless steel tubing wrapped with 3 ft...gate halves were then cemented together with an array of parallel 0.003 in. o.d. Alloy 46 wires (California Fine Wire Company) were spaced between them

  20. Data fusion from multiple passive sonar nodes for target localisation and false alarm reduction

    NARCIS (Netherlands)

    Hunter, A.J.; Fillinger, L.; Zampolli, M.; Clarijs, M.C.

    2012-01-01

    A PHD particle filter implementation has been detailed for the fusion of measurements from multiple passive sonar nodes. It has been demonstrated on simulated metadata and on experimental passive acoustic data of divers and small boats collected in an operational port environment. Fusion at the

  1. Triggering a false alarm: Wounding mimics prey capture in the carnivorous venus flytrap (dionaea muscipula)

    Czech Academy of Sciences Publication Activity Database

    Pavlovič, A.; Jakšová, Jana; Novák, Ondřej

    2017-01-01

    Roč. 216, č. 3 (2017), s. 927-938 ISSN 0028-646X R&D Projects: GA MŠk(CZ) LO1204 Institutional support: RVO:61389030 Keywords : Action potential * Carnivorous plant * Defence * Digestive enzyme * Electrical signal * Jasmonic acid (JA) * Systemic response * Venus flytrap Subject RIV: EB - Genetics ; Molecular Biology OBOR OECD: Plant sciences, botany Impact factor: 7.330, year: 2016

  2. Externalized conductors and insulation failure in Biotronik defibrillator leads: History repeating or a false alarm?

    Science.gov (United States)

    De Maria, Elia; Borghi, Ambra; Bonetti, Lorenzo; Fontana, Pier Luigi; Cappelli, Stefano

    2017-02-16

    Conductor externalization and insulation failure are frequent complications with the recalled St. Jude Medical Riata implantable cardioverter-defibrillator (ICD) leads. Conductor externalization is a "unique" failure mechanism: Cables externalize through the insulation ("inside-out" abrasion) and appear outside the lead body. Recently, single reports described a similar failure also for Biotronik leads. Moreover, some studies reported a high rate of electrical dysfunction (not only insulation failure) with Biotronik Linox leads and a reduced survival rate in comparison with the competitors. In this paper we describe the case of a patient with a Biotronik Kentrox ICD lead presenting with signs of insulation failure and conductor externalization at fluoroscopy. Due to the high risk of extraction we decided to implant a new lead, abandoning the damaged one; lead reimplant was uneventful. Subsequently, we review currently available literature about Biotronik Kentrox and Linox ICD lead failure and in particular externalized conductors. Some single-center studies and a non-prospective registry reported a survival rate between 88% and 91% at 5 years for Linox leads, significantly worse than that of other manufacturers. However, the preliminary results of two ongoing multicenter, prospective registries (GALAXY and CELESTIAL) showed 96% survival rate at 5 years after implant, well within industry standards. Ongoing data collection is needed to confirm longer-term performance of this family of ICD leads.

  3. Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Su, Chunhua

    2018-01-01

    Cyber-Physical Systems (CPS) are integrations of computation, networking and physical processes. Its process control is often referred to as embedded systems. Generally, CPS and Internet of Things (IoT) have the same basic architecture, whereas the former shows a higher combination and coordination...

  4. Fault management in supervisory control: the effect of false alarms and support

    NARCIS (Netherlands)

    Kerstholt, J.H.; Passenier, P.O.

    2000-01-01

    Automation has changed the role of human operators from direct manual control to supervision. Their main task is to monitor whether system performance remains within pre-specified ranges and intervention is only required in unusual situations. One of the consequences is a loss of situation

  5. Factors influencing when intensive care unit nurses go to the bedside to investigate patient related alarms: A descriptive qualitative study.

    Science.gov (United States)

    Despins, Laurel A

    2017-12-01

    This study examines what prompts the intensive care unit (ICU) nurse to go to the patient's bedside to investigate an alarm and the influences on the nurse's determination regarding how quickly this needs to occur. A qualitative descriptive design guided data collection and analysis. Individual semi-structured interviews were conducted. Thematic analysis guided by the Patient Risk Detection Theoretical Framework was applied to the data. Four specialty intensive care units in an academic medical center. ICU nurses go the patient's bedside in response to an alarm to catch patient deterioration and avert harm. Their determination of the immediacy of patient risk and their desire to prioritize their bedside investigations to true alarms influences how quickly they proceed to the bedside. Ready visual access to physiological data and waveform configurations, experience, teamwork, and false alarms are important determinants in the timing of ICU nurses' bedside alarm investigations. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. An evaluation approach for alarm processing improvement

    International Nuclear Information System (INIS)

    Kim, Jung-Taek; Lee, Dong-Young; Hwang, In-Koo; Park, Jae-Chang

    1997-01-01

    In light of the need to improve MMIS of NPPs, the advanced I and C research team of KAERI has embarked on developing an Alarm and Diagnosis-Integrated Operator Support System, called ADIOS, to filter or suppress unnecessary or nuisance alarms and diagnose abnormality of the plant process. ADIOS has been built in an object-oriented AI environment of G-2 expert system software tool, as presented in a companion paper. ADIOS then is evaluated according to the plan in three steps; (1) preliminary tests to refine the knowledge base and inference structure of ADIOS in such a dynamic environment, and also to evaluate the appropriateness of alarm-processing algorithms; (2) to ensure correctness, consistency, and completeness in the knowledge base using COKEP (Checker Of Knowledge base using Extended Petri net); and (3) the cognitive performance evaluation using the Simulation Analyzer with a Cognitive Operator Model (SACOM) in the KAERI's Integrated Test Facility (ITF). (author). 5 figs, 1 tab

  7. Behavioral alarm treatment for nocturnal enuresis

    Directory of Open Access Journals (Sweden)

    Rodrigo F. Pereira

    2010-06-01

    Full Text Available PURPOSES: To investigate the efficacy of alarm treatment in a sample of Brazilian children and adolescents with nocturnal enuresis and relate treatment success to age and type of clinical support. MATERIALS AND METHODS: During 32 weeks, 84 children and adolescents received alarm treatment together with weekly psychological support sessions for individual families or groups of 5 to 10 families. RESULTS: 71% of the participants achieved success, defined as 14 consecutive dry nights. The result was similar for children and adolescents and for individual or group support. The time until success was shorter for participants missing fewer support sessions. CONCLUSIONS: Alarm treatment was effective for the present sample, regardless of age or type of support. Missing a higher number of support sessions, which may reflect low motivation for treatment, increased the risk of failure.

  8. The alarm system of the SAPHIR detector

    International Nuclear Information System (INIS)

    Schultz-Coulon, H.C.

    1993-06-01

    In order to obtain an effective control of the different detector components an alarm system was built and implemented into the data acquisition system of the SAPHIR experiment. It provides an easy way of indicating errors by either adequate library calls or an appropriate hardware signal, both leading to an active alarm. This allows to react directly to any error detected by one of the specific control systems. In addition for selected kinds of errors the data run can be stopped automatically. Concept and construction of this system are described and some examples for its application are given. (orig.)

  9. Coincidence logic modules for criticality alarming

    International Nuclear Information System (INIS)

    Schaief, C.C. III.

    1977-04-01

    A coincidence Logic Module and a companion contact closure Relay Module utilizing the NIM Standard have been developed for criticality alarming. The units provide an ALARM whenever two or more out of N detectors become activated. In addition, an ALERT is generated whenever one or more detectors is activated or when certain electronic component failures occur. The number of detector inputs (N) can be expanded in groups of six by adding modules. Serial and parallel redundancy were used to reduce the probability of system failure

  10. A revival of the alarm system: Making the alarm list useful during incidents

    International Nuclear Information System (INIS)

    Larsson, J. E.; Oehman, B.; Calzada, A.; Nihlwing, C.; Jokstad, H.; Kristianssen, L. I.; Kvalem, J.; Lind, M.

    2006-01-01

    In control rooms there are often problems with information overload, which means that the operators may receive more information than they are able to interpret. The most serious information overload occurs in two types of situations. The first is when the operating state of the plant changes, which often gives raise to a shower of alarms and events. Such an alarm shower is expected, but can be dangerous, because it may hide other alarms originating from unrelated faults. The second problem occurs when a fault causes several consequential faults, leading to a so-called alarm cascade. Because the alarms seldom arrive in correct time order, it can be very difficult to analyze such a cascade, and the information overload occurs in exactly the moment when a potentially dangerous situation starts. In an ongoing project, GoalArt and IFE are cooperating in testing and evaluating GoalArt's methods for alarm reduction and root cause analysis. The testing comprises two specific algorithms, root cause analysis and state-based alarm priority. The GoalArt system has been integrated with the HAMBO simulator so that operators can evaluate the algorithms on-line. (authors)

  11. Alarm handling systems and techniques developed to match operator tasks

    Energy Technology Data Exchange (ETDEWEB)

    Bye, A; Moum, B R [Institutt for Energiteknikk, Halden (Norway). OECD Halden Reaktor Projekt

    1997-09-01

    This paper covers alarm handling methods and techniques explored at the Halden Project, and describes current status on the research activities on alarm systems. Alarm systems are often designed by application of a bottom-up strategy, generating alarms at component level. If no structuring of the alarms is applied, this may result in alarm avalanches in major plant disturbances, causing cognitive overload of the operator. An alarm structuring module should be designed using a top-down approach, analysing operator`s tasks, plant states, events and disturbances. One of the operator`s main tasks during plant disturbances is status identification, including determination of plant status and detection of plant anomalies. The main support of this is provided through the alarm systems, the process formats, the trends and possible diagnosis systems. The alarm system should both physically and conceptually be integrated with all these systems. 9 refs, 5 figs.

  12. Alarm handling systems and techniques developed to match operator tasks

    International Nuclear Information System (INIS)

    Bye, A.; Moum, B.R.

    1997-01-01

    This paper covers alarm handling methods and techniques explored at the Halden Project, and describes current status on the research activities on alarm systems. Alarm systems are often designed by application of a bottom-up strategy, generating alarms at component level. If no structuring of the alarms is applied, this may result in alarm avalanches in major plant disturbances, causing cognitive overload of the operator. An alarm structuring module should be designed using a top-down approach, analysing operator's tasks, plant states, events and disturbances. One of the operator's main tasks during plant disturbances is status identification, including determination of plant status and detection of plant anomalies. The main support of this is provided through the alarm systems, the process formats, the trends and possible diagnosis systems. The alarm system should both physically and conceptually be integrated with all these systems. 9 refs, 5 figs

  13. Development of the newly advanced alarm system for APWR plant

    Energy Technology Data Exchange (ETDEWEB)

    Shimada, Manabu; Yamamoto, Yoshihiro; Tani, Mamoru; Kobashi, Shuichi [Kansai Electric Power Co., Inc., Osaka (Japan)

    1997-09-01

    We have been developing AMCB (Advanced Main Control Board) for APWR consisting of a large overview display and on operator console. We have adopted the alarm prioritizing functions, which are already in use in the existing Japanese PWR plants, for easier identification of the high priority alarms. Moreover, we have developed an alarm system with a large overview display, which presents alarms on the plant process flow diagram. This enhances the location aids and pattern recognition in the alarm identification process. This time, we made further improvement and studies for better and various functions combining a large overview display with a CRT display. We determined the alarm system specification as follows, taking account of flexible alarm recognition processes. (1) The high priority alarms can be identified upon the LOD (large overview display). On the display, the alarms are described on the plant flow diagram, and the alarm status is shown on the fixed position of process or equipment symbols. (2) Other alarms are identified on large overview display and on CRTs using a hierarchical process. (3) The alarm messages are divided into 4 different groups according to the plant systems, thus enabling to undertake the countermeasure operations, using only the CRT. Moreover, we integrated a computerized ARPs (Alarm Response Procedures) into the alarm system. (author). 4 figs, 5 tabs.

  14. Development of the newly advanced alarm system for APWR plant

    International Nuclear Information System (INIS)

    Shimada, Manabu; Yamamoto, Yoshihiro; Tani, Mamoru; Kobashi, Shuichi

    1997-01-01

    We have been developing AMCB (Advanced Main Control Board) for APWR consisting of a large overview display and on operator console. We have adopted the alarm prioritizing functions, which are already in use in the existing Japanese PWR plants, for easier identification of the high priority alarms. Moreover, we have developed an alarm system with a large overview display, which presents alarms on the plant process flow diagram. This enhances the location aids and pattern recognition in the alarm identification process. This time, we made further improvement and studies for better and various functions combining a large overview display with a CRT display. We determined the alarm system specification as follows, taking account of flexible alarm recognition processes. (1) The high priority alarms can be identified upon the LOD (large overview display). On the display, the alarms are described on the plant flow diagram, and the alarm status is shown on the fixed position of process or equipment symbols. (2) Other alarms are identified on large overview display and on CRTs using a hierarchical process. (3) The alarm messages are divided into 4 different groups according to the plant systems, thus enabling to undertake the countermeasure operations, using only the CRT. Moreover, we integrated a computerized ARPs (Alarm Response Procedures) into the alarm system. (author). 4 figs, 5 tabs

  15. 46 CFR 95.15-30 - Alarms.

    Science.gov (United States)

    2010-10-01

    ... navigated, other than paint and lamp lockers and similar small spaces, shall be fitted with an approved... only for systems required to be fitted with a delayed discharge. Such alarms shall be so arranged as to sound during the 20 second delay period prior to the discharge of carbon dioxide into the space, and the...

  16. Adjustable electronic load-alarm relay

    International Nuclear Information System (INIS)

    Mason, C.H.; Sitton, R.S.

    1976-01-01

    An improved electronic alarm relay for monitoring the current drawn by an ac motor or other electrical load is described. The circuit is designed to measure the load with high accuracy and to have excellent alarm repeatability. Chattering and arcing of the relay contacts are minimal. The operator can adjust the set point easily and can re-set both the high and the low alarm points by means of one simple adjustment. The relay includes means for generating a signal voltage proportional to the motor current. In a preferred form of the invention a first operational amplifier is provided to generate a first constant reference voltage which is higher than a preselected value of the signal voltage. A second operational amplifier is provided to generate a second constant reference voltage which is lower than the aforementioned preselected value of the signal voltage. A circuit comprising a first resistor serially connected to a second resistor is connected across the outputs of the first and second amplifiers, and the junction of the two resistors is connected to the inverting terminal of the second amplifier. Means are provided to compare the aforementioned signal voltage with both the first and second reference voltages and to actuate an alarm if the signal voltage is higher than the first reference voltage or lower than the second reference voltage

  17. Object-oriented alarm-filtering system

    International Nuclear Information System (INIS)

    Corsberg, D.R.; Wilkie, D.

    1986-01-01

    This paper discusses an alarm-filtering system (AFS) being developed by EG and G Idaho, Inc. for the Advanced Test Reactor (ATR) at the Idaho National Engineering Laboratory. The ultimate goal of this project is to place AFS into ATR's reactor control room to act as an aid during major plant transients. In addition, methods of alarm analysis are investigated based on functional relationships rather than on a historical approach utilizing cause-consequence trees. Artificial intelligence techniques, including object-oriented programming, are also demonstrated as useful in analyzing alarms and alarm sequences. After a brief description of the problem AFS addresses, this paper discusses the design constraints and human factors that influenced the development of the system. The reader is then presented with operational and architectural descriptions of the system as well as what directions the future development of AFS may take. The fact that AFS is being considered as a partial solution to the problems discussed in the next section demonstrates the viability of its underlying technology and approach. 10 refs

  18. An Undergraduate Experiment in Alarm System Design.

    Science.gov (United States)

    Martini, R. A.; And Others

    1988-01-01

    Describes an experiment involving data acquisition by a computer, digital signal transmission from the computer to a digital logic circuit and signal interpretation by this circuit. The system is being used at the Illinois Institute of Technology. Discusses the fundamental concepts involved. Demonstrates the alarm experiment as it is used in…

  19. Utilizing Facebook and Automated Telephone Calls to Increase Adoption of a Local Smoke Alarm Installation Program.

    Science.gov (United States)

    Frattaroli, Shannon; Schulman, Eric; McDonald, Eileen M; Omaki, Elise C; Shields, Wendy C; Jones, Vanya; Brewer, William

    2018-05-17

    Innovative strategies are needed to improve the prevalence of working smoke alarms in homes. To our knowledge, this is the first study to report on the effectiveness of Facebook advertising and automated telephone calls as population-level strategies to encourage an injury prevention behavior. We examine the effectiveness of Facebook advertising and automated telephone calls as strategies to enroll individuals in Baltimore City's Fire Department's free smoke alarm installation program. We directed our advertising efforts toward Facebook users eligible for the Baltimore City Fire Department's free smoke alarm installation program and all homes with a residential phone line included in Baltimore City's automated call system. The Facebook campaign targeted Baltimore City residents 18 years of age and older. In total, an estimated 300 000 Facebook users met the eligibility criteria. Facebook advertisements were delivered to users' desktop and mobile device newsfeeds. A prerecorded message was sent to all residential landlines listed in the city's automated call system. By the end of the campaign, the 3 advertisements generated 456 666 impressions reaching 130 264 Facebook users. Of the users reached, 4367 individuals (1.3%) clicked the advertisement. The automated call system included approximately 90 000 residential phone numbers. Participants attributed 25 smoke alarm installation requests to Facebook and 458 to the automated call. Facebook advertisements are a novel approach to promoting smoke alarms and appear to be effective in exposing individuals to injury prevention messages. However, converting Facebook message recipients to users of a smoke alarm installation program occurred infrequently in this study. Residents who participated in the smoke alarm installation program were more likely to cite the automated call as the impetus for their participation. Additional research is needed to understand the circumstances and strategies to effectively use the social

  20. Nuclear power plant alarm systems: Problems and issues

    International Nuclear Information System (INIS)

    O'Hara, J.M.; Brown, W.S.

    1991-01-01

    Despite the incorporation of advanced technology into nuclear power plant alarm systems, human factors problems remain. This paper identifies to be addressed in order to allow advanced technology to be used effectively in the design of nuclear power plant alarm systems. The operator's use and processing of alarm system information will be considered. Based upon a review of alarm system research, issues related to general system design, alarm processing, display and control are discussed. It is concluded that the design of effective alarm systems depends on an understanding of the information processing capabilities and limitations of the operator. 39 refs

  1. Nuclear power plant alarm systems: Problems and issues

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, J.M.; Brown, W.S.

    1991-01-01

    Despite the incorporation of advanced technology into nuclear power plant alarm systems, human factors problems remain. This paper identifies to be addressed in order to allow advanced technology to be used effectively in the design of nuclear power plant alarm systems. The operator's use and processing of alarm system information will be considered. Based upon a review of alarm system research, issues related to general system design, alarm processing, display and control are discussed. It is concluded that the design of effective alarm systems depends on an understanding of the information processing capabilities and limitations of the operator. 39 refs.

  2. Systemic True False

    African Journals Online (AJOL)

    Preferred Customer

    ):. (a). (b). (c). (d). Answer: True systemics are (b & c); False Systemics (a & d). For more examples, see (10 and 11). Na2O2. NaCl. Na. HCl heat /excess. (O). 300°C electrolysis. (molten). NaOH. NaCl. Na. HCl. H2O electrolysis. (solution). NaCl.

  3. Decree 53/1963 of 10 January on the establishment of a radioactivity alarm network

    International Nuclear Information System (INIS)

    1963-01-01

    This Decree provides for the setting up of a radioactivity alarm network by the Directorate General for Public Protection to prevent hazards arising from possible incidents originating in nuclear installations. The Duty stations are located in specified police stations and with fire brigades within a radius ranging from 15 to 20 km from planned reactors or nuclear power plants. (NEA) [fr

  4. Advanced pulse oximeter signal processing technology compared to simple averaging. II. Effect on frequency of alarms in the postanesthesia care unit.

    Science.gov (United States)

    Rheineck-Leyssius, A T; Kalkman, C J

    1999-05-01

    To determine the effect of a new pulse oximeter (Nellcor Symphony N-3000, Pleasanton, CA) with signal processing technique (Oxismart) on the incidence of false alarms in the postanesthesia care unit (PACU). Prospective study. Nonuniversity hospital. 603 consecutive ASA physical status I, II, and III patients recovering from general or regional anesthesia in the PACU. We compared the number of alarms produced by a recently developed "third"-generation pulse oximeter (Nellcor Symphony N-3000) with Oxismart signal processing technique and a conventional pulse oximeter (Criticare 504, Waukesha, WI). Patients were randomly assigned to either a Nellcor pulse oximeter or a Criticare with the signal averaging time set at either 12 or 21 seconds. For each patient the number of false (artifact) alarms was counted. The Nellcor generated one false alarm in 199 patients and 36 (in 31 patients) "loss of pulse" alarms. The conventional pulse oximeter with the averaging time set at 12 seconds generated a total of 32 false alarms in 17 of 197 patients [compared with the Nellcor, relative risk (RR) 0.06, confidence interval (CI) 0.01 to 0.25] and a total of 172 "loss of pulse" alarms in 79 patients (RR 0.39, CI 0.28 to 0.55). The conventional pulse oximeter with the averaging time set at 21 seconds generated 12 false alarms in 11 of 207 patients (compared with the Nellcor, RR 0.09, CI 0.02 to 0.48) and a total of 204 "loss of pulse" alarms in 81 patients (RR 0.40, CI 0.28 to 0.56). The lower incidence of false alarms of the conventional pulse oximeter with the longest averaging time compared with the shorter averaging time did not reach statistical significance (false alarms RR 0.62, CI 0.3 to 1.27; "loss of pulse" alarms RR 0.98, CI 0.77 to 1.3). To date, this is the first report of a pulse oximeter that produced almost no false alarms in the PACU.

  5. Elevated false recognition in patients with frontal lobe damage is neither a general nor a unitary phenomenon.

    Science.gov (United States)

    Verfaellie, Mieke; Rapcsak, Steven Z; Keane, Margaret M; Alexander, Michael P

    2004-01-01

    This study examined verbal recognition memory in amnesic patients with frontal lesions (AF), nonamnesic patients with frontal lesions (NAF), and amnesic patients with medial temporal lesions (MT). To examine susceptibility to false alarms, the number of studied words drawn from various categories was varied. The AF and MT groups demonstrated reduced hits and increased false alarms. False alarms were especially elevated when item-specific recollection was strongest in control participants. The NAF group performed indistinguishably from control participants, but several patients showed excessive false alarms in the context of normal hit rates. These patients exhibited impaired monitoring and verification processes. The findings demonstrate that elevated false recognition is not characteristic of all frontal patients and may result from more than 1 underlying mechanism. ((c) 2004 APA, all rights reserved)

  6. Correlating data from different sensors to increase the positive predictive value of alarms: an empiric assessment [v1; ref status: indexed, http://f1000r.es/RKkXdB

    Directory of Open Access Journals (Sweden)

    Yuval Bitan

    2012-11-01

    Full Text Available Objectives: Alarm fatigue from high false alarm rate is a well described phenomenon in the intensive care unit (ICU. Progress to further reduce false alarms must employ a new strategy. Highly sensitive alarms invariably have a very high false alarm rate. Clinically useful alarms have a high Positive-Predictive Value. Our goal is to demonstrate one approach to suppressing false alarms using an algorithm that correlates information across sensors and replicates the ways that human evaluators discriminate artifact from real signal. Methods: After obtaining IRB approval and waiver of informed consent, a set of definitions, (hypovolemia, left ventricular shock, tamponade, hemodynamically significant ventricular tachycardia, and hemodynamically significant supraventricular tachycardia, were installed in the monitors in a 10 bed cardiothoracic ICU and evaluated over an 85 day study period. The logic of the algorithms was intended to replicate the logic of practitioners, and correlated information across sensors in a way similar to that used by practitioners. The performance of the alarms was evaluated via a daily interview with the ICU attending and review of the tracings recorded over the previous 24 hours in the monitor. True alarms and false alarms were identified by an expert clinician, and the performance of the algorithms evaluated using the standard definitions of sensitivity, specificity, positive predictive value, and negative predictive value. Results: Between 1 and 221 instances of defined events occurred over the duration of the study, and the positive predictive value of the definitions varied between 4.1% and 84%. Conclusions: Correlation of information across alarms can suppress artifact, increase the positive predictive value of alarms, and can employ more sophisticated definitions of alarm events than present single-sensor based systems.

  7. Automated Information System (AIS) Alarm System

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.

    1997-05-01

    The Automated Information Alarm System is a joint effort between Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratory to demonstrate and implement, on a small-to-medium sized local area network, an automated system that detects and automatically responds to attacks that use readily available tools and methodologies. The Alarm System will sense or detect, assess, and respond to suspicious activities that may be detrimental to information on the network or to continued operation of the network. The responses will allow stopping, isolating, or ejecting the suspicious activities. The number of sensors, the sensitivity of the sensors, the assessment criteria, and the desired responses may be set by the using organization to meet their local security policies.

  8. Automated Information System (AIS) Alarm System

    International Nuclear Information System (INIS)

    Hunteman, W.

    1997-01-01

    The Automated Information Alarm System is a joint effort between Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratory to demonstrate and implement, on a small-to-medium sized local area network, an automated system that detects and automatically responds to attacks that use readily available tools and methodologies. The Alarm System will sense or detect, assess, and respond to suspicious activities that may be detrimental to information on the network or to continued operation of the network. The responses will allow stopping, isolating, or ejecting the suspicious activities. The number of sensors, the sensitivity of the sensors, the assessment criteria, and the desired responses may be set by the using organization to meet their local security policies

  9. Technical guide to criticality alarm system design

    International Nuclear Information System (INIS)

    Greenfield, B.

    2009-01-01

    An instructional manual was created to guide criticality safety engineers through the technical aspects of designing a criticality alarm system (CAS) for Dept. of Energy (DOE) hazard class 1 and 2 facilities. The manual was structured such that it can be used by engineers designing completely new systems and by those who are working with existing facilities. Major design tasks are thoroughly analyzed to provide concise direction for how to complete the analysis. Regulatory and technical performance requirements were both addressed. (authors)

  10. False recognition depends on depth of prior word processing: a magnetoencephalographic (MEG) study.

    Science.gov (United States)

    Walla, P; Hufnagl, B; Lindinger, G; Deecke, L; Imhof, H; Lang, W

    2001-04-01

    Brain activity was measured with a whole head magnetoencephalograph (MEG) during the test phases of word recognition experiments. Healthy young subjects had to discriminate between previously presented and new words. During prior study phases two different levels of word processing were provided according to two different kinds of instructions (shallow and deep encoding). Event-related fields (ERFs) associated with falsely recognized words (false alarms) were found to depend on the depth of processing during the prior study phase. False alarms elicited higher brain activity (as reflected by dipole strength) in case of prior deep encoding as compared to shallow encoding between 300 and 500 ms after stimulus onset at temporal brain areas. Between 500 and 700 ms we found evidence for differences in the involvement of neural structures related to both conditions of false alarms. Furthermore, the number of false alarms was found to depend on depth of processing. Shallow encoding led to a higher number of false alarms than deep encoding. All data are discussed as strong support for the ideas that a certain level of word processing is performed by a distinct set of neural systems and that the same neural systems which encode information are reactivated during the retrieval.

  11. Poison and alarm: the Asian hornet Vespa velutina uses sting venom volatiles as an alarm pheromone.

    Science.gov (United States)

    Cheng, Ya-Nan; Wen, Ping; Dong, Shi-Hao; Tan, Ken; Nieh, James C

    2017-02-15

    In colonial organisms, alarm pheromones can provide a key fitness advantage by enhancing colony defence and warning of danger. Learning which species use alarm pheromone and the key compounds involved therefore enhances our understanding of how this important signal has evolved. However, our knowledge of alarm pheromones is more limited in the social wasps and hornets compared with the social bees and ants. Vespa velutina is an economically important and widespread hornet predator that attacks honey bees and humans. This species is native to Asia and has now invaded Europe. Despite growing interest in V. velutina , it was unknown whether it possessed an alarm pheromone. We show that these hornets use sting venom as an alarm pheromone. Sting venom volatiles were strongly attractive to hornet workers and triggered attacks. Two major venom fractions, consisting of monoketones and diketones, also elicited attack. We used gas chromatography coupled to electroantennographic detection (GC-EAD) to isolate 13 known and 3 unknown aliphatic ketones and alcohols in venom that elicited conspicuous hornet antennal activity. Two of the unknown compounds may be an undecen-2-one and an undecene-2,10-dinone. Three major compounds (heptan-2-one, nonan-2-one and undecan-2-one) triggered attacks, but only nonan-2-one did so at biologically relevant levels (10 hornet equivalents). Nonan-2-one thus deserves particular attention. However, the key alarm releasers for V. velutina remain to be identified. Such identification will help to illuminate the evolution and function of alarm compounds in hornets. © 2017. Published by The Company of Biologists Ltd.

  12. High confidence in falsely recognizing prototypical faces.

    Science.gov (United States)

    Sampaio, Cristina; Reinke, Victoria; Mathews, Jeffrey; Swart, Alexandra; Wallinger, Stephen

    2018-06-01

    We applied a metacognitive approach to investigate confidence in recognition of prototypical faces. Participants were presented with sets of faces constructed digitally as deviations from prototype/base faces. Participants were then tested with a simple recognition task (Experiment 1) or a multiple-choice task (Experiment 2) for old and new items plus new prototypes, and they showed a high rate of confident false alarms to the prototypes. Confidence and accuracy relationship in this face recognition paradigm was found to be positive for standard items but negative for the prototypes; thus, it was contingent on the nature of the items used. The data have implications for lineups that employ match-to-suspect strategies.

  13. Baryogenesis in false vacuum

    Energy Technology Data Exchange (ETDEWEB)

    Hamada, Yuta [KEK Theory Center, IPNS, KEK, Tsukuba, Ibaraki (Japan); Yamada, Masatoshi [Kanazawa University, Institute for Theoretical Physics, Kanazawa (Japan)

    2017-09-15

    The null result in the LHC may indicate that the standard model is not drastically modified up to very high scales, such as the GUT/string scale. Having this in the mind, we suggest a novel leptogenesis scenario realized in the false vacuum of the Higgs field. If the Higgs field develops a large vacuum expectation value in the early universe, a lepton number violating process is enhanced, which we use for baryogenesis. To demonstrate the scenario, several models are discussed. For example, we show that the observed baryon asymmetry is successfully generated in the standard model with higher-dimensional operators. (orig.)

  14. False memories and confabulation.

    Science.gov (United States)

    Johnson, M K; Raye, C L

    1998-04-01

    Memory distortions range from the benign (thinking you mailed a check that you only thought about mailing), to the serious (confusing what you heard after a crime with what you actually saw), to the fantastic (claiming you piloted a spaceship). We review theoretical ideas and empirical evidence about the source monitoring processes underlying both true and false memories. Neuropsychological studies show that certain forms of brain damage (such as combined frontal and medial-temporal lesions) might result in profound source confusions, called confabulations. Neuroimaging techniques provide new evidence regarding more specific links between underlying brain mechanisms and the normal cognitive processes involved in evaluating memories. One hypothesis is that the right prefrontal cortex (PFC) subserves heuristic judgments based on easily assessed qualities (such as familiarity or perceptual detail) and the left PFC (or the right and left PFC together) subserves more systematic judgments requiring more careful analysis of memorial qualities or retrieval and evaluation of additional supporting or disconfirming information. Such heuristic and systematic processes can be disrupted not only by brain damage but also, for example, by hypnosis, social demands and motivational factors, suggesting caution in the methods used by `memory exploring' professions (therapists, police officers, lawyers, etc.) in order to avoid inducing false memories.

  15. Recommendations to alarm systems and lessons learned on alarm system implementation

    International Nuclear Information System (INIS)

    Soerenssen, Aimar; Veland, Oeystein; Farbrot, Jan Erik; Kaarstad, Magnhild; Seim, Lars Aage; Foerdestroemmen, Nils; Bye, Andreas

    2001-11-01

    Alarm systems have been of major concern within complex industrial processes for many years. Within the nuclear community, the TMI accident in 1979 was the first really serious event that showed also the importance of the man-machine aspects of the systems in general, and the alarm system in particular. The OECD Halden Reactor Project has been working with alarm systems since 1974. This report is an attempt to gather some of the knowledge that has been accumulated during the years in Halden, both in research and also in bilateral projects. Bilateral projects within this field have provided a practical basis of knowledge.A major part of this report consists of a set of recommendations, which reflect HRP's current understanding of how an alarm system should work. There are also recommendations on design methods. But also other issues are included, as system development and implementation experience, and experimental knowledge on the performance of alarm systems. Some open issues are also discussed. (Author). 54 refs., 15 figs

  16. False color viewing device

    International Nuclear Information System (INIS)

    Kronberg, J.W.

    1992-01-01

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage. 7 figs

  17. A Study on Performance Requirements for Advanced Alarm System

    International Nuclear Information System (INIS)

    Seong, Duk Hyun; Jeong, Jae Hoon; Sim, Young Rok; Ko, Jong Hyun; Kim, Jung Seon; Jang, Gwi Sook; Park, Geun Ok

    2005-01-01

    A design goals of advanced alarm system is providing advanced alarm information to operator in main control room. To achive this, we applied computer based system to Alarm System. Because, It should apply data management and advanced alarm processing(ie. Data Base Mangegment System and S/W module for alarm processing). These are not impossible in analog based alarm system. And, preexitance research examples are made on digital computer. We have digital systems for test of advanced alarm system table and have tested and studied using by test equipment in the view point of the system performance, stability and security. In this paper, we discribed about general software architecture of preexitance research examples. Also, CPU performance and requirements of system software that served to accommodate it, stability and security

  18. Applying AI techniques to improve alarm display effectiveness

    International Nuclear Information System (INIS)

    Gross, J.M.; Birrer, S.A.; Crosberg, D.R.

    1987-01-01

    The Alarm Filtering System (AFS) addresses the problem of information overload in a control room during abnormal operations. Since operators can miss vital information during these periods, systems which emphasize important messages are beneficial. AFS uses the artificial intelligence (AI) technique of object-oriented programming to filter and dynamically prioritize alarm messages. When an alarm's status changes, AFS determines the relative importance of that change according to the current process state. AFS bases that relative importance on relationships the newly changed alarm has with other activated alarms. Evaluations of a alarm importance take place without regard to the activation sequence of alarm signals. The United States Department of Energy has applied for a patent on the approach used in this software. The approach was originally developed by EG and G Idaho for a nuclear reactor control room

  19. An experimental evaluation of alarm processing and display characteristics

    International Nuclear Information System (INIS)

    O'Hara, J.; Brown, W.; Hallbert, B.; Skraaning, G.Jr.; Persensky, J.; Wachtel, J.

    1998-01-01

    This paper describes a research program sponsored by the U.S. Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. As part of this program, guidance has been developed based on a broad base of technical and research literature. In the course of guidance development, aspects of alarm system design for which the technical basis was insufficient to support complete guidance development were identified. The primary purpose of the research reported in this paper was to evaluate the effects of three of these alarm system design characteristics on operator performance in order to contribute to the understanding of potential safety issues and to provide data to support the development of design review guidance in these areas. Three alarm system design characteristics studied were (1) alarm processing (degree of alarm reduction), (2) alarm availability (dynamic prioritization and suppression), and (3) alarm display (a dedicated tile format, a mixed tile and message list format, and a format in which alarm information is integrated into the process displays). A secondary purpose was to provide confirmatory evidence of selected alarm system guidance developed in an earlier phase of the project. The alarm characteristics were combined into eight separate experimental conditions. Six, two-person crews of professional nuclear power plant operators participated in the study. Following training, each crew completed 16 test trials which consisted of two trials in each of the eight experimental conditions (one with a low-complexity scenario and one with a high-complexity scenario). Measures of process performance. operator task performance, situation awareness, and workload were obtained. In addition. operator opinions and evaluations of the alarm processing and display conditions were collected. Numerous strengths

  20. Implementation of the Integrated Alarm System for KOMAC facility using EPICS framework and Eclipse

    International Nuclear Information System (INIS)

    Song, Young-Gi; Kim, Jae-Ha; Kim, Han-Sung; Kwon, Hyeok-Jung; Cho, Yong-Sub

    2017-01-01

    The alarm detecting layer is the component that monitors alarm signals which are transported to the processing part through message queue. The main purpose of the processing part is to transfer the alarm signals connecting an alarm identification and state of the alarm to database system. The operation interface of system level signal links has been developed by EPICS framework. EPICS tools have been used for monitoring device alarm status. The KOMAC alarm system was developed for offering a user-friendly, intuitive user interface. The alarm system is implemented with EPICS IOC for alarm server, eclipse-mars integrated development tool for alarm viewer, and mariadb for alarm log. The new alarm system supports intuitive user interface on alarm information and alarm history. Alarm view has plans to add login function, user permission on alarm acknowledge, user permission of PV import, search and report function.

  1. False memory in aging resulting from self-referential processing.

    Science.gov (United States)

    Rosa, Nicole M; Gutchess, Angela H

    2013-11-01

    Referencing the self is known to enhance accurate memory, but less is known about how the strategy affects false memory, particularly for highly self-relevant information. Because older adults are more prone to false memories, we tested whether self-referencing increased false memories with age. In 2 studies, older and younger adults rated adjectives for self-descriptiveness and later completed a surprise recognition test comprised of words rated previously for self-descriptiveness and novel lure words. Lure words were subsequently rated for self-descriptiveness in order to assess the impact of self-relevance on false memory. Study 2 introduced commonness judgments as a control condition, such that participants completed a recognition test on adjectives rated for commonness in addition to adjectives in the self-descriptiveness condition. Across both studies, findings indicate an increased response bias to self-referencing that increased hit rates for both older and younger adults but also increased false alarms as information became more self-descriptive, particularly for older adults. Although the present study supports previous literature showing a boost in memory for self-referenced information, the increase in false alarms, especially in older adults, highlights the potential for memory errors, particularly for information that is strongly related to the self.

  2. Security alarm communication and display systems development

    International Nuclear Information System (INIS)

    Waddoups, I.G.

    1990-01-01

    Sandia National Laboratories (SNL) has, as lead Department of Energy (DOE) physical security laboratory, developed a variety of alarm communication and display systems for DOE and Department of Defense (DOD) facilities. This paper briefly describes some of the systems developed and concludes with a discussion of technology relevant to those currently designing, developing, implementing, or procuring such a system. Development activities and the rapid evolution of computers over the last decade have resulted in a broad variety of capabilities to support most security system communication and display needs. The major task in selecting a system is becoming familiar with these capabilities and finding the best match to a specific need

  3. Alarm annunciation in a graphical environment

    International Nuclear Information System (INIS)

    Adams, D.G.

    1994-01-01

    Well-designed graphical user interfaces, such as Microsoft reg-sign Windows trademark or UNIX trademark--based X-Windows reg-sign, provide a capability for enhanced display of security alarm information. Conversely, a poorly designed interface can quickly overwhelm an operator. This paper describes types of graphical information that can be displayed and offers guidance on how to best display that information. Limits are proposed for the complexity of the user interface, and guidelines are suggested for the display of maps and sensors

  4. Smart container UWB sensor system for situational awareness of intrusion alarms

    Science.gov (United States)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  5. A Design of Alarm System in a Research Reactor Facility

    International Nuclear Information System (INIS)

    Park, Jaekwan; Jang, Gwisook; Seo, Sangmun; Suh, Yongsuk

    2013-01-01

    The digital alarm system has become an indispensable design to process a large amount of alarms of power plants. Korean research reactor operated for decades maintains a hybrid alarm system with both an analog annunciator and a digital alarm display. In this design, several alarms are indicated on an analog panel and digital display, respectively, and it requires more attention and effort of the operators. As proven in power plants, a centralized alarm system design is necessary for a new research reactor. However, the number of alarms and operators in a research reactor is significantly lesser than power plants. Thus, simplification should be considered as an important factor for the operation efficiency. This paper introduces a simplified alarm system. As advances in information technology, fully digitalized alarm systems have been applied to power plants. In a new research reactor, it will be more useful than an analog or hybrid configuration installed in research reactors decades ago. However, the simplification feature should be considered as an important factor because the number of alarms and number of operators in a research reactor is significantly lesser than in power plants

  6. JOYO operation support system 'JOYCAT' based on intelligent alarm handling

    International Nuclear Information System (INIS)

    Tamaoki, Tetsuo; Yamamoto, Hiroki; Sato, Masuo; Yoshida, Megumu; Kaneko, Tomoko; Terunuma, Seiichi; Takatsuto, Hiroshi; Morimoto, Makoto.

    1992-01-01

    An operation support system for the experimental fast reactor 'JOYO' was developed based on an intelligent alarm-handling. A specific feature of this system, called JOYCAT (JOYO Consulting and Analyzing Tool), is in its sequential processing structure that a uniform treatment by using design knowledge base is firstly applied for all activated alarms, and an exceptional treatment by using heuristic knowledge base is then applied only for the former results. This enables us to achieve real-time and flexible alarm-handling. The first alarm-handling determines the candidates of causal alarms, important alarms with which the operator should firstly cope, through identifying the cause-consequence relations among alarms based on the design knowledge base in which importance and activating conditions are described for each of 640 alarms in a frame format. The second alarm-handling makes the final judgement with the candidates by using the heuristic knowledge base described as production rules. Then, operation manuals concerning the most important alarms are displayed to operators. JOYCAT has been in commission since September of 1990, after a wide scope of validation tests by using an on-site full-scope training simulator. (author)

  7. Alarm management in gas pipeline plant: a case study

    Energy Technology Data Exchange (ETDEWEB)

    Araujo, Juliano; Lima, Marcelo; Leitao, Gustavo; Guedes, Luiz Affonso [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil); Branco, Nicolau; Coelho, Robson; Elias, Gustavo Passos; Nunes, Marcelo [Transportadora Brasileira Gasoduto Bolivia-Brasil (TBG), Rio de Janeiro, RJ (Brazil)

    2009-07-01

    In order to improve the requirements of industrial processes, many decision support systems have been introduced in recent years. In this context, the alarm management systems have great relevance. On the other hand, the informatics revolution allowed a great increase of information concerning the operation of the industrial processes. Currently, process operators handle an excessive number of about 1.500 alarms per day. Thus, this overdose of information implies in the discredit of alarms. Then, in order to improve the operation activities of industrial processes, it is mandatory to incorporate procedures to evaluate and rationalize alarms. Since the EMMUA191 Standard is the reference guide to alarm management, but it does not specify how to execute an alarm management procedure, in this paper, a systematic procedure to evaluate alarms configurations in industrial processes is proposed. This procedure is in line with EMMUA191 and is composed by the following steps: to use statistics analyses to identify problematic alarms, such as occurrence, intermittency, correlation, and flooding calculation; to indicate problematic alarm group; and to propose a set of actions to be implemented. To validate our proposal, we present a case study in a gas pipeline plant using the BR-AlarmExpert software. (author)

  8. Alarm handler for the advanced photon source control system

    International Nuclear Information System (INIS)

    Kraimer, M.R.; Cha, B.K.; Anderson, M.

    1991-01-01

    The Advanced Photon Source (APS), now under construction at Argonne National Laboratory, will have a control system employing graphics workstations at the operator interface level and VME-based microprocessors operating with a distributed database at the field level. The alarm handler is an application utilizing X-Windows running on one or more operator interface workstations which monitors alarms generated by the VME-based microprocessors. Alarms can be grouped in a hierarchical manner. The operator can monitor, acknowledge, and mask alarms either individually or aggregately. Alarm changes of state and all operator modifications are logged. When alarms occur, display windows are automatically generated conveying system and subsystem relationships and severity. Menus are used to modify the alarm action configuration files and to obtain help. Since alarm groups are defined via an alarm configuration file, the alarm handler is a general purpose application which can be customized to monitor a single subsystem or configured to monitor the entire accelerator complex. 2 refs., 2 figs

  9. Perils of intraoperative neurophysiological monitoring: analysis of "false-negative" results in spine surgeries.

    Science.gov (United States)

    Tamkus, Arvydas A; Rice, Kent S; McCaffrey, Michael T

    2018-02-01

    Although some authors have published case reports describing false negatives in intraoperative neurophysiological monitoring (IONM), a systematic review of causes of false-negative IONM results is lacking. The objective of this study was to analyze false-negative IONM findings in spine surgery. This is a retrospective cohort analysis. A cohort of 109 patients with new postoperative neurologic deficits was analyzed for possible false-negative IONM reporting. The causes of false-negative IONM reporting were determined. From a cohort of 62,038 monitored spine surgeries, 109 consecutive patients with new postoperative neurologic deficits were reviewed for IONM alarms. Intraoperative neurophysiological monitoring alarms occurred in 87 of 109 surgeries. Nineteen patients with new postoperative neurologic deficits did not have an IONM alarm and surgeons were not warned. In addition, three patients had no interpretable IONM baseline data and no alarms were possible for the duration of the surgery. Therefore, 22 patients were included in the study. The absence of IONM alarms during these 22 surgeries had different origins: "true" false negatives where no waveform changes meeting the alarm criteria occurred despite the appropriate IONM (7); a postoperative development of a deficit (6); failure to monitor the pathway, which became injured (5); the absence of interpretable IONM baseline data which precluded any alarm (3); and technical IONM application issues (1). Overall, the rate of IONM method failing to predict the patient's outcome was very low (0.04%, 22/62,038). Minimizing false negatives requires the application of a proper IONM technique with the limitations of each modality considered in their selection and interpretation. Multimodality IONM provides the most inclusive information, and although it might be impractical to monitor every neural structure that can be at risk, a thorough preoperative consideration of available IONM modalities is important. Delayed

  10. General methods for alarm reduction; Larmsanering med generella metoder

    Energy Technology Data Exchange (ETDEWEB)

    Ahnlund, Jonas; Bergquist, Tord; Raaberg, Martin [Lund Univ. (Sweden). Dept. of Information Technology

    2003-10-01

    The information in the control rooms has increased due to the technological advances in process control. Large industries produce large data quantities, where some information is unnecessary or even incorrect. The operator needs support from an advanced and well-adjusted alarm system to be able to separate a real event from a minor disturbance. The alarms must be of assistance and not a nuisance. An enhanced alarm situation qualifies an increased efficiency with fewer production disturbances and an improved safety. Yet, it is still unusual that actions are taken to improve the situation. An alarm cleanup with general methods can shortly be described as taking advantage of the control systems built-in functions, the possibility to modify or create function blocks and fine-tune the settings in the alarm system. In this project, we make use of an intelligent software, Alarm Cleanup Toolbox, that simulate different signal processing methods and tries to find improved settings on all the signals in the process. This is a fast and cost-efficient way to improve the overall alarm situation, and lays a foundation for more advanced alarm systems. An alarm cleanup has been carried out at Flintraennan district heating plant in Malmoe, where various signal processing methods has been implemented in a parallel alarm system. This made it possible to compare the two systems under the same conditions. The result is very promising, and shows that a lot of improvements can be achieved with very little effort. An analysis of the alarm system at Vattenreningen (the water purification process) at Heleneholmsverket in Malmoe has been carried out. Alarm Cleanup Toolbox has, besides suggesting improved settings, also found logical errors in the alarm system. Here, no implementation was carried out and therefore the results are analytical, but they validate the efficiency of the general methods. The project has shown that an alarm cleanup with general methods is cost-efficient, and that the

  11. Misremembering What You See or Hear: Dissociable Effects of Modality on Short- and Long-Term False Recognition

    Science.gov (United States)

    Olszewska, Justyna M.; Reuter-Lorenz, Patricia A.; Munier, Emily; Bendler, Sara A.

    2015-01-01

    False working memories readily emerge using a visual item-recognition variant of the converging associates task. Two experiments, manipulating study and test modality, extended prior working memory results by demonstrating a reliable false recognition effect (more false alarms to associatively related lures than to unrelated lures) within seconds…

  12. Classification of alarm processing techniques and human performance issues

    International Nuclear Information System (INIS)

    Kim, I.S.; O'Hara, J.M.

    1993-01-01

    Human factors reviews indicate that conventional alarm systems based on the one sensor, one alarm approach, have many human engineering deficiencies, a paramount example being too many alarms during major disturbances. As an effort to resolve these deficiencies, various alarm processing systems have been developed using different techniques. To ensure their contribution to operational safety, the impacts of those systems on operating crew performance should be carefully evaluated. This paper briefly reviews some of the human factors research issues associated with alarm processing techniques and then discusses a framework with which to classify the techniques. The dimensions of this framework can be used to explore the effects of alarm processing systems on human performance

  13. Experimental evaluation of human-system interaction on alarm design

    International Nuclear Information System (INIS)

    Huang, F.-H.; Lee, Y.-L.; Hwang, S.-L.; Yenn, T.-C.; Yu, Y.-C.; Hsu, C.-C.; Huang, H.-W.

    2007-01-01

    This study evaluates the practicability of automatic reset alarm system in Fourth Nuclear Power Plant (FNPP) of Taiwan. The features of auto-reset alarm system include dynamic prioritization of all alarm signals and fast system reset. Two experiments were conducted to evaluate the effect of automatic/manual reset on operation time, situational awareness (SA), task load index (TLX), and subjective ratings. All participants, including Experts and Novices, took part in the experiment on the alarm system simulator with Load Rejection procedure. The experimental results imply that the auto-reset alarm system may be applied in an advanced control room under Load Rejection procedure, because all participants' operation time were reduced as well as Novice's SA were raised up. Nevertheless, to ensure operating safety in FNPP, the effects of the auto-reset alarm system in other procedures/special situations still need to be tested in the near future

  14. Framework for analyzing safeguards alarms and response decisions

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; McCord, R.K.

    1982-01-01

    This paper describes a quantitative approach to help evaluate and respond to safeguards alarms. These alrms may be generated internally by a facility's safeguards systems or externally by individuals claiming to possess stolen Special Nuclear Material (SNM). This approach can be used to identify the most likely cause of an alarm - theft, hoax, or error - and to evaluate alternative responses to alarms. Possible responses include conducting investigations, initiating measures to recover stolen SNM, and replying to external threats. Based on the results of each alarm investigation step, the evaluation revises the likelihoods of possible causes of an alarm, and uses this information to determine the optimal sequence of further responses. The choice of an optimal sequence of responses takes into consideration the costs and benefits of successful thefts or hoaxes. These results provide an analytical basis for setting priorities and developing contingency plans for responding to safeguards alarms

  15. Classification of alarm processing techniques and human performance issues

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.S.; O' Hara, J.M.

    1993-01-01

    Human factors reviews indicate that conventional alarm systems based on the one sensor, one alarm approach, have many human engineering deficiencies, a paramount example being too many alarms during major disturbances. As an effort to resolve these deficiencies, various alarm processing systems have been developed using different techniques. To ensure their contribution to operational safety, the impacts of those systems on operating crew performance should be carefully evaluated. This paper briefly reviews some of the human factors research issues associated with alarm processing techniques and then discusses a framework with which to classify the techniques. The dimensions of this framework can be used to explore the effects of alarm processing systems on human performance.

  16. Classification of alarm processing techniques and human performance issues

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.S.; O`Hara, J.M.

    1993-05-01

    Human factors reviews indicate that conventional alarm systems based on the one sensor, one alarm approach, have many human engineering deficiencies, a paramount example being too many alarms during major disturbances. As an effort to resolve these deficiencies, various alarm processing systems have been developed using different techniques. To ensure their contribution to operational safety, the impacts of those systems on operating crew performance should be carefully evaluated. This paper briefly reviews some of the human factors research issues associated with alarm processing techniques and then discusses a framework with which to classify the techniques. The dimensions of this framework can be used to explore the effects of alarm processing systems on human performance.

  17. Resolution of alarms for loss of bulk nuclear material

    International Nuclear Information System (INIS)

    Eggers, R.F.; Davenport, L.C.

    1982-01-01

    Under methods of material accountability considered in the NRC's Reform Amendment (Federal Register, 46(175):45144 to 45151 dated September 10, 1981) prompt detection of losses and resolution of alarms play a central role in the day-to-day activities of the Material Control and Accounting (MC and A) System. This paper will discuss the two basic pathways of alarm resolution, namely, verification of the magnitude of the loss indicated by the initial alarm, and detection of deliberate or accidental accounting discrepancies. Progress along these pathways leads to a consensus that either (1) a loss occurred, (2) the original alarm was caused by MC and A error, or (3) the cause of the original alarm is uncertain. Three phases of response will be outlined and an example of response to alarms will be given for a mixed oxide powder processing control unit

  18. Development and Characteristics of an ANSI/ANS-8-3-1997-Compliant Criticality Alarm

    International Nuclear Information System (INIS)

    McMahan, J.W.

    2002-01-01

    A Criticality Alarm System (CAS) was developed at the Savannah River Site (SRS) beginning in 1964, which used an ionization chamber and battery - powered tube amplifier. Three generations of improvements are described here, to improve reliability, reduce maintenance cost, and eliminate false alarms. The original configuration for the CAS instrument (called Nuclear Incident Monitor-NIM model I) was a single chassis containing all components including the batteries and the detector, and a warning bell and light. To decrease the contamination potential of NIMs, the detector can now be removed from the chassis and remotely located for some installations. In the presently used second generation model II, each unit consists of an ion chamber with electrometer amplifier, voltage comparator circuits, battery and power supplies, monitoring circuits, and relay alarm circuits. The electrometer circuit is housed with the ion chamber in an aluminum enclosure. The remaining components are located in the main chassis. An alarm point of one R per Hour is adjustable over a narrow range for calibration purposes. Evacuation zones were determined on a 25 rad dose basis, and then modified to the 12 rad level

  19. Operator Performance Comparison of two VDT-based Alarm Systems

    International Nuclear Information System (INIS)

    Lee, Hyun-Chul; Oh, In-Suk; Sim, Bong-Shick; Koo, In-Soo; Kim, Jeong-Taek; Lee, Ki-Young; Park, Jong-Kyun

    1998-01-01

    This study is carried out to investigate performance differences between two alarm presentation methods from the viewpoint of human factors and to provide items to be improved. One of the alarm display methods considered in this study displays alarm lists on VDT combined with hardwired alarm panels. The other method displays alarms on plant mimic diagrams of VDT. This alarm display method has other features for operator aid with which operator can get detailed information on the activated alarm in the mimic diagrams, and the capability for alarm processing such as alarm reduction and prioritization. To compare the two display methods, a human factor experiment was performed with a plant simulator in the ITF (Integrated Test Facility) that plant operators run for 4 event scenarios. During the experiment, physiological measurements, system and operator action log, and audio/video recordings were collected. Operators subjective opinion was collected as well after the experiment. Time, error rate and situation awareness were major human factor criteria used for the comparison during the analysis stage of the experiment. No statistical significance was found in the results of our statistical comparison analysis. Several findings were identified, however, through the analysis of subjective opinions. (authors)

  20. Contribution of computerization to alarm processing: A French safety view

    Energy Technology Data Exchange (ETDEWEB)

    Cette, W [CEA Centre d` Etudes de Fontenay-aux-Roses, 92 (France). Inst. de Protection et de Surete Nucleaire

    1997-09-01

    Following the TMI accident and according to the requirement of the French safety authority, very important studies were performed by the French utility, Electricite de France (EDF), and assessed by the Institute for Nuclear Safety and Protection (IPSN) on reactor operation in conventional control rooms, particularly on alarm processing. These studies dealt with the man-machine interface, as well as design and exploitation requirements, presentation and management of alarm signals, and associated operating documents. The conclusions of these studies have led to improvements in French conventional control rooms. The current state of these control rooms and links between alarm sets and operating documents will be shortly presented in the first part of the paper. More recently, the computerized means implemented in the PWR 1400 MWe control rooms (N4) profoundly modified reactor operation. In particular, major advances concern alarm processing in comparison with conventional control rooms. The N4 plants provide a more rigorous approach in processing and presentation of alarms than in the past. Indeed, EDF wanted to have less alarms switched on during plant upsets and to make them more characteristic of a specific situation of the process. For example, computerization makes it easier to validate or inhibit alarms according to the situation, to allow the operator to manage alarm presentation and to propose on-line alarm sheets to the operator etc. This approach in comparison with conventional control rooms, and the IPSN assessment will be presented in the second part of this paper. (author).

  1. AI-based alarm processing for a nuclear power plant

    International Nuclear Information System (INIS)

    Na, N.J.; Kim, I.S.; Hwang, I.K.; Lee, D.Y.; Ham, C.S.

    1996-01-01

    A real-time expert system is implemented using artificial intelligence and object-oriented technology for alarm processing and presentation in a nuclear power plant. The knowledge base is constructed based on some schemes to process and display alarms to the plant operators. The activated alarms are dynamically prioritized by the reasoning rules, and then, presented on the process mimic overview and by some other means. To demonstrate the proposed system, the alarm processing and presentation is carried out in a simulated environment of the TMI-2 accident

  2. Contribution of computerization to alarm processing: A French safety view

    International Nuclear Information System (INIS)

    Cette, W.

    1997-01-01

    Following the TMI accident and according to the requirement of the French safety authority, very important studies were performed by the French utility, Electricite de France (EDF), and assessed by the Institute for Nuclear Safety and Protection (IPSN) on reactor operation in conventional control rooms, particularly on alarm processing. These studies dealt with the man-machine interface, as well as design and exploitation requirements, presentation and management of alarm signals, and associated operating documents. The conclusions of these studies have led to improvements in French conventional control rooms. The current state of these control rooms and links between alarm sets and operating documents will be shortly presented in the first part of the paper. More recently, the computerized means implemented in the PWR 1400 MWe control rooms (N4) profoundly modified reactor operation. In particular, major advances concern alarm processing in comparison with conventional control rooms. The N4 plants provide a more rigorous approach in processing and presentation of alarms than in the past. Indeed, EDF wanted to have less alarms switched on during plant upsets and to make them more characteristic of a specific situation of the process. For example, computerization makes it easier to validate or inhibit alarms according to the situation, to allow the operator to manage alarm presentation and to propose on-line alarm sheets to the operator etc. This approach in comparison with conventional control rooms, and the IPSN assessment will be presented in the second part of this paper. (author)

  3. Testing alarm resolution procedures in a fuel fabrication facility

    International Nuclear Information System (INIS)

    Smith, B.W.; Razvi, J.

    1984-07-01

    Process monitoring data can be used for generating material loss estimates. The intent of using process control data is to enhance nuclear material control and accounting for the timely detection and resolution of discrepancies. The purpose of an alarm resolution system is to distinguish between system errors and an actual loss of nuclear material. A study has been performed to develop and test a site-specific set of alarm resolution procedures. The results of the study are described and include the frequency of alarms, the causes of alarms, the type of resolution, and the modeling of loss estimates. 3 references, 2 figures, 2 tables

  4. Gamin partable radiation meter with alarm threshold

    International Nuclear Information System (INIS)

    Payat, Rene.

    1981-10-01

    The Gamin Radiation meter is a direct reading, portable, battery-powered gamma doserate meter featuring alarm thresholds. Doserate is read on a micro-ammeter with a millirad-per-hour logarithmic scale, covering a range of 0,1 to 1000 millirads/hour. The instrument issues an audible warning signal when dose-rate level exceeds a threshold value, which can be selected. The detector tube is of the Geiger-Muller counter, energy compensated type. Because of its low battery drain, the instrument can be operated continously for 1000 hours. It is powered by four 1.5 volt alcaline batteries of the R6 type. The electronic circuitry is housed in a small lightweight case made of impact resistant plastic. Applications of the Gamin portable radiation monitor are found in health physics, safety departments, medical facilities, teaching, civil defense [fr

  5. Kidkit guides children into alarming atmospheres

    DEFF Research Database (Denmark)

    Højlund, Marie; Kinch, Sofie

    2013-01-01

    This paper presents the concept of Embodied Habituation as an architectural approach to designing contextualized technologies. It does so by identifying Middle Ground Experiences acknowledging how spaces are inhabited with ambiguous qualities that affect people emotionally. The research is based...... on the development and evaluation of Kidkit, which is interactive furniture designed for young children who are going to visit a hospitalized relative with fatal injuries for the first time. Kidkit empowers the child to engage and be present by shaping Middle Ground Experiences in the hospital ward environment...... that is full of intimidating medical equipment and alarms. The evaluation results indicate collective rewards gained when children succeed in Embodied Habituation. Finally, the paper discusses how Middle Ground Experiences inevitably establish grounds for how we design for spatial experiences within...

  6. Aplikasi Sensor Cahaya Untuk Alarm Anti Pencuri

    Directory of Open Access Journals (Sweden)

    Asita Shoman Muzaki

    2011-11-01

    Full Text Available Kasus pencurian di rumah kosong yang ditinggal pergi oleh pemiliknya belakangan ini marak terjadi. Berangkat dari pemikiran ini penulis mencoba merancang alarm yang dapat mendeteksi pergerakan seseorang saat rumah dalam kondisi kosong, ditinggalkan oleh pemiliknya. Alat ini mempunyai prinsip kerja yaitu mendeteksi bayangan seseorang yang melewati titik tertentu. Perancangan dan pembuatan perangkat ini menggunakan sensor cahaya berupa LASER dan LDR yang dirangkai dengan transistor sebagai saklar otomatis serta LED dan telepon rumah untuk melakukan panggilan kepada nomor telepon pemilik rumah. Komponen yang dipakai dalam pembuatan perangkat ini antara lain IC LM7805, LASER pointer, resistor, transistor BC108, LED, relay dan telepon rumah. Perancangan dan pembuatan alat menggunakan software multisim 10.1 sebagai simulator rangkaian, dan software eagle 5.1.1 untuk mendesain jalur rangkaian pada papan PCB. Saat cahaya LASER tidak sampai ke LDR karena terhalang oleh sesuatu, maka rangkaian output yang berupa indikator LED dan panggilan dari telepon rumah akan aktif

  7. To stay or to go? Balancing the risk of reprocessing plant control room evacuation following a criticality alarm

    International Nuclear Information System (INIS)

    Love, Suzanne; McCrindle, David; Harris, Neil; Haworth, Justin

    2003-01-01

    Following a criticality alarm within the Magnox Separation Plant at Sellafield, there is a conflict of interest between the risks associated with complete evacuation versus continued manning of the control room. The historic emergency response policy would be to completely evacuate the control room upon a criticality alarm. If, however, the alarm was found to be false, the inevitable loss in control over the plant could have environmental, operational and radiological release consequences. Maintaining control room manning following a genuine alarm might, however, result in an avoidable high dose to an operator. Based upon the estimated dose equivalent to a control room operator for a range of criticality incident morphologies a risk analysis was undertaken. The results indicate that the differential risk between an operator who evacuates immediately and an operator who remains for a short time to complete diagnostic checks is very small. As a consequence a new emergency policy was therefore developed on plant which results in a relatively low risk to control room operators, but still allows control over the plant to be retained following a false criticality alarm. (author)

  8. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  9. Alarm management for process control a best-practice guide for design, implementation, and use of industrial alarm systems

    CERN Document Server

    Rothenberg, Douglas H

    2014-01-01

    No modern industrial enterprise, particularly in such areas as chemical processing, can operate without a secure, and reliable, network of automated monitors and controls. And those operations need alarm systems to alert engineers and managers the moment anything goes wrong or needs attention. This book, by one of the world's leading experts on industrial alarm systems, will provide A to Z coverage of designing, implementing, and maintaining an effective alarm network.

  10. Safety Bulletin 2013-1: When the alarm rings, you must leave!

    CERN Multimedia

    HSE Unit

    2013-01-01

    The HSE Unit just released the Safety Bulletin 2013-1 entitled “When the alarm rings, you must leave!”. The Bulletin is available on EDMS under the following number: 1307611. Be reminded  that HSE Safety Bulletins are published in English and French and share feedbacks of incidents/near miss/accidents that happened on the CERN site with the aim to improve prevention.

  11. False Position, Double False Position and Cramer's Rule

    Science.gov (United States)

    Boman, Eugene

    2009-01-01

    We state and prove the methods of False Position (Regula Falsa) and Double False Position (Regula Duorum Falsorum). The history of both is traced from ancient Egypt and China through the work of Fibonacci, ending with a connection between Double False Position and Cramer's Rule.

  12. Los Alamos Scientific Laboratory long-range alarm system

    International Nuclear Information System (INIS)

    DesJardin, R.; Machanik, J.

    1980-01-01

    The Los Alamos Scientific Laboratory (LASL) Long-Range Alarm System is described. The last few years have brought significant changes in the Department of Energy regulations for protection of classified documents and special nuclear material. These changes in regulations have forced a complete redesign of the LASL security alarm system. LASL covers many square miles of varying terrain and consists of separate technical areas connected by public roads and communications. A design study over a period of 2 years produced functional specifications for a distributed intelligence, expandable alarm system that will handle 30,000 alarm points from hundreds of data concentrators spread over a 250-km 2 area. Emphasis in the design was on nonstop operation, data security, data communication, and upward expandability to incorporate fire alarms and the computer-aided dispatching of security and fire vehicles. All aspects of the alarm system were to be fault tolerant from the central computer system down to but not including the individual data concentrators. Redundant communications lines travel over public domain from the alarmed area to the central alarm station

  13. False memories for aggressive acts.

    Science.gov (United States)

    Laney, Cara; Takarangi, Melanie K T

    2013-06-01

    Can people develop false memories for committing aggressive acts? How does this process compare to developing false memories for victimhood? In the current research we used a simple false feedback procedure to implant false memories for committing aggressive acts (causing a black eye or spreading malicious gossip) or for victimhood (receiving a black eye). We then compared these false memories to other subjects' true memories for equivalent events. False aggressive memories were all too easy to implant, particularly in the minds of individuals with a proclivity towards aggression. Once implanted, the false memories were indistinguishable from true memories for the same events, on several dimensions, including emotional content. Implications for aggression-related memory more generally as well as false confessions are discussed. Copyright © 2013 Elsevier B.V. All rights reserved.

  14. Changes in Default Alarm Settings and Standard In-Service are Insufficient to Improve Alarm Fatigue in an Intensive Care Unit: A Pilot Project.

    Science.gov (United States)

    Sowan, Azizeh Khaled; Gomez, Tiffany Michelle; Tarriela, Albert Fajardo; Reed, Charles Calhoun; Paper, Bruce Michael

    2016-01-11

    Clinical alarm systems safety is a national concern, specifically in intensive care units (ICUs) where alarm rates are known to be the highest. Interventional projects that examined the effect of changing default alarm settings on overall alarm rate and on clinicians' attitudes and practices toward clinical alarms and alarm fatigue are scarce. To examine if (1) a change in default alarm settings of the cardiac monitors and (2) in-service nursing education on cardiac monitor use in an ICU would result in reducing alarm rate and in improving nurses' attitudes and practices toward clinical alarms. This quality improvement project took place in a 20-bed transplant/cardiac ICU with a total of 39 nurses. We implemented a unit-wide change of default alarm settings involving 17 parameters of the cardiac monitors. All nurses received an in-service education on monitor use. Alarm data were collected from the audit log of the cardiac monitors 10 weeks before and 10 weeks after the change in monitors' parameters. Nurses' attitudes and practices toward clinical alarms were measured using the Healthcare Technology Foundation National Clinical Alarms Survey, pre- and postintervention. Alarm rate was 87.86 alarms/patient day (a total of 64,500 alarms) at the preintervention period compared to 59.18 alarms/patient day (49,319 alarms) postintervention (P=.01). At baseline, Arterial Blood Pressure (ABP), Pair Premature Ventricular Contractions (PVCs), and Peripheral Capillary Oxygen Saturation (SpO2) alarms were the highest. ABP and SpO2 alarms remained among the top three at the postproject period. Out of the 39 ICU nurses, 24 (62%) provided complete pre- and postproject survey questionnaires. Compared to the preintervention survey, no remarkable changes in the postproject period were reported in nurses' attitudes. Themes in the narrative data were related to poor usability of cardiac monitors and the frequent alarms. The data showed great variation among nurses in terms of changing

  15. Component Structure of Individual Differences in True and False Recognition of Faces

    Science.gov (United States)

    Bartlett, James C.; Shastri, Kalyan K.; Abdi, Herve; Neville-Smith, Marsha

    2009-01-01

    Principal-component analyses of 4 face-recognition studies uncovered 2 independent components. The first component was strongly related to false-alarm errors with new faces as well as to facial "conjunctions" that recombine features of previously studied faces. The second component was strongly related to hits as well as to the conjunction/new…

  16. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  17. Computational Human Performance Modeling For Alarm System Design

    Energy Technology Data Exchange (ETDEWEB)

    Jacques Hugo

    2012-07-01

    The introduction of new technologies like adaptive automation systems and advanced alarms processing and presentation techniques in nuclear power plants is already having an impact on the safety and effectiveness of plant operations and also the role of the control room operator. This impact is expected to escalate dramatically as more and more nuclear power utilities embark on upgrade projects in order to extend the lifetime of their plants. One of the most visible impacts in control rooms will be the need to replace aging alarm systems. Because most of these alarm systems use obsolete technologies, the methods, techniques and tools that were used to design the previous generation of alarm system designs are no longer effective and need to be updated. The same applies to the need to analyze and redefine operators’ alarm handling tasks. In the past, methods for analyzing human tasks and workload have relied on crude, paper-based methods that often lacked traceability. New approaches are needed to allow analysts to model and represent the new concepts of alarm operation and human-system interaction. State-of-the-art task simulation tools are now available that offer a cost-effective and efficient method for examining the effect of operator performance in different conditions and operational scenarios. A discrete event simulation system was used by human factors researchers at the Idaho National Laboratory to develop a generic alarm handling model to examine the effect of operator performance with simulated modern alarm system. It allowed analysts to evaluate alarm generation patterns as well as critical task times and human workload predicted by the system.

  18. New Concept For Alarm Structure And Management In Dcs Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Hegazy

    2015-08-01

    Full Text Available The objective of this paper is to set new standard for good design and best practice to applied when any DCS ManufacturesSuppliers configure process alarm system in any oil refining oil and gas production gas-handling facilities gasification plant or any chemical processing plant and thereby to optimizeminimize unnecessary alarms from reporting to operator workstations CAD Control Alarm Display. These views based on the experience acquired and implemented during involvement with the commissioning and startup of two DCS projects in Mina Al-Ahmadi Refinery Kuwait.

  19. Design of SMART alarm system using main memory database

    International Nuclear Information System (INIS)

    Jang, Kue Sook; Seo, Yong Seok; Park, Keun Oak; Lee, Jong Bok; Kim, Dong Hoon

    2001-01-01

    To achieve design goal of SMART alarm system, first of all we have to decide on how to handle and manage alarm information and how to use database. So this paper analyses concepts and deficiencies of main memory database applied in real time system. And this paper sets up structure and processing principles of main memory database using nonvolatile memory such as flash memory and develops recovery strategy and process board structures using these. Therefore this paper shows design of SMART alarm system is suited functions and requirements

  20. Reduced False Memory after Sleep

    Science.gov (United States)

    Fenn, Kimberly M.; Gallo, David A.; Margoliash, Daniel; Roediger, Henry L., III; Nusbaum, Howard C.

    2009-01-01

    Several studies have shown that sleep contributes to the successful maintenance of previously encoded information. This research has focused exclusively on memory for studied events, as opposed to false memories. Here we report three experiments showing that sleep reduces false memories in the Deese-Roediger-McDermott (DRM) memory illusion. False…

  1. Changes in 900 MW PWR alarm processing policy

    Energy Technology Data Exchange (ETDEWEB)

    Pont, M [Electricite de France, Generation and Transmission, Nuclear Power Plant Operations, Paris (France)

    1997-09-01

    Following a brief description of the current 900 MW PWR alarm processing system, this document presents the feasibility study carried out within the scope of the Instrumentation and Control Refurbishment project (R2C). (author). 4 figs, tabs.

  2. Measurement of the Portsmouth Gaseous Diffusion Plant criticality accident alarm

    International Nuclear Information System (INIS)

    Tayloe, R.W. Jr.; McGinnis, B.

    1990-01-01

    Measurements of the Portsmouth Gaseous Diffusion Plant's nuclear criticality accident radiation alarm signal response time, sound wave frequency, and sound volume levels were made to demonstrate compliance with ANSI/ANS-8.3-1986. A steady-state alarm signal is produced within one-half second of obtaining a two-out-of-three detector trip. The fundamental alarm sound wave frequency is 440 hertz. The sound volume levels are greater than 10 decibels above background and ranged from 100 to 125 A-weighted decibels. The requirements of the standard were met; however the recommended maximum sound volume level of 115 dBA was exceeded. Emergency procedures require immediate evacuation upon initiation of a facility's radiation alarm. Comparison with standards for allowable time of exposure at different noise levels indicate that the elevated noise level at this location does not represent an occupational injury hazard. 8 refs., 5 figs

  3. Changes in 900 MW PWR alarm processing policy

    International Nuclear Information System (INIS)

    Pont, M.

    1997-01-01

    Following a brief description of the current 900 MW PWR alarm processing system, this document presents the feasibility study carried out within the scope of the Instrumentation and Control Refurbishment project (R2C). (author). 4 figs, tabs

  4. ARC Code TI: Optimal Alarm System Design and Implementation

    Data.gov (United States)

    National Aeronautics and Space Administration — An optimal alarm system can robustly predict a level-crossing event that is specified over a fixed prediction horizon. The code contained in this packages provides...

  5. rf duress alarms: market survey and preliminary characterization

    International Nuclear Information System (INIS)

    Draper, B.L.

    1979-05-01

    This report represents the first phase of the duress alarm studies. Presented here are the results of an extensive market survey and some preliminary observations on the effectiveness of many system components

  6. Nuthatches eavesdrop on variations in heterospecific chickadee mobbing alarm calls

    Science.gov (United States)

    Templeton, Christopher N.; Greene, Erick

    2007-01-01

    Many animals recognize the alarm calls produced by other species, but the amount of information they glean from these eavesdropped signals is unknown. We previously showed that black-capped chickadees (Poecile atricapillus) have a sophisticated alarm call system in which they encode complex information about the size and risk of potential predators in variations of a single type of mobbing alarm call. Here we show experimentally that red-breasted nuthatches (Sitta canadensis) respond appropriately to subtle variations of these heterospecific “chick-a-dee” alarm calls, thereby evidencing that they have gained important information about potential predators in their environment. This study demonstrates a previously unsuspected level of discrimination in intertaxon eavesdropping. PMID:17372225

  7. Ship cabin leakage alarm based on ARM SCM

    Science.gov (United States)

    Qu, Liyan

    2018-03-01

    If there is a leakage in the cabin of a sailing ship, it is a major accident that threatens the personnel and property of the ship. If we can’t take timely measures, there will be a devastating disaster. In order to judge the leakage of the cabin, it is necessary to set up a leakage alarm system, so as to achieve the purpose of detecting and alarming the leakage of the cabin, and avoid the occurrence of accidents. This paper discusses the design of ship cabin leakage alarm system based on ARM SCM. In order to ensure the stability and precision of the product, the hardware design of the alarm system is carried out, such as circuit design, software design, the programming of SCM, the software programming of upper computer, etc. It is hoped that it can be of reference value to interested readers.

  8. A weighted dissimilarity index to isolate faults during alarm floods

    CERN Document Server

    Charbonnier, S; Gayet, P

    2015-01-01

    A fault-isolation method based on pattern matching using the alarm lists raised by the SCADA system during an alarm flood is proposed. A training set composed of faults is used to create fault templates. Alarm vectors generated by unknown faults are classified by comparing them with the fault templates using an original weighted dissimilarity index that increases the influence of the few alarms relevant to diagnose the fault. Different decision strategies are proposed to support the operator in his decision making. The performances are evaluated on two sets of data: an artificial set and a set obtained from a highly realistic simulator of the CERN Large Hadron Collider process connected to the real CERN SCADA system.

  9. [Citalopram, escitalopram and prolonged QT: warning or alarm?].

    Science.gov (United States)

    Alvarez, Enric; Vieira, Sara; Garcia-Moll, Xavier

    2014-01-01

    The alerts issued by regulatory agencies on the potential cardiac toxicity of citalopram and escitalopram have caused alarm among clinicians. A review of the data concerning this topic shows that the alarm should be limited to patients with a history of syncope or poisoning. As a precautionary measure, an electrocardiogram should be performed on elderly patients. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  10. A study of reset mode in advanced alarm system simulator

    International Nuclear Information System (INIS)

    Yenn, T. C.; Hwang, S. L.; Huang, F. H.; Yu, A. C.; Hsu, C. C.; Huang, H. W.

    2006-01-01

    An automation function has been widely applied in main control room of nuclear power plants. That leads to a new issue of human-automation interaction, which considers human operational performance in automated systems. In this research is the automation alarm reset in the advanced alarm system (AAS) of Advanced Nuclear Power Plant in Taiwan. Since alarms are very crucial for the understanding of the status of the plant as well as the reset function of alarm system will be changed from fully manual to fully automatic, it is very important to test and evaluate the performance and the effect of reset modes in AAS. The purpose of this paper is to evaluate the impact of the auto-reset alarm system on the plant performance and on operators' preference and task load. To develop a dynamic simulator as an AAS was conducted to compare manual and automatic reset function of alarm system on task performance and subjective ratings of task workload, comprehension, and preference. The simulation includes PCTRAN model and alarm software processing. The final results revealed that, using the auto-reset mode, participants had lower task load index (TLX) on effort in the first test trial and was more satisfied in multiple tasks condition. In contrast, using manual reset mode, participants were more satisfied on alarm handling, monitoring, and decision making. In other words, either reset mode in the study has unique features to assist operator, but is insufficient. The reset function in AAS therefore should be very flexible. Additionally, the experimental results also pointed out that the user interfaces need to be improved. Those experiences will be helpful for human factors verification and validation in the near future. (authors)

  11. False alerts in air traffic control conflict alerting system: is there a "cry wolf" effect?

    Science.gov (United States)

    Wickens, Christopher D; Rice, Stephen; Keller, David; Hutchins, Shaun; Hughes, Jamie; Clayton, Krisstal

    2009-08-01

    The aim is to establish the extent to which the high false-alarm rate of air traffic control midair conflict alerts is responsible for a "cry wolf' effect-where true alerts are not responded to and all alerts are delayed in their response. Some aircraft collisions have been partly attributed to the cry wolf effect, and in other domains (health care and systems monitoring), there is a causal connection between false-alarm rate and cry wolf behavior. We hypothesized that a corresponding relationship exists in air traffic control (ATC). Aircraft track and alert system behavior data surrounding 495 conflict alerts were analyzed to identify true and false alerts, trajectory type, and controller behavior. Forty-five percent of the alerts were false, ranging from 0.28 to 0.58. Although centers with more false alerts contributed to more nonresponses, there was no evidence that these were nonresponses to true alerts or that response times were delayed in those centers. Instead, controllers showed desirable anticipatory behavior by issuing trajectory changes prior to the alert. Those trajectory pairs whose conflicts were more difficult to visualize induced more reliance on, and less compliance with, the alerting system. The high false-alarm rate does not appear to induce cry wolf behavior in the context of en route ATC conflict alerts. There is no need to substantially modify conflict alert algorithms, but the conflict alert system may be modified to address difficult-to-visualize conflicts.

  12. The robustness of false memory for emotional pictures.

    Science.gov (United States)

    Bessette-Symons, Brandy A

    2018-02-01

    Emotional material is commonly reported to be more accurately recognised; however, there is substantial evidence of increased false alarm rates (FAR) for emotional material and several reports of stronger influences on response bias than accuracy. This pattern is more frequently reported for words than pictures. Research on the mechanisms underlying bias differences has mostly focused on word lists under short retention intervals. This article presents four series of experiments examining recognition memory for emotional pictures while varying arousal and the control over the content of the pictures at two retention intervals, and one study measuring the relatedness of the series picture sets. Under the shorter retention interval, emotion increased false alarms and reduced accuracy. Under the longer retention interval emotion increased hit rates and FAR, resulting in reduced accuracy and/or bias. At both retention intervals, the pattern of valence effects differed based on the arousal associated with the picture sets. Emotional pictures were found to be more related than neutral pictures in each set; however, the influence of relatedness alone does not provide an adequate explanation for all emotional differences. The results demonstrate substantial emotional differences in picture recognition that vary based on valence, arousal and retention interval.

  13. Development of alarm handling methods for boiling water reactors

    Energy Technology Data Exchange (ETDEWEB)

    Yukiharu, Ohga; Hiroshi, Seki; Setsuo, Arita [Power and Industrial Systems R and D Div., Hitachi, Ltd., Hitachi, Ibaraki (Japan)

    1997-09-01

    A method was developed to select important alarms in two steps: first, selection is based on the physical relationship between the alarms, and second, selection is according to the initial event. An approach combining a neural network and knowledge processing was proposed to identify the event rapidly. A prototype system was evaluated in the Kashiwazaki/Kariwa-4 Nuclear Power Plant during the startup test. The evaluation test confirmed that about 30% of the alarms are selected from among the many activated alarms. The second method, dealing with presentation, supports operators in their selection and confirmation of the required information for plant operation. The method selects and offers plant information in response to plant status changes and operators` demands. The selection procedure is based on the knowledge and data as structured by the plant functional structure; i.e. a means-ends abstraction hierarchy model. A prototype system was evaluated using a BWR simulator. The results showed that appropriate information items are automatically selected according to plant status changes and information on generated alarms is presented to operators together with the related trend graph and system diagram. Answers are generated in reply to the operators` demands and operators can confirm the generated alarms on each plant function, such as systems and components. 8 refs, 10 figs, 2 tabs.

  14. Measurement of the Portsmouth Gaseous Diffusion Plant criticality accident alarm

    International Nuclear Information System (INIS)

    Tayloe, R.W. Jr.; D'Aquila, D.M.; McGinnis, R.B.

    1991-01-01

    The nuclear criticality accident radiation alarm system installed at the Portsmouth Gaseous Diffusion Plant was tested extensively at critical facilities located at the Los Alamos National Laboratory. The ability of the neutron scintillator radiation detection units to respond to a minimum accident of concern as defined in Standard ANSI/ANS-83.-1986 was demonstrated. Detector placement and the established trip point are based on shielding calculations performed by the Oak Ridge National Laboratory and criticality specialists at the Portsmouth plant. Based on these experiments and calculations, a detector trip point of 5 mrad/h in air is used. Any credible criticality accident is expected to produce neutron radiation fields >5 mrad/h in air at one or more radiation alarm locations. Each radiation alarm location has a cluster of three detectors that employs a two-out-of-three alarm logic. Earlier work focused on testing the alarm logic latching circuitry. This work was directed toward measurements involving the actual audible alarm signal delivered

  15. Do aphid colonies amplify their emission of alarm pheromone?

    Science.gov (United States)

    Hatano, Eduardo; Kunert, Grit; Bartram, Stefan; Boland, Wilhelm; Gershenzon, Jonathan; Weisser, Wolfgang W

    2008-09-01

    When aphids are attacked by natural enemies, they emit alarm pheromone to alert conspecifics. For most aphids tested, (E)-beta-farnesene (EBF) is the main, or only, constituent of the alarm pheromone. In response to alarm pheromone, alerted aphids drop off the plant, walk away, or attempt to elude predators. However, under natural conditions, EBF concentration might be low due to the low amounts emitted, to rapid air movement, or to oxidative degradation. To ensure that conspecifics are warned, aphids might conceivably amplify the alarm signal by emitting EBF in response to EBF emitted by other aphids. To examine whether such amplification occurs, we synthesized deuterated EBF (DEBF), which allowed us to differentiate between applied and aphid-derived chemical. Colonies of Acyrthosiphon pisum were treated with DEBF, and headspace volatiles were collected and analyzed for evidence of aphid-derived EBF. No aphid-derived EBF was detected, suggesting that amplification of the alarm signal does not occur. We discuss the disadvantages of alarm signal reinforcement.

  16. Development of alarm handling methods for boiling water reactors

    International Nuclear Information System (INIS)

    Ohga Yukiharu; Seki Hiroshi; Arita Setsuo

    1997-01-01

    A method was developed to select important alarms in two steps: first, selection is based on the physical relationship between the alarms, and second, selection is according to the initial event. An approach combining a neural network and knowledge processing was proposed to identify the event rapidly. A prototype system was evaluated in the Kashiwazaki/Kariwa-4 Nuclear Power Plant during the startup test. The evaluation test confirmed that about 30% of the alarms are selected from among the many activated alarms. The second method, dealing with presentation, supports operators in their selection and confirmation of the required information for plant operation. The method selects and offers plant information in response to plant status changes and operators' demands. The selection procedure is based on the knowledge and data as structured by the plant functional structure; i.e. a means-ends abstraction hierarchy model. A prototype system was evaluated using a BWR simulator. The results showed that appropriate information items are automatically selected according to plant status changes and information on generated alarms is presented to operators together with the related trend graph and system diagram. Answers are generated in reply to the operators' demands and operators can confirm the generated alarms on each plant function, such as systems and components. 8 refs, 10 figs, 2 tabs

  17. Improved Detection and False Alarm Rejection Using FLGPR and Color Imagery in a Forward-Looking System

    Science.gov (United States)

    2010-01-01

    W911NF-05-1-0069 Havens, Tim, C. Spain, Christopher, J. Ho, Dominic, K.C. Keller, James, M. Ton, Tuan, T. Wong, David , C. Soumekh, Mehrdad...James M. Kellera, Tuan T. Tonb, David C. Wong, and Mehrdad Soumekhc aDept. of Electrical and Computer Engineering, University of Missouri...Research Office (48343-EV) in support of the u.s. Army RDECOM CERDEC NVESD. REFERENCES [1] Cremer , F., Schavemaker, J.G., de Jong, W., and Schutte, K

  18. Demonstration of Reduced False Alarm Rates using Simulated L-Band Polarimetric SAR Imagery of Concealed Targets

    Science.gov (United States)

    2005-04-14

    of Joensuu, Finland. These take the form of collections of dielectric cylinders, with detailed information concerning sapwood and heartwood dimensions...centre, and at 3km height above the minimum height of the DEM. The imaged area was 91m square, with pixels spaced at 0.5m. A Hamming weighted PSF was...correlation length was 0.1510m. Wood permittivity ranged from 2.2-i0.4 (deadwood) to 26.8-i5.3 ( sapwood ) via 6.7-i1.9 (heartwood). Total attenuation

  19. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  20. The false positive exercise test

    International Nuclear Information System (INIS)

    Moritani, Kohshiro; Matsuda, Yasuo; Ozaki, Masaharu; Ogawa, Hiroshi; Ichiyama, Masaji; Matsuda, Masako; Kusukawa, Reizo

    1986-01-01

    Exercise tests with sublingual nitroglycerin were performed on 7 patients with true positive and 8 patients with false positive exercise test results. Four of 7 patients with true positive changes and 8 patients with false positive changes underwent exercise cardiac scintigraphy. Scintigrams showed perfusion defects in 4 patients with true positive outcomes, and no perfusion defect in 8 patients with false positive outcomes. Exercise tests with sublingual nitroglycerin were performed with the same load as that without nitroglycerin. In all 7 patients with true positive exercise test results, ST segment depression observed in the control exercise test was not observed in the nitroglycerin exercise test. In the false positive patients, ST segment depression observed in the control exercise test remained unchanged in 7 of 8 patients receiving nitroglycerin. Exercise tests with sublingual nitroglycerin as well as exercise cardiac scintigraphy are valuable tods in differentiating false positive from true positive patients. Furthermore, these data suggest that ST segment depression in the false positive patients may not be related to myocardial ischemia. (author)

  1. Attributions of cancer 'alarm' symptoms in a community sample.

    Directory of Open Access Journals (Sweden)

    Katriina L Whitaker

    Full Text Available Attribution of early cancer symptoms to a non-serious cause may lead to longer diagnostic intervals. We investigated attributions of potential cancer 'alarm' and non-alarm symptoms experienced in everyday life in a community sample of adults, without mention of a cancer context.A questionnaire was mailed to 4858 adults (≥50 years old, no cancer diagnosis through primary care, asking about symptom experiences in the past 3 months. The word cancer was not mentioned. Target 'alarm' symptoms, publicised by Cancer Research UK, were embedded in a longer symptom list. For each symptom experienced, respondents were asked for their attribution ('what do you think caused it', concern about seriousness ('not at all' to 'extremely', and help-seeking ('did you contact a doctor about it': Yes/No.The response rate was 35% (n = 1724. Over half the respondents (915/1724; 53% had experienced an 'alarm' symptom, and 20 (2% cited cancer as a possible cause. Cancer attributions were highest for 'unexplained lump'; 7% (6/87. Cancer attributions were lowest for 'unexplained weight loss' (0/47. A higher proportion (375/1638; 23% were concerned their symptom might be 'serious', ranging from 12% (13/112 for change in a mole to 41% (100/247 for unexplained pain. Just over half had contacted their doctor about their symptom (59%, although this varied by symptom. Alarm symptoms were appraised as more serious than non-alarm symptoms, and were more likely to trigger help-seeking.Consistent with retrospective reports from cancer patients, 'alarm' symptoms experienced in daily life were rarely attributed to cancer. These results have implications for understanding how people appraise and act on symptoms that could be early warning signs of cancer.

  2. Alarm pheromone processing in the ant brain: an evolutionary perspective

    Directory of Open Access Journals (Sweden)

    Makoto Mizunami

    2010-06-01

    Full Text Available Social insects exhibit sophisticated communication by means of pheromones, one example of which is the use of alarm pheromones to alert nestmates for colony defense. We review recent advances in the understanding of the processing of alarm pheromone information in the ant brain. We found that information about formic acid and n-undecane, alarm pheromone components, is processed in a set of specific glomeruli in the antennal lobe of the ant Camponotus obscuripes. Alarm pheromone information is then transmitted, via projection neurons, to the lateral horn and the calyces of the mushroom body of the protocerebrum. In the lateral horn, we found a specific area where terminal boutons of alarm pheromone-sensitive projection neurons are more densely distributed than in the rest of the lateral horn. Some neurons in the protocerebrum responded specifically to formic acid or n-undecane and they may participate in the control of behavioral responses to each pheromone component. Other neurons, especially those originating from the mushroom body lobe, responded also to non-pheromonal odors and may play roles in integration of pheromonal and non-pheromonal signals. We found that a class of neurons receive inputs in the lateral horn and the mushroom body lobe and terminate in a variety of premotor areas. These neurons may participate in the control of aggressive behavior, which is sensitized by alarm pheromones and is triggered by non-pheromonal sensory stimuli associated with a potential enemy. We propose that the alarm pheromone processing system has evolved by differentiation of a part of general odor processing system.

  3. Auditory backup alarms: distance-at-first-detection via in-situ experimentation on alarm design and hearing protection effects.

    Science.gov (United States)

    Alali, Khaled; Casali, John G

    2012-01-01

    The purpose of this study was to assess normal hearing listeners' performance in detecting a stationary backup alarm signal and to quantify the linear distance at detection point. Detection distances for 12 participants with normal hearing were measured while they were fitted with 7 hearing protectors and while they were unoccluded (open ear). A standard (narrowband) backup alarm signal and a broadband (pulsed white noise) backup alarm signal from Brigade[1] were used. The method of limits, with distance as the physical measurement variable and threshold detection as the task, was employed to find at which distance the participant could first detect the backup alarms. A within-subject Analysis of Variance (ANOVA) revealed a significant main effect of the listening conditions on the detection distance in feet. Post hoc analyses indicated that the Bilsom L3HV conventional passive earmuff (at 1132.2 ft detection distance) was significantly poorer compared to all other HPDs and the open ear in detection distance achieved, and that there were no statistically-significant differences between the unoccluded ear (1652.3 ft), EB-15-Lo BlastPLGTM (1546.2 ft), EB-15-Hi BlastPLGTM (1543.4 ft), E-A-R/3M Combat ArmsTM earplug-nonlinear, level-dependent state (1507.8 ft), E-A-R/3M HiFiTM earplug (1497.7 ft), and Bilsom ImpactTM dichotic electronic earmuff (1567.2 ft). In addition, the E-A-R/3M Combat ArmsTM earplug-passive steady state resulted in significantly longer detection distances than only the open ear condition, at 1474.1 ft versus 1652.3 ft for the open ear. ANOVA also revealed a significant main effect of the backup alarm type on detection distance. The means were 1600.9 ft for the standard (narrowband) backup alarm signal, and a significantly closer 1379.4 ft was required for the Brigade broadband backup alarm signal. For on-ground workers, it is crucial to detect backup alarm signals as far away as possible rather than at close distances since this will provide them

  4. Alarm reduction with correlation analysis; Larmsanering genom korrelationsanalys

    Energy Technology Data Exchange (ETDEWEB)

    Bergquist, Tord; Ahnlund, Jonas; Johansson, Bjoern; Gaardman, Lennart; Raaberg, Martin [Lund Univ. (Sweden). Dept. of Information Technology

    2004-09-01

    This project's main interest is to improve the overall alarm situation in the control rooms. By doing so, the operators working environment is less overstrained, which simplifies the decision-making. According to a study of the British refinery industry, the operators make wrong decisions in four times out of ten due to badly tuned alarm systems, with heavy expenses as a result. Furthermore, a more efficiently alarm handling is estimated to decrease the production loss with between three and eight percent. This sounds, according to Swedish standards, maybe a bit extreme, but there is no doubt about the benefits of having a well-tuned alarm system. This project can be seen as an extension of 'General Methods for Alarm Reduction' (VARMEFORSK--835), where the process improvements were the result of suggestions tailored for every signal. Here, instead causal dependences in the process are examined. A method for this, specially designed to fit process signals, has been developed. It is called MLPC (Multiple Local Property Correlation) and could be seen as an unprejudiced way of increase the information value in the process. There are a number of ways to make use of the additional process understanding a correlation analysis provides. In the report some are mentioned, foremost aiming to improve the alarm situation for operators. Signals from two heating plants have been analyzed with MLPC. In simulations, with the use of the result from these analyses as a base, a large number of alarms have been successfully suppressed. The results have been studied by personal with process knowledge, and they are very positive to the use of MLPC and they express many benefits by the clarification of process relations. It was established in 'General Methods for Alarm Reduction' that low pass filter are superior to mean value filter and time delay when trying to suppress alarms. As a result, a module for signal processing has been developed. The main purpose is

  5. True photographs and false memories.

    Science.gov (United States)

    Lindsay, D Stephen; Hagen, Lisa; Read, J Don; Wade, Kimberley A; Garry, Maryanne

    2004-03-01

    Some trauma-memory-oriented psychotherapists advise clients to review old family photo albums to cue suspected "repressed" memories of childhood sexual abuse. Old photos might cue long-forgotten memories, but when combined with other suggestive influences they might also contribute to false memories. We asked 45 undergraduates to work at remembering three school-related childhood events (two true events provided by parents and one pseudoevent). By random assignment, 23 subjects were also given their school classes' group photos from the years of the to-be-recalled events as memory cues. As predicted, the rate of false-memory reports was dramatically higher in the photo condition than in the no-photo condition. Indeed, the rate of false-memory reports in the photo condition was substantially higher than the rate in any previously published study.

  6. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  7. FAULT DIAGNOSIS WITH MULTI-STATE ALARMS IN A NUCLEAR POWER CONTROL SIMULATOR

    Energy Technology Data Exchange (ETDEWEB)

    Austin Ragsdale; Roger Lew; Brian P. Dyre; Ronald L. Boring

    2012-10-01

    This research addresses how alarm systems can increase operator performance within nuclear power plant operations. The experiment examined the effect of two types of alarm systems (two-state and three-state alarms) on alarm compliance and diagnosis for two types of faults differing in complexity. We hypothesized three-state alarms would improve performance in alarm recognition and fault diagnoses over that of two-state alarms. We used sensitivity and criterion based on Signal Detection Theory to measure performance. We further hypothesized that operator trust would be highest when using three-state alarms. The findings from this research showed participants performed better and had more trust in three-state alarms compared to two-state alarms. Furthermore, these findings have significant theoretical implications and practical applications as they apply to improving the efficiency and effectiveness of nuclear power plant operations.

  8. Complex programmable logic device based alarm sequencer for nuclear power plants

    International Nuclear Information System (INIS)

    Khedkar, Ravindra; Solomon, J. Selva; KrishnaKumar, B.

    2001-01-01

    Complex Programmable Logic Device based Alarm Sequencer is an instrument, which detects alarms, memorizes them and displays the sequences of occurrence of alarms. It caters to sixteen alarm signals and distinguishes the sequence among any two alarms with a time resolution of 1 ms. The system described has been designed for continuous operation in process plants, nuclear power plants etc. The system has been tested and found to be working satisfactorily. (author)

  9. Sleep loss produces false memories.

    Directory of Open Access Journals (Sweden)

    Susanne Diekelmann

    Full Text Available People sometimes claim with high confidence to remember events that in fact never happened, typically due to strong semantic associations with actually encoded events. Sleep is known to provide optimal neurobiological conditions for consolidation of memories for long-term storage, whereas sleep deprivation acutely impairs retrieval of stored memories. Here, focusing on the role of sleep-related memory processes, we tested whether false memories can be created (a as enduring memory representations due to a consolidation-associated reorganization of new memory representations during post-learning sleep and/or (b as an acute retrieval-related phenomenon induced by sleep deprivation at memory testing. According to the Deese, Roediger, McDermott (DRM false memory paradigm, subjects learned lists of semantically associated words (e.g., "night", "dark", "coal",..., lacking the strongest common associate or theme word (here: "black". Subjects either slept or stayed awake immediately after learning, and they were either sleep deprived or not at recognition testing 9, 33, or 44 hours after learning. Sleep deprivation at retrieval, but not sleep following learning, critically enhanced false memories of theme words. This effect was abolished by caffeine administration prior to retrieval, indicating that adenosinergic mechanisms can contribute to the generation of false memories associated with sleep loss.

  10. False Positives in Exoplanet Detection

    Science.gov (United States)

    Leuquire, Jacob; Kasper, David; Jang-Condell, Hannah; Kar, Aman; Sorber, Rebecca; Suhaimi, Afiq; KELT (Kilodegree Extremely Little Telescope)

    2018-06-01

    Our team at the University of Wyoming uses a 0.6 m telescope at RBO (Red Buttes Observatory) to help confirm results on potential exoplanet candidates from low resolution, wide field surveys shared by the KELT (Kilodegree Extremely Little Telescope) team. False positives are common in this work. We carry out transit photometry, and this method comes with special types of false positives. The most common false positive seen at the confirmation level is an EB (eclipsing binary). Low resolution images are great in detecting multiple sources for photometric dips in light curves, but they lack the precision to decipher single targets at an accurate level. For example, target star KC18C030621 needed RBO’s photometric precision to determine there was a nearby EB causing exoplanet type light curves. Identifying false positives with our telescope is important work because it helps eliminate the waste of time taken by more expensive telescopes trying to rule out negative candidate stars. It also furthers the identification of other types of photometric events, like eclipsing binaries, so they can be studied on their own.

  11. Evolutionary Psychology and False Confession

    Science.gov (United States)

    Bering, Jesse M.; Shackelford, Todd K.

    2005-01-01

    This paper presents comments on Kassin's review, (see record 2005-03019-002) of the psychology of false confessions. The authors note that Kassin's review makes a compelling argument for the need for legal reform in police interrogation practices. Because his work strikes at the heart of the American criminal justice system--its fairness--the…

  12. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  13. General multiplex centralized fire-alarm display system

    International Nuclear Information System (INIS)

    Zhu Liqun; Chen Jinming

    2002-01-01

    The fire-alarm display system is developed, which can connect with each type of fire controllers produced in the factory and SIGMASYS controllers. It can display whole alarm information. The display system software gathers communication, database and multimedia, has functions of inspecting fire, showing alarm, storing data, searching information and so on. The drawing software lets the user expediently add, delete, move and modify fire detection or fire fighting facilities on the building floor maps. The graphic transform software lets the display use the vectorgraph produced by popular plotting software such as Auto CAD. The system software provides the administration function, such as log book of changing shift and managing workers etc.. The software executed on Windows 98 platform. The user interface is friendly and reliable in operation

  14. Development of a criticality monitoring and alarm system

    International Nuclear Information System (INIS)

    Egey, Julio; Izraelevitch, Federico H.; Matatagui, Emilio

    2009-01-01

    In this work we are presenting the development of a Criticality Monitor and Alarm System (SIMAC). It monitors the burst of radiation produced during such an accident and triggers an alarm for evacuation in case the radiation exceeds a pre-established threshold. It consists of two subsystems, one for gamma rays and the other for neutrons. Each subsystem has three independent detectors modules. Each module is composed of an ion chamber plus its associated electronics, feeding a logic module that in turn would trigger the evacuation alarm. An additional feature is a PC interface for data acquisition. The radiation detectors are ion chambers working in current mode. The electronics associated to each detector can manage a wide signal range using a logarithmic converter. (author)

  15. PROLOG language application for alarm system realization in accelerator control

    International Nuclear Information System (INIS)

    Frolov, I.; Vaguine, A.; Abe, I.; Nakahara, K.; Furukawa, K.; Kamikubota, N.

    1994-01-01

    Such PROLOG features as backtracking, matching and recursive data representation are powerful tools for ALARM system realization. Although the main idea is the possibility to describe some technical system in recursive form, backtracking and matching are ideal for processing recursive data structures. This paper represents a technique which would allow PROLOG language application for ALARM system realization using an example of the KEK LINAC magnet system. The technique is based on an object-oriented internal data representation in terms of objects, properties, relations and knowledge conception. In addition, each property value is characterized by a typical 'time life'. (author)

  16. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  17. Understanding heart rate alarm adjustment in the intensive care units through an analytical approach.

    Directory of Open Access Journals (Sweden)

    Richard L Fidler

    Full Text Available Heart rate (HR alarms are prevalent in ICU, and these parameters are configurable. Not much is known about nursing behavior associated with tailoring HR alarm parameters to individual patients to reduce clinical alarm fatigue.To understand the relationship between heart rate (HR alarms and adjustments to reduce unnecessary heart rate alarms.Retrospective, quantitative analysis of an adjudicated database using analytical approaches to understand behaviors surrounding parameter HR alarm adjustments. Patients were sampled from five adult ICUs (77 beds over one month at a quaternary care university medical center. A total of 337 of 461 ICU patients had HR alarms with 53.7% male, mean age 60.3 years, and 39% non-Caucasian. Default HR alarm parameters were 50 and 130 beats per minute (bpm. The occurrence of each alarm, vital signs, and physiologic waveforms was stored in a relational database (SQL server.There were 23,624 HR alarms for analysis, with 65.4% exceeding the upper heart rate limit. Only 51% of patients with HR alarms had parameters adjusted, with a median upper limit change of +5 bpm and -1 bpm lower limit. The median time to first HR parameter adjustment was 17.9 hours, without reduction in alarms occurrence (p = 0.57.HR alarms are prevalent in ICU, and half of HR alarm settings remain at default. There is a long delay between HR alarms and parameters changes, with insufficient changes to decrease HR alarms. Increasing frequency of HR alarms shortens the time to first adjustment. Best practice guidelines for HR alarm limits are needed to reduce alarm fatigue and improve monitoring precision.

  18. Trust, values and false consensus

    OpenAIRE

    Butler, Jeffrey V.; Giuliano, Paola; Guiso, Luigi

    2012-01-01

    Trust beliefs are heterogeneous across individuals and, at the same time, persistent across generations. We investigate one mechanism yielding these dual patterns: false consensus. In the context of a trust game experiment, we show that individuals extrapolate from their own type when forming trust beliefs about the same pool of potential partners – i.e., more (less) trustworthy individuals form more optimistic (pessimistic) trust beliefs - and that this tendency continues to color trust beli...

  19. Design of alarm systems in Swedish nuclear power plants

    International Nuclear Information System (INIS)

    Thunberg, Anna; Osvalder, Anna-Lisa

    2008-04-01

    Research within the area of improving alarm system design and performance has mainly focused on new alarm systems. However, smaller modernisations of legacy systems are more common in the Swedish nuclear industry than design of totally new systems. This imposes problems when the new system should function together with the old system. This project deals with the special concerns raised by modernisation projects. The objective of the project has been to increase the understanding of the relationship between the operator's performance and the design of the alarm system. Of major concern has been to consider the cognitive abilities of the operator, different operator roles and work situations, and varying need of information. The aim of the project has been to complement existing alarm design guidance and to develop user-centred alarm design concepts. Different case studies have been performed in several industry sectors (nuclear, oil refining, pulp and paper, aviation and medical care) to identify best practice. Several empirical studies have been performed within the nuclear area to investigate the operator's need of information, performance and workload in different operating modes. The aspect of teamwork has also been considered. The analyses show that the operator has different roles in different work situations which affect both the type of information needed and how the information is processed. In full power operation, the interaction between the operator and the alarm system is driven by internal factors and the operator tries to maintain high situation awareness by actively searching for information. The operator wants to optimise the process and need detailed information with possibilities to follow-up and get historical data. In disturbance management, the operator is more dependent on external information presented by the alarm system. The new compilation of alarm guidance is based on the operator's varying needs in different working situations and is

  20. Development experience and strategy for the combined algorithm on the alarm processing and diagnosis

    International Nuclear Information System (INIS)

    Chung, Hak-Yeong

    1997-01-01

    In this paper, I presented the development experience on the alarm processing and fault diagnosis which has been achieved from early 1988 to late 1995. The scope covered is the prototype stage, the development stage of on-line operator-aid system, and an intelligent human-machine interface system. In the second part, I proposed a new method (APEXS) of multi-alarm processing to select the causal alarm(s) among occurred alarms by using the time information of each occurred alarm and alarm tree knowledge and the corresponding diagnosis method based on the selected causal alarm(s) by using the prescribed qualitative model. With more knowledge base about the plant and some modification suitable for real environment, APEXS will be able to adapt to a real steam power plant. (author). 18 refs, 3 figs, 1 tab

  1. Integrated alarm annunciation and entry control systems -- Survey results

    International Nuclear Information System (INIS)

    Clever, J.J.; Arakaki, L.H.; Monaco, F.M.; Juarros, L.E.; Quintana, G.R.

    1993-10-01

    This report provides the results and analyses of a detailed survey undertaken in Summer 1993 to address integrated intrusion detection alarm annunciation and entry control system issues. This survey was undertaken as a first attempt toward beginning to answer questions about integrated systems and commercial capabilities to meet or partially meet US Department of Energy (DOE) site needs

  2. Survey of approaches for handling static analysis alarms

    NARCIS (Netherlands)

    Muske, T.; Serebrenik, A.

    2016-01-01

    Static analysis tools have showcased their importance and usefulness in automated detection of code anomalies and defects. However, the large number of alarms reported and cost incurred in their manual inspections have been the major concerns with the usage of static analysis tools. Existing studies

  3. Chemical alarm in the termite Termitogeton planus (Rhinotermitidae)

    Czech Academy of Sciences Publication Activity Database

    Dolejšová, Klára; Krasulová, Jana; Kutalová, K.; Hanus, Robert

    2014-01-01

    Roč. 40, 11/12 (2014), s. 1269-1276 ISSN 0098-0331 R&D Projects: GA ČR GAP506/10/1570 Institutional support: RVO:61388963 Keywords : termites * soldiers * frontal gland * alarm pheromone * Rhinotermitidae * Termitogeton Subject RIV: CC - Organic Chemistry Impact factor: 2.747, year: 2014

  4. Communication interface of computerized automatic fire alarm system

    International Nuclear Information System (INIS)

    Yu Hongmei; Zhu Liqun; Fang Shaohong; Du Chengbao

    1997-01-01

    The problems of communication between multiple single-chip computers and microcomputer have been solved by the way of hardware and software. The automatic fire alarm system is realized by using the serial port both on single-chip computer and microcomputer

  5. No more moody mornings : Alarm clock anticipates sleepers' emotions

    NARCIS (Netherlands)

    Wensveen, S.; Overbeeke, K.; Van Kasteren, J.

    2002-01-01

    More eloquent alternatives to the harsh tones of the oldfashioned alarm-clock bells abound, including a newsreaders voice summing up last nights disasters, or a tape of your favourite early morning music. Still, getting out of bed has its difficult moments. All this could well change in the near

  6. Alarm management in TRANSPETRO National Oil Control Center

    Energy Technology Data Exchange (ETDEWEB)

    Amado, Helio; Costa, Luciano [TRANSPETRO - PETROBRAS Transporte S.A., Rio de Janeiro, RJ (Brazil)

    2009-07-01

    For sure Alarm Management is not a new issue. EEMUA 191 has been around since 1999 and everyone has received visits from consultants in this area. Besides this regulators have requested that operators have a policy for it. However there are few papers showing actual pipeline operator experience in alarm management. In this paper we present the work developed in TRANSPETRO National Oil Control Center since 2006, where we operate 5509 km of crude oil and refined products pipelines. Since the beginning of the centralized operation in 2002, alarm management has been a concern but a systematic approach has been taken since 2006. Initially we will make a brief revision of the literature and show trends for regulations. Then we will show the tools and the approach we have taken. Finally, the further developments we see. The point that we want to discuss is that, it has been very difficult to implement the system in a linear way and we believe that companies that have huge legacy systems, the same probably will occur. Putting in simple words, our main conclusion is: Implementing an Alarm Management policy produces good results however probably sometimes is better not to follow strictly the traditional steps. (author)

  7. Automatic diagnosis of multiple alarms for reactor-control rooms

    International Nuclear Information System (INIS)

    Gimmy, K.L.; Nomm, E.

    1981-01-01

    A system has been developed at the Savannah River Plant to help reactor operators respond to multiple alarms in a developing incident situation. The need for such systems has become evident in recent years, particularly after the three Mile Island incident

  8. Satellite Search and Rescue System Studies: Alarm and Position Reporting.

    Science.gov (United States)

    alarm and position reporting ( ALPR ) techniques, and the operational or planned spacecraft which might be available for piggybacking the ALPR payload...Several system concepts were then developed to perform the ALPR functions. The candidates were screened and the preferred system concepts were chosen

  9. SeaQuest/E906 Shift Alarm System

    Science.gov (United States)

    Kitts, Noah

    2014-09-01

    SeaQuest, Fermilab E906, is a fixed target experiment that measures the Drell-Yan cross-section ratio of proton-proton to proton-deuterium collisions in order to extract the sea anti-quark structure of the proton. SeaQuest will extend the measurements made by E866/NuSea with greater precision at higher Bjorken-x. The continuously running experiment is always being monitored. Those on shift must keep track of all of the detector readouts in order to make sure the experiment is running correctly. As an experiment that is still in its early stages of running, an alarm system for people on shift is being created to provide warnings, such as a plot showing a detector's performance is sufficiently different to need attention. This plan involves python scripts that track live data. When the data shows a problem within the experiment, a corresponding alarm ID is sent to the MySQL database which then sets off an alarm. These alarms, which will alert the person on shift through both an audible and visual response, are important for ensuring that issues do not go unnoticed, and to help make sure the experiment is recording good data.

  10. Nuclear war as false memory

    Directory of Open Access Journals (Sweden)

    John Timberlake

    2014-10-01

    Full Text Available In this paper Timberlake outlines aspects of his creative practice as an artist, explaining his fascination for the ‘fictions of nuclear war’ – a war that never happened and so became the subject of ‘false memory’. Highlighting discontinued historical trajectories, the author shows how the cultural legacy of Britain’s nuclear test programme of the 1950s and ’60s may be explored meaningfully in paintings and photography resulting from his archival research at the Imperial War Museum in London.

  11. False advertising in the greenhouse?

    Science.gov (United States)

    Banse, K.

    1991-12-01

    Most scientists are convinced of the importance of their own research subjects. Broecker [1991] has deplored the temptation, if not the tendency, to go overboard and exaggerate this importance once funding enters the mind. In particular, he alleges inflated or even false claims by biological (and other) oceanographers regarding the relevance of their research to the "greenhouse effect," caused by the anthropogenic enhancement of the atmospheric CO2 content. He writes [Broecker, 1991, p. 191]: "In my estimation, on any list of subjects requiring intense study with regard to the prediction of the consequences of CO2 buildup in the atmosphere, I would place marine biological cycles near the bottom."

  12. Wild birds learn to eavesdrop on heterospecific alarm calls.

    Science.gov (United States)

    Magrath, Robert D; Haff, Tonya M; McLachlan, Jessica R; Igic, Branislav

    2015-08-03

    Many vertebrates gain critical information about danger by eavesdropping on other species' alarm calls [1], providing an excellent context in which to study information flow among species in animal communities [2-4]. A fundamental but unresolved question is how individuals recognize other species' alarm calls. Although individuals respond to heterospecific calls that are acoustically similar to their own, alarms vary greatly among species, and eavesdropping probably also requires learning [1]. Surprisingly, however, we lack studies demonstrating such learning. Here, we show experimentally that individual wild superb fairy-wrens, Malurus cyaneus, can learn to recognize previously unfamiliar alarm calls. We trained individuals by broadcasting unfamiliar sounds while simultaneously presenting gliding predatory birds. Fairy-wrens in the experiment originally ignored these sounds, but most fled in response to the sounds after two days' training. The learned response was not due to increased responsiveness in general or to sensitization following repeated exposure and was independent of sound structure. Learning can therefore help explain the taxonomic diversity of eavesdropping and the refining of behavior to suit the local community. In combination with previous work on unfamiliar predator recognition (e.g., [5]), our results imply rapid spread of anti-predator behavior within wild populations and suggest methods for training captive-bred animals before release into the wild [6]. A remaining challenge is to assess the importance and consequences of direct association of unfamiliar sounds with predators, compared with social learning-such as associating unfamiliar sounds with conspecific alarms. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Revisiting the False Confession Problem.

    Science.gov (United States)

    Alvarez-Toro, Viviana; Lopez-Morales, Cesar A

    2018-03-01

    Despite the existence of important safeguards in our criminal legal system, innocent suspects often succumb to forceful and deceptive interrogation techniques. Among those over-represented members of the false confessor population are minors, people with cognitive and intellectual disabilities, and those with psychiatric disorders. Some of the confessions made by these at-risk populations can hardly be considered voluntary or reliable, but they are generally admitted at trial, regardless of their prejudicial effect. Forensic psychiatrists should become more involved in the overall process of evaluating confessions, not only testifying in courts, but also assisting policymakers in reforming the interrogation process and influencing the legal process. Thus, forensic psychiatrists may give their expert opinion by providing proper training to police interrogators and examining videotaped interrogations. In addition, forensic experts can be instrumental in contributing to three legal solutions that we propose to the false confession problem: a constitutional approach, an evidence law approach, and a jury instruction approach. Each of these approaches requires forensic psychiatrists to help judges and jurors understand the coercive nature of the interrogation process and its effect on suspects' behavior. © 2018 American Academy of Psychiatry and the Law.

  14. Introducing False EUR and False EUR exchange rates

    Science.gov (United States)

    Ausloos, M.; Ivanova, K.

    2000-10-01

    The Euro ( EUR) is a new currency introduced by the European Community. Its exchange rate is very puzzling. We have invented a false Euro ( FEUR) dating back to 1993 and have derived the exchange rates of the FEUR with respect to currencies not belonging to the EUR, i.e., DKK, CHF, JPY and USD. This allows us to search for correlations between the fluctuations preexisting to the introduction of EUR and present ones in such financial data. The detrended fluctuation analysis ( DFA) statistical method is used. This leads to assume a power-law behavior, i.e., a scaling hypothesis, through an exponent α. The latter has demonstrated its usefulness for the investigations of long-range power-law correlations in several types of financial sequences. Our findings show that the α exponent interestingly characterizes fractional Brownian motion of the currency exchange rates between EUR and DKK over a 25 day interval, and usual Brownian motion otherwise and for the three other investigated exchange rates. We can devise an investment strategy based on the localα technique and obtain appreciable gains for the time being.

  15. Plaswekker ook succesvol bij 5-7-jarigen met enuresis nocturna [Alarm treatment also successful in children aged 5 to 7 years with nocturnal enuresis

    NARCIS (Netherlands)

    Zwet, J.M.L. van; Wiertz, Y.D.B.M.; Bolk-Bennink, L.F.; Leerdam, F.J.M. van; Hirasing, R.A.

    1998-01-01

    Objective. To determine how many bed-wetting children aged 5-7 years unlearn the habit using the alarm treatment. Design. Descriptive. Setting. TNO Prevention and Health, Leiden, the Netherlands. Methods. The population consisted of all children aged 5 to 7 with nocturnal enuresis (defined as ≤ 2

  16. Retrofitting alarm prioritization at Bruce A: strategy development and implementation experience

    International Nuclear Information System (INIS)

    Davey, E.; Hickey, D.; Babcock, B.

    1997-01-01

    A prioritization strategy for computer-displayed control room alarms has been developed for Bruce A to better assist operations staff in visually identifying key alarms and judging the relative importance of alarms. The strategy consists of assigning each alarm indicative of a problem to be addressed to one of five priority categories. Each alarm is assigned to an alarm category based on an off-line analysis of the consequence and response characteristics applicable to the alarm for three plant operating contexts. The colour of the alarm message is used to convey the priority category of each alarm in computer-based alarm displays. In addition, alarms indicative of non-problematic changes in the state of plant equipment and processes are given a separate colour assignment to visually differentiate them from alarms indicative of problems. This paper outlines the user-based approach employed in the prioritization strategy development, describes the key features of the prioritization strategy adopted, and discusses the initial experience in systematically determining the priority assignments for all 6000 computer-based alarms associated with each generating unit. (author)

  17. Stop the Noise: A Quality Improvement Project to Decrease Electrocardiographic Nuisance Alarms.

    Science.gov (United States)

    Sendelbach, Sue; Wahl, Sharon; Anthony, Anita; Shotts, Pam

    2015-08-01

    As many as 99% of alarm signals may not need any intervention and can result in patients' deaths. Alarm management is now a Joint Commission National Patient Safety Goal. To reduce the number of nuisance electrocardiographic alarm signals in adult patients on the medical cardiovascular care unit. A quality improvement process was used that included eliminating duplicative alarms, customizing alarms, changing electrocardiography electrodes daily, standardizing skin preparation, and using disposable electrocardiography leads. In the cardiovascular care unit, the mean number of electrocardiographic alarm signals per day decreased from 28.5 (baseline) to 3.29, an 88.5% reduction. Use of a bundled approach to managing alarm signals decreased the mean number of alarm signals in a cardiovascular care unit. ©2015 American Association of Critical-Care Nurses.

  18. Teaching methodology of the diagnosing process on the example of the fire alarm system

    Directory of Open Access Journals (Sweden)

    Paś Jacek

    2017-03-01

    Full Text Available The article presents a method of teaching the process of diagnosing the technical and functional condition of the fire alarm system (SSP. The fire alarm system’s laboratory model is a representation of a real fire alarm system. The lecturer has the opportunity to inflict several different independent damage. The aim of the laboratory exercise is to familiarize students with the methodology and structure of the fire alarm system diagnosing process.

  19. PT-SAFE: a software tool for development and annunciation of medical audible alarms.

    Science.gov (United States)

    Bennett, Christopher L; McNeer, Richard R

    2012-03-01

    Recent reports by The Joint Commission as well as the Anesthesia Patient Safety Foundation have indicated that medical audible alarm effectiveness needs to be improved. Several recent studies have explored various approaches to improving the audible alarms, motivating the authors to develop real-time software capable of comparing such alarms. We sought to devise software that would allow for the development of a variety of audible alarm designs that could also integrate into existing operating room equipment configurations. The software is meant to be used as a tool for alarm researchers to quickly evaluate novel alarm designs. A software tool was developed for the purpose of creating and annunciating audible alarms. The alarms consisted of annunciators that were mapped to vital sign data received from a patient monitor. An object-oriented approach to software design was used to create a tool that is flexible and modular at run-time, can annunciate wave-files from disk, and can be programmed with MATLAB by the user to create custom alarm algorithms. The software was tested in a simulated operating room to measure technical performance and to validate the time-to-annunciation against existing equipment alarms. The software tool showed efficacy in a simulated operating room environment by providing alarm annunciation in response to physiologic and ventilator signals generated by a human patient simulator, on average 6.2 seconds faster than existing equipment alarms. Performance analysis showed that the software was capable of supporting up to 15 audible alarms on a mid-grade laptop computer before audio dropouts occurred. These results suggest that this software tool provides a foundation for rapidly staging multiple audible alarm sets from the laboratory to a simulation environment for the purpose of evaluating novel alarm designs, thus producing valuable findings for medical audible alarm standardization.

  20. Potential Nematode Alarm Pheromone Induces Acute Avoidance in Caenorhabditis elegans.

    Science.gov (United States)

    Zhou, Ying; Loeza-Cabrera, Mario; Liu, Zheng; Aleman-Meza, Boanerges; Nguyen, Julie K; Jung, Sang-Kyu; Choi, Yuna; Shou, Qingyao; Butcher, Rebecca A; Zhong, Weiwei

    2017-07-01

    It is crucial for animal survival to detect dangers such as predators. A good indicator of dangers is injury of conspecifics. Here we show that fluids released from injured conspecifics invoke acute avoidance in both free-living and parasitic nematodes. Caenorhabditis elegans avoids extracts from closely related nematode species but not fruit fly larvae. The worm extracts have no impact on animal lifespan, suggesting that the worm extract may function as an alarm instead of inflicting physical harm. Avoidance of the worm extract requires the function of a cGMP signaling pathway that includes the cGMP-gated channel TAX-2/TAX-4 in the amphid sensory neurons ASI and ASK. Genetic evidence indicates that the avoidance behavior is modulated by the neurotransmitters GABA and serotonin, two common targets of anxiolytic drugs. Together, these data support a model that nematodes use a nematode-specific alarm pheromone to detect conspecific injury. Copyright © 2017 by the Genetics Society of America.

  1. Fault tolerant microcomputer based alarm annunciator for Dhruva reactor

    International Nuclear Information System (INIS)

    Chandra, A.K.

    1988-01-01

    The Dhruva alarm annunciator displays the status of 624 alarm points on an array of display windows using the standard ringback sequence. Recognizing the need for a very high availability, the system is implemented as a fault tolerant configuration. The annunciator is partitioned into three identical units; each unit is implemented using two microcomputers wired in a hot standby mode. In the event of one computer malfunctioning, the standby computer takes over control in a bouncefree transfer. The use of microprocessors has helped built-in flexibility in the system. The system also provides built-in capability to resolve the sequence of occurrence of events and conveys this information to another system for display on a CRT. This report describes the system features, fault tolerant organisation used and the hardware and software developed for the annunciation function. (author). 8 figs

  2. Central display system of figures in fire alarm

    International Nuclear Information System (INIS)

    Fang Shaohong; Zhu Zicheng; Zhu Liqun; Ren Yi; Yu Hongmei; Du Chengbao; Xie Guoxue

    1997-01-01

    A new type of 'central display system of figures in fire alarm' includes two parts: (1) software package of drawing picture; (2) real time processing and operate system (POS). Main function of the software package is to draw floor plane figures, fire-fighting facility signs and room numbers; and then all pictures are used in POS. Main functions of POS are to process fire alarm, faults and activation of fire fighting control facility, save and print reports, look over floor plane figures, look over concrete condition of fire fighting facilities, and to show appropriate prompt according to different case. This system realizes many functions, such as, control with mouse, operation with push-button, menu operation interface, flip windows to prompt, and chinese character. It have won acclaim for its amazing interface, its convenience to operate, its reliability and flexibility

  3. Planning an Automatic Fire Detection, Alarm, and Extinguishing System for Research Laboratories

    Directory of Open Access Journals (Sweden)

    Rostam Golmohamadi

    2014-04-01

    Full Text Available Background & Objectives: Educational and research laboratories in universities have a high risk of fire, because they have a variety of materials and equipment. The aim of this study was to provide a technical plan for safety improvement in educational and research laboratories of a university based on the design of automatic detection, alarm, and extinguishing systems . Methods : In this study, fire risk assessment was performed based on the standard of Military Risk Assessment method (MIL-STD-882. For all laboratories, detection and fire alarm systems and optimal fixed fire extinguishing systems were designed. Results : Maximum and minimum risks of fire were in chemical water and wastewater (81.2% and physical agents (62.5% laboratories, respectively. For studied laboratories, we designed fire detection systems based on heat and smoke detectors. Also in these places, fire-extinguishing systems based on CO2 were designed . Conclusion : Due to high risk of fire in studied laboratories, the best control method for fire prevention and protection based on special features of these laboratories is using automatic detection, warning and fire extinguishing systems using CO2 .

  4. Large and Dense Swarms: Simulation of a Shortest Path Alarm Propagation

    Directory of Open Access Journals (Sweden)

    Claudia Snels

    2015-07-01

    Full Text Available This paper deals with the transmission of alarm messages in large and dense underwater swarms of Autonomous Underwater Vehicles (AUVs and describes the verification process of the derived algorithm results by means of two simulation tools realized by the authors. A collision-free communication protocol has been developed, tailored to a case where a single AUV needs to send a message to a specific subset of swarm members regarding a perceived danger. The protocol includes a handshaking procedure that creates a silence region before the transmission of the message obtained through specific acoustic tones out of the normal transmission frequencies or through optical signals. This region will include all members of the swarm involved in the alarm message and their neighbours, preventing collisions between them. The AUV sending messages to a target area computes a delay function on appropriate arcs and runs a Dijkstra-like algorithm obtaining a multicast tree. After an explanation of the whole building of this collision-free multicast tree, a simulation has been carried out assuming different scenarios relevant to swarm density, signal power of the modem and the geometrical configuration of the nodes.

  5. Associations between the self-reported frequency of hearing chemical alarms in theater and regional brain volume in Gulf War Veterans.

    Science.gov (United States)

    Chao, Linda L; Reeb, Rosemary; Esparza, Iva L; Abadjian, Linda R

    2016-03-01

    We previously reported evidence of reduced cortical gray matter (GM), white matter (WM), and hippocampal volume in Gulf War (GW) veterans with predicted exposure to low-levels of nerve agent according to the 2000 Khamisiyah plume model analysis. Because there is suggestive evidence that other nerve agent exposures may have occurred during the Gulf War, we examined the association between the self-reported frequency of hearing chemical alarms sound during deployment in the Gulf War and regional brain volume in GW veterans. Ninety consecutive GW veterans (15 female, mean age: 52±8years) participating in a VA-funded study underwent structural magnetic resonance imaging (MRI) on a 3T scanner. Freesurfer (version 5.1) was used to obtain regional measures of cortical GM, WM, hippocampal, and insula volume. Multiple linear regression was used to determine the association between the self-reported frequencies of hearing chemical alarms during the Gulf War and regional brain volume. There was an inverse association between the self-reported frequency of hearing chemical alarms sound and total cortical GM (adjusted p=0.007), even after accounting for potentially confounding demographic and clinical variables, the veterans' current health status, and other concurrent deployment-related exposures that were correlated with hearing chemical alarms. Post-hoc analyses extended the inverse relationship between the frequency of hearing chemical alarms to GM volume in the frontal (adjusted p=0.02), parietal (adjusted p=0.01), and occipital (adjusted p=0.001) lobes. In contrast, regional brain volumes were not significantly associated with predicted exposure to the Khamisiyah plume or with Gulf War Illness status defined by the Kansas or Centers for Disease Control and Prevention criteria. Many veterans reported hearing chemical alarms sound during the Gulf War. The current findings suggest that exposure to substances that triggered those chemical alarms during the Gulf War likely

  6. Description of ALARMA: the alarm algorithm developed for the Nuclear Car Wash

    International Nuclear Information System (INIS)

    Luu, T; Biltoft, P; Church, J; Descalle, M; Hall, J; Manatt, D; Mauger, J; Norman, E; Petersen, D; Pruet, J; Prussin, S; Slaughter, D

    2006-01-01

    The goal of any alarm algorithm should be that it provide the necessary tools to derive confidence limits on whether the existence of fissile materials is present in cargo containers. It should be able to extract these limits from (usually) noisy and/or weak data while maintaining a false alarm rate (FAR) that is economically suitable for port operations. It should also be able to perform its analysis within a reasonably short amount of time (i.e. ∼ seconds). To achieve this, it is essential that the algorithm be able to identify and subtract any interference signature that might otherwise be confused with a fissile signature. Lastly, the algorithm itself should be user-intuitive and user-friendly so that port operators with little or no experience with detection algorithms may use it with relative ease. In support of the Nuclear Car Wash project at Lawrence Livermore Laboratory, we have developed an alarm algorithm that satisfies the above requirements. The description of the this alarm algorithm, dubbed ALARMA, is the purpose of this technical report. The experimental setup of the nuclear car wash has been well documented [1, 2, 3]. The presence of fissile materials is inferred by examining the β-delayed gamma spectrum induced after a brief neutron irradiation of cargo, particularly in the high-energy region above approximately 2.5 MeV. In this region naturally occurring gamma rays are virtually non-existent. Thermal-neutron induced fission of 235 U and 239 P, on the other hand, leaves a unique β-delayed spectrum [4]. This spectrum comes from decays of fission products having half-lives as large as 30 seconds, many of which have high Q-values. Since high-energy photons penetrate matter more freely, it is natural to look for unique fissile signatures in this energy region after neutron irradiation. The goal of this interrogation procedure is a 95% success rate of detection of as little as 5 kilograms of fissile material while retaining at most .1% false alarm

  7. Design of reactor alarm instrument based on SOPC

    International Nuclear Information System (INIS)

    Li Meng; Lu Yi; Rong Ru

    2008-01-01

    The design of embedded alarm instrument in reactors based on Nios II CPU is introduced in this paper. This design uses the SOPC technology based on the Cyclone series FPGA as a digital bench, and connects the MPU and drivers and interface of times, RS232, sdram,and etc. into a FPGA chip. It is proved that the system achieves the design goals in primary experimentation. (authors)

  8. Seismic alarm system for Ignalina nuclear power plant

    International Nuclear Information System (INIS)

    Wieland, M.; Griesser, L.; Austin, G.E.; Tiurin, S.; Kuendig, C.

    2001-01-01

    A seismic alarm system will be installed at the Ignalina Nuclear Power Plant (INPP) in Lithuania. There are two reactors, both RMBK 1500 MW units. Each reactor is a water cooled, graphite moderated, channel type reactor. INPP has the most advanced version of the RMBK reactor design series. The first and second units of INPP went into service at the end of 1983 and in August 1987 respectively. Their design lifetime is approx. 30 years. The various buildings and plant have been designed for two earthquake levels, that is the design earthquake and the maximum possible earthquake with peak ground accelerations ranging from 1.2% to 10% of the acceleration due to gravity. Certain parts of the buildings and some of the equipment of the first and second units do not comply with Western seismic standards. As seismic strengthening of the existing buildings and equipment is not feasible economically, a reactor protection system based on an earthquake early warning system was recommended. This system essentially consists of six seismic stations encircling INPP at a radial distance of approx. 30 km and a seventh station at INPP. Each station includes three seismic substations each 500 m apart. The ground motion at each station is measured continuously by three accelerometers and one seismometer. Data is transmitted via telemetry to the control centre at INPP. Early warning alarms are generated if a seismic threshold is exceeded. This paper discusses the characteristics of INPP, the seismic alarm system presently under construction and the experience with other early warning and seismic alarm systems. (author)

  9. Process plant alarm diagnosis using synthesised fault tree knowledge

    International Nuclear Information System (INIS)

    Trenchard, A.J.

    1990-01-01

    The development of computer based tools, to assist process plant operators in their task of fault/alarm diagnosis, has received much attention over the last twenty five years. More recently, with the emergence of Artificial Intelligence (AI) technology, the research activity in this subject area has heightened. As a result, there are a great variety of fault diagnosis methodologies, using many different approaches to represent the fault propagation behaviour of process plant. These range in complexity from steady state quantitative models to more abstract definitions of the relationships between process alarms. Unfortunately, very few of the techniques have been tried and tested on process plant and even fewer have been judged to be commercial successes. One of the outstanding problems still remains the time and effort required to understand and model the fault propagation behaviour of each considered process. This thesis describes the development of an experimental knowledge based system (KBS) to diagnose process plant faults, as indicated by process variable alarms. In an attempt to minimise the modelling effort, the KBS has been designed to infer diagnoses using a fault tree representation of the process behaviour, generated using an existing fault tree synthesis package (FAULTFINDER). The process is described to FAULTFINDER as a configuration of unit models, derived from a standard model library or by tailoring existing models. The resultant alarm diagnosis methodology appears to work well for hard (non-rectifying) faults, but is likely to be less robust when attempting to diagnose intermittent faults and transient behaviour. The synthesised fault trees were found to contain the bulk of the information required for the diagnostic task, however, this needed to be augmented with extra information in certain circumstances. (author)

  10. The research of nuclear experiment radiation environment wireless alarm device

    International Nuclear Information System (INIS)

    Wang Xiaoqiong; Wang Pan; Fang Fang

    2009-01-01

    This article introduces based on monolithic integrated circuit's nuclear experiment radiation environment wireless alarm device's software and hardware design. The system by G-M tube, high-pressured module, signal conditioning circuit, power source module, monolithic integrated circuit and wireless transmission module is composed. The device has low power consumption, high performance, high accuracy detection, easy maintenance, small size, simple operation, and other features, and has a broad application prospects. (authors)

  11. Functional relationship based alarm processing system for nuclear power

    International Nuclear Information System (INIS)

    Corsberg, D.; Sebo, D.

    1986-01-01

    At the Idaho National Engineering Laboratory (INEL), two knowledge-based systems, Alarm Filtering System (AFS) and Reactor Safety Assessment System (RSAS), are being developed to address the problem of information overload faced by operators during major plant transients. This paper discusses those systems, their strengths and weaknesses, and how their basic methodologies can be combined into a system that can better support the operator in identifying the plant state

  12. Recent and proposed changes in criticality alarm system requirements

    International Nuclear Information System (INIS)

    Putman, V.L.

    1998-01-01

    Various changes in criticality alarm system (CAS) requirements of American Nuclear Society (ANS) standards, US Department of Energy (DOE) orders, US Nuclear Regulatory Commission (NRC) regulations and guidance, and Occupational Safety and Health Administration (OSHA) standards or regulations were approved or proposed in the last 5 yr. Many changes interpreted or clarified existing requirements or accommodated technological or organizational developments. However, some changes could substantively affect CAS programs, including several changes originally thought to be editorial. These changes are discussed here

  13. Evaluation of personal alarm devices for fire fighters

    International Nuclear Information System (INIS)

    Sharry, J.; da Roza, R.A.

    1984-01-01

    Although three of the models of the personal alarm devices (PAD) tested had received letters of acceptability and compliance from the State of California/Occupational Safety and Health Administration (Cal/OSHA), it was found that none of the models met all of the Cal/OSHA specifications. Additional tests showed other deficiencies in the PADs' design. This points out the need for the purchaser or user of such devices to specify acceptance criteria and perform his own tests

  14. Complementarity in false memory illusions.

    Science.gov (United States)

    Brainerd, C J; Reyna, V F

    2018-03-01

    For some years, the DRM illusion has been the most widely studied form of false memory. The consensus theoretical interpretation is that the illusion is a reality reversal, in which certain new words (critical distractors) are remembered as though they are old list words rather than as what they are-new words that are similar to old ones. This reality-reversal interpretation is supported by compelling lines of evidence, but prior experiments are limited by the fact that their memory tests only asked whether test items were old. We removed that limitation by also asking whether test items were new-similar. This more comprehensive methodology revealed that list words and critical distractors are remembered quite differently. Memory for list words is compensatory: They are remembered as old at high rates and remembered as new-similar at very low rates. In contrast, memory for critical distractors is complementary: They are remembered as both old and new-similar at high rates, which means that the DRM procedure induces a complementarity illusion rather than a reality reversal. The conjoint recognition model explains complementarity as a function of three retrieval processes (semantic familiarity, target recollection, and context recollection), and it predicts that complementarity can be driven up or down by varying the mix of those processes. Our experiments generated data on that prediction and introduced a convenient statistic, the complementarity ratio, which measures (a) the level of complementarity in memory performance and (b) whether its direction is reality-consistent or reality-reversed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  15. Prioritizing alarms from sensor-based detection models in livestock production

    DEFF Research Database (Denmark)

    Dominiak, Katarina Nielsen; Kristensen, Anders Ringgaard

    2017-01-01

    The objective of this review is to present, evaluate and discuss methods for reducing false alarms in sensor-based detection models developed for livestock production as described in the scientific literature. Papers included in this review are all peer-reviewed and present sensor-based detection...... models developed for modern livestock production with the purpose of optimizing animal health or managerial routines. The papers must present a performance for the model, but no criteria were specified for animal species or the condition sought to be detected. 34 papers published during the last 20 years...... (NBN) and Hidden phase-type Markov model, the NBN shows the greatest potential for future reduction of alerts from sensor-based detection models in livestock production. The included detection models are evaluated on three criteria; performance, time-window and similarity to determine whether...

  16. Project 93L-EWL-097, fire alarm system improvements, 300 Area

    International Nuclear Information System (INIS)

    Scott, M.V.

    1995-01-01

    This document contains the Acceptance Test Procedure (ATP) which will demonstrate that the modifications to the Fire Protection systems in the 338 Building function as intended. The ATP will test the fire alarm control panel, flow alarm pressure switch, post indicator valve tamper switch, heat detectors, flow switches, and fire alarm signaling devices

  17. Spiny lobsters detect conspecific blood-borne alarm cues exclusively through olfactory sensilla.

    Science.gov (United States)

    Shabani, Shkelzen; Kamio, Michiya; Derby, Charles D

    2008-08-01

    When attacked by predators, diverse animals actively or passively release molecules that evoke alarm and related anti-predatory behavior by nearby conspecifics. The actively released molecules are alarm pheromones, whereas the passively released molecules are alarm cues. For example, many insects have alarm-signaling systems that involve active release of alarm pheromones from specialized glands and detection of these signals using specific sensors. Many crustaceans passively release alarm cues, but the nature of the cues, sensors and responses is poorly characterized. Here we show in laboratory and field experiments that injured Caribbean spiny lobsters, Panulirus argus, passively release alarm cues via blood (hemolymph) that induce alarm responses in the form of avoidance and suppression of feeding. These cues are detected exclusively through specific olfactory chemosensors, the aesthetasc sensilla. The alarm cues for Caribbean spiny lobsters are not unique to the species but do show some phylogenetic specificity: P. argus responds primarily with alarm behavior to conspecific blood, but with mixed alarm and appetitive behaviors to blood from the congener Panulirus interruptus, or with appetitive behaviors to blood from the blue crab Callinectes sapidus. This study lays the foundation for future neuroethological studies of alarm cue systems in this and other decapod crustaceans.

  18. Development of the effectiveness measure for an advanced alarm system using signal detection theory

    International Nuclear Information System (INIS)

    Park, J.K.; Choi, S.S.; Hong, J.H.; Chang, S.H.

    1997-01-01

    Since many alarms which are activated during major process deviations or accidents in nuclear power plants can result in negative effects for operators, various types of advanced alarm systems that can select important alarms for the identification of process deviation have been developed to reduce the operator's workload. However, the irrelevant selection of important alarms could distract the operator from correct identification of process deviation. Therefore, to evaluate the effectiveness of the advanced alarm system, a tradeoff between the alarm reduction rate (how many alarms are reduced?) and informativeness (how many important alarms that are conducive to identifying process deviation are provided?) of an advanced alarm system should be considered. In this paper, a new measure is proposed to evaluate the effectiveness of an advanced alarm system with regard to the identification of process deviation. Here, the effectiveness measure is the combination of informativeness measure and reduction rate, and the informativeness measure means the information processing capability performed by the advanced alarm system including wrong rejection and wrong acceptance, and it can be calculated using the signal detection theory (SDT). The effectiveness of the prototype alarm system was evaluated using the loss of coolant accident (LOCA) scenario, and the validity of the effectiveness measure was investigated from two types of the operator response, such as the identification accuracy and the operator's preference for the identification of LOCA

  19. Falsely elevated triiodothyronine values in radioimmunoassay

    International Nuclear Information System (INIS)

    Skovsted, L.; Moelholm Hansen, J.E.; Nygaard, B.

    1995-01-01

    Five patients with falsely elevated serum triiodothyronine (T 3 ) concentrations (>9 nmol/l) in a radioimmunoassay are reported. The high T 3 -values disagreed with the other thyroid variables investigated as well as with the clinical observations. In sera from all patients a normal non-specific binding of T 3 was found, thus excluding abnormal serum-protein-binding of the hormone. An ethanol extraction of T 3 from serum before RIA reduced the T 3 content in serum from all patients to normal levels (2.0-2.4 nmol/l). These findings indicate the presence in the sera of substances, probably of protein nature, that were interfering with the assay by binding the reagent-antibody and not the antigen. Addition of non-immune rabbit serum prevented this interference and normalized the T 3 -values (1.8-2.4 nmol/l). Thus the interfering substance in T 3 -RIA could be an anti-rabbit antibody, the interaction of which can be eliminated by a minor modification of the assay making it possible to differentiate true from false T 3 -values. (au) 16 refs

  20. Moving Towards a Common Alarm Service for the LHC Era

    CERN Document Server

    Calderini, F; Stapley, N; Tyrell, M W

    2003-01-01

    The Large Hadron Collider (LHC) is one of the greatest technological challenges ever faced by accelerator builders. It is due for commissioning in 4 years and will have a lifetime well in excess of 10. The LHC will contain a completely heterogeneous mixture of industrial controls, both hardware and software, as well as dedicated, specialised, 'home' built systems. As part of the control infrastructure of such a complex machine, a number of 'services' will be essential as aids during operation, such as: logging / archiving, post-mortem, sequences, alarm system, etc. This paper describes the approach to be taken in order to define and provide the alarm service necessary for LHC. Details will be given of: the graceful transition from the current LEP alarm system; accommodating the SPS, PS and CERN's technical services; the technologies to be used; the approach of parallel investigations of industrial and 'home' builtsystems to ensure the best possible solution; and an indication of time scales to provide an oper...

  1. [Alarm symptoms of meningitis in children with fever].

    Science.gov (United States)

    Geurts, Dorien H F; Moll, Henriette A

    2011-01-01

    A 15-year-old girl presented with fever and pain in her legs. A viral infection was suspected, but within 24 hours she became confused and developed meningeal signs, based on which she was diagnosed as having meningitis. Within a few hours a 6-month-old boy developed fever, a grey colour, bulging fontanel, cold hands and feet, and was groaning. He too appeared to have meningitis. It is important to recognize this serious infection in children with fever, since delay of diagnosis and treatment may result in serious complications. Recognition is difficult because of non-specific symptoms on presentation and a lack of alarm symptoms early in the course of the disease. Alarm symptoms of serious infection in children are cyanosis, rapid breathing, decreased capillary refill, petechial rash, meningeal signs, leg pain and decreased consciousness. If serious infection is uncertain in a child with fever, parents should be advised on the potential course of the disease, the alarm symptoms and the need to seek medical help in time.

  2. Masters Thesis- Criticality Alarm System Design Guide with Accompanying Alarm System Development for the Radioisotope Production Laboratory in Richland, Washington

    Energy Technology Data Exchange (ETDEWEB)

    Greenfield, Bryce A. [Univ. of New Mexico, Albuquerque, NM (United States)

    2009-12-01

    A detailed instructional manual was created to guide criticality safety engineers through the process of designing a criticality alarm system (CAS) for Department of Energy (DOE) hazard class 1 and 2 facilities. Regulatory and technical requirements were both addressed. A list of design tasks and technical subtasks are thoroughly analyzed to provide concise direction for how to complete the analysis. An example of the application of the design methodology, the Criticality Alarm System developed for the Radioisotope Production Laboratory (RPL) of Richland, Washington is also included. The analysis for RPL utilizes the Monte Carlo code MCNP5 for establishing detector coverage in the facility. Significant improvements to the existing CAS were made that increase the reliability, transparency, and coverage of the system.

  3. An Evidence-Based Approach to Reducing Cardiac Telemetry Alarm Fatigue.

    Science.gov (United States)

    Srinivasa, Ekta; Mankoo, Jaspreet; Kerr, Charles

    2017-08-01

    It is estimated that between 80% and 99% of alarms in the clinical areas are in actionable alarms (Gross, Dahl, & Nielson). Alarm management is one of the Joint Commission's National Patient Safety Goals (2014) because sentinel events have directly been linked to the devices generating these alarms. At an acute care facility in Boston, a multidisciplinary team consisting of Nursing, Biomedical Engineers, Patient Safety and Providers was formed to conduct a pilot study on the state of telemetry alarms on a surgical floor. An evidence-based approach was taken utilizing Philips Real-time data exporter alarms tracking software to capture all telemetry alarms during a 43-day time span. Likewise, noise meters were placed near telemetry alarm speakers to track decibel levels within the aforementioned timeframe for 21 days. Analysis of the data showed that clinically insignificant Premature Ventricular Contractions (PVC) alarms accounted for more than 40% of all alarms in the unit within the time span, while also contributing to an average noise level of 58.49 dB. In response to the data, the interdisciplinary team approved to permanently default the settings for PAIR PVC, MULTIFORM PVC, and RUN PVC alarms to off. The results showed a 54% decrease in the rate of alarms per bed per day, and an average noise reduction of 2.3 dB between the two selected noise measurement areas. Organizing a multidisciplinary team provides an effective framework toward analyzing and addressing cardiac telemetry alarm fatigue. Looking at quantitative datasets for clinical care areas through various lenses helps identify opportunities for improvement in regards to highlighting alarms that are not actionable. Pilot changes to alarm parameters can be tested for their environmental impact in the care area. © 2017 Sigma Theta Tau International.

  4. Automatically Identifying and Predicting Unplanned Wind Turbine Stoppages Using SCADA and Alarms System Data: Case Study and Results

    Science.gov (United States)

    Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.

    2017-11-01

    Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.

  5. The perceived urgency of auditory warning alarms used in the hospital operating room is inappropriate.

    Science.gov (United States)

    Mondor, Todd A; Finley, G Allen

    2003-03-01

    To examine the perceived urgency of 13 auditory warning alarms commonly occurring in the hospital operating room. Undergraduate students, who were naïve with respect to the clinical situation associated with the alarms, judged perceived urgency of each alarm on a ten-point scale. The perceived urgency of the alarms was not consistent with the actual urgency of the clinical situation that triggers it. In addition, those alarms indicating patient condition were generally perceived as less urgent than those alarms indicating the operation of equipment. Of particular interest were three sets of alarms designed by equipment manufacturers to indicate specific priorities for action. Listeners did not perceive any differences in the urgency of the 'information only', 'medium' and 'high' priority alarms of two of the monitors with all judged as low to moderate in urgency. In contrast, the high priority alarm of the third monitor was judged as significantly more urgent than its low and medium urgency counterparts. The alarms currently in use do not convey the intended sense of urgency to naïve listeners, and this holds even for two sets of alarms designed specifically by manufacturers to convey different levels of urgency.

  6. Human factors engineering guidance for the review of advanced alarm systems

    International Nuclear Information System (INIS)

    O'Hara, J.M.; Brown, W.S.; Higgins, J.C.; Stubler, W.F.

    1994-09-01

    This report provides guidance to support the review of the human factors aspects of advanced alarm system designs in nuclear power plants. The report is organized into three major sections. The first section describes the methodology and criteria that were used to develop the design review guidelines. Also included is a description of the scope, organization, and format of the guidelines. The second section provides a systematic review procedure in which important characteristics of the alarm system are identified, described, and evaluated. The third section provides the detailed review guidelines. The review guidelines are organized according to important characteristics of the alarm system including: alarm definition; alarm processing and reduction; alarm prioritization and availability; display; control; automated; dynamic, and modifiable characteristics; reliability, test, maintenance, and failure indication; alarm response procedures; and control-display integration and layout

  7. Human factors engineering guidance for the review of advanced alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    O`Hara, J.M.; Brown, W.S.; Higgins, J.C.; Stubler, W.F. [Brookhaven National Lab., Upton, NY (United States)

    1994-09-01

    This report provides guidance to support the review of the human factors aspects of advanced alarm system designs in nuclear power plants. The report is organized into three major sections. The first section describes the methodology and criteria that were used to develop the design review guidelines. Also included is a description of the scope, organization, and format of the guidelines. The second section provides a systematic review procedure in which important characteristics of the alarm system are identified, described, and evaluated. The third section provides the detailed review guidelines. The review guidelines are organized according to important characteristics of the alarm system including: alarm definition; alarm processing and reduction; alarm prioritization and availability; display; control; automated; dynamic, and modifiable characteristics; reliability, test, maintenance, and failure indication; alarm response procedures; and control-display integration and layout.

  8. The neural correlates of gist-based true and false recognition

    Science.gov (United States)

    Gutchess, Angela H.; Schacter, Daniel L.

    2012-01-01

    When information is thematically related to previously studied information, gist-based processes contribute to false recognition. Using functional MRI, we examined the neural correlates of gist-based recognition as a function of increasing numbers of studied exemplars. Sixteen participants incidentally encoded small, medium, and large sets of pictures, and we compared the neural response at recognition using parametric modulation analyses. For hits, regions in middle occipital, middle temporal, and posterior parietal cortex linearly modulated their activity according to the number of related encoded items. For false alarms, visual, parietal, and hippocampal regions were modulated as a function of the encoded set size. The present results are consistent with prior work in that the neural regions supporting veridical memory also contribute to false memory for related information. The results also reveal that these regions respond to the degree of relatedness among similar items, and implicate perceptual and constructive processes in gist-based false memory. PMID:22155331

  9. 19 CFR 111.32 - False information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false False information. 111.32 Section 111.32 Customs... CUSTOMS BROKERS Duties and Responsibilities of Customs Brokers § 111.32 False information. A broker must... procure the giving of, any false or misleading information or testimony in any matter pending before the...

  10. Krohne Flow Indicator and High Flow Alarm - Local Indicator and High Flow Alarm of Helium Flow from the SCHe Purge Lines C and D to the Process Vent

    International Nuclear Information System (INIS)

    MISKA, C.R.

    2000-01-01

    Flow Indicators/alarms FI/FSH-5*52 and -5*72 are located in the process vent lines connected to the 2 psig SCHe purge lines C and D. They monitor the flow from the 2 psig SCHe purge going to the process vent. The switch/alarm is non-safety class GS

  11. The ecology and evolution of avian alarm call signaling systems

    Science.gov (United States)

    Billings, Alexis Chandon

    Communication is often set up as a simple dyadic exchange between one sender and one receiver. However, in reality, signaling systems have evolved and are used with many forms and types of information bombarding multiple senders, who in turn send multiple signals of different modalities, through various environmental spaces, finally reaching multiple receivers. In order to understand both the ecology and evolution of a signaling system, we must examine all the facets of the signaling system. My dissertation focused on the alarm call signaling system in birds. Alarm calls are acoustic signals given in response to danger or predators. My first two chapters examine how information about predators alters alarm calls. In chapter one I found that chickadees make distinctions between predators of different hunting strategies and appear to encode information about predators differently if they are heard instead of seen. In my second chapter, I test these findings more robustly in a non-model bird, the Steller's jay. I again found that predator species matters, but that how Steller's jays respond if they saw or heard the predator depends on the predator species. In my third chapter, I tested how habitat has influenced the evolution of mobbing call acoustic structure. I found that habitat is not a major contributor to the variation in acoustic structure seen across species and that other selective pressures such as body size may be more important. In my fourth chapter I present a new framework to understand the evolution of multimodal communication across species. I identify a unique constraint, the need for overlapping sensory systems, thresholds and cognitive abilities between sender and receiver in order for different forms of interspecific communication to evolve. Taken together, these chapters attempt to understand a signaling system from both an ecological and evolutionary perspective by examining each piece of the communication scheme.

  12. The heuristics of nurse responsiveness to critical patient monitor and ventilator alarms in a private room neonatal intensive care unit.

    Science.gov (United States)

    Joshi, Rohan; Mortel, Heidi van de; Feijs, Loe; Andriessen, Peter; Pul, Carola van

    2017-01-01

    Alarm fatigue is a well-recognized patient safety concern in intensive care settings. Decreased nurse responsiveness and slow response times to alarms are the potentially dangerous consequences of alarm fatigue. The aim of this study was to determine the factors that modulate nurse responsiveness to critical patient monitor and ventilator alarms in the context of a private room neonatal intensive care setting. The study design comprised of both a questionnaire and video monitoring of nurse-responsiveness to critical alarms. The Likert scale questionnaire, comprising of 50 questions across thematic clusters (critical alarms, yellow alarms, perception, design, nursing action, and context) was administered to 56 nurses (90% response rate). Nearly 6000 critical alarms were recorded from 10 infants in approximately 2400 hours of video monitoring. Logistic regression was used to identify patient and alarm-level factors that modulate nurse-responsiveness to critical alarms, with a response being defined as a nurse entering the patient's room within the 90s of the alarm being generated. Based on the questionnaire, the majority of nurses found critical alarms to be clinically relevant even though the alarms did not always mandate clinical action. Based on video observations, for a median of 34% (IQR, 20-52) of critical alarms, the nurse was already present in the room. For the remaining alarms, the response rate within 90s was 26%. The median response time was 55s (IQR, 37-70s). Desaturation alarms were the most prevalent and accounted for more than 50% of all alarms. The odds of responding to bradycardia alarms, compared to desaturation alarms, were 1.47 (95% CI = 1.21-1.78; heuristics in determining whether or not to respond to the alarm. Amongst other factors, the category and duration of critical alarms along with the clinical status of the patient determine nurse-responsiveness to alarms.

  13. Development of an integrated knowledge-base and its management tool for computerized alarm processing system

    International Nuclear Information System (INIS)

    Heo, Gyun Young; Choi, Seong Soo; Kim, Han Gon; Chang, Soon Heung

    1997-01-01

    For a long time, a number of alarm processing techniques have been researched to reduce the number of actuated alarms for operators to deal with effectively during the abnormal as well as the normal conditions. However, the strategy that the only systems with a few clear technologies should be used as a part of an alarm annunciation system has been adopted considering the effectiveness and the reliability in actual alarm processing systems. Therefore, alarm processing systems have difficult knowledge-base maintenance problems and limited expansion or enhancement defects. To solve these shortcomings, the integrated knowledge-base which can express the general information related to all the alarm processing techniques is proposed and its management tool, Knowledge Input Tool for Alarm (KIT-A) which can handle the data of the knowledge-base efficiently is developed. Since the integrated knowledge-base with KIT-A can manipulate all the alarm information without the modification of alarm processing system itself, it is expected to considerably advance the overall capability of maintenance and enhancement of the alarm processing systems

  14. Isolation of a pyrazine alarm pheromone component from the fire ant, Solenopsis invicta.

    Science.gov (United States)

    Vander Meer, Robert K; Preston, Catherine A; Choi, Man-Yeon

    2010-02-01

    Alarm pheromones in social insects are an essential part of a complex of pheromone interactions that contribute to the maintenance of colony integrity and sociality. The alarm pheromones of ants were among the first examples of animal pheromones identified, primarily because of the large amount of chemical produced and the distinctive responses of ants to the pheromone. However, the alarm pheromone of the fire ant, Solenopsis invicta, eluded identification for over four decades. We identified 2-ethyl-3,6-dimethylpyrazine as an alarm pheromone component of S. invicta. Worker fire ants detect the pyrazine alarm pheromone at 30 pg/ml, which is comparable to alarm pheromone sensitivities reported for other ant species. The source of this alarm pheromone are the mandibular glands, which, in fire ants, are not well developed and contain only about 300 pg of the compound, much less than the microgram quantities of alarm pheromones reported for several other ant species. Female and male sexuals and workers produce the pyrazine, which suggests that it may be involved in fire ant mating flight initiation, as well as the typical worker alarm response. This is the first report of 2-ethyl-3,6-dimethylpyrazine from a Solenopsis species and the first example of this alkaloid functioning as an alarm pheromone.

  15. Flights of fear: a mechanical wing whistle sounds the alarm in a flocking bird.

    Science.gov (United States)

    Hingee, Mae; Magrath, Robert D

    2009-12-07

    Animals often form groups to increase collective vigilance and allow early detection of predators, but this benefit of sociality relies on rapid transfer of information. Among birds, alarm calls are not present in all species, while other proposed mechanisms of information transfer are inefficient. We tested whether wing sounds can encode reliable information on danger. Individuals taking off in alarm fly more quickly or ascend more steeply, so may produce different sounds in alarmed than in routine flight, which then act as reliable cues of alarm, or honest 'index' signals in which a signal's meaning is associated with its method of production. We show that crested pigeons, Ocyphaps lophotes, which have modified flight feathers, produce distinct wing 'whistles' in alarmed flight, and that individuals take off in alarm only after playback of alarmed whistles. Furthermore, amplitude-manipulated playbacks showed that response depends on whistle structure, such as tempo, not simply amplitude. We believe this is the first demonstration that flight noise can send information about alarm, and suggest that take-off noise could provide a cue of alarm in many flocking species, with feather modification evolving specifically to signal alarm in some. Similar reliable cues or index signals could occur in other animals.

  16. Elucidating the neural correlates of related false memories using a systematic measure of perceptual relatedness.

    Science.gov (United States)

    Turney, Indira C; Dennis, Nancy A

    2017-02-01

    Previous memory research has exploited the perceptual similarities between lures and targets in order to evoke false memories. Nevertheless, while some studies have attempted to use lures that are objectively more similar than others, no study has systematically controlled for perceptual overlap between target and lure items and its role in accounting for false alarm rates or the neural processes underlying such perceptual false memories. The current study looked to fill this gap in the literature by using a face-morphing program to systematically control for the amount of perceptual overlap between lures and targets. Our results converge with previous studies in finding a pattern of differences between true and false memories. Most importantly, expanding upon this work, parametric analyses showed false memory activity increases with respect to the similarity between lures and targets within bilateral middle temporal gyri and right medial prefrontal cortex (mPFC). Moreover, this pattern of activation was unique to false memories and could not be accounted for by relatedness alone. Connectivity analyses further find that activity in the mPFC and left middle temporal gyrus co-vary, suggestive of gist-based monitoring within the context of false memories. Interestingly, neither the MTL nor the fusiform face area exhibited modulation as a function of target-lure relatedness. Overall, these results provide insight into the processes underlying false memories and further enhance our understanding of the role perceptual similarity plays in supporting false memories. Copyright © 2016 Elsevier Inc. All rights reserved.

  17. Orthos, an alarm system for the ALICE DAQ operations

    Science.gov (United States)

    Chapeland, Sylvain; Carena, Franco; Carena, Wisla; Chibante Barroso, Vasco; Costa, Filippo; Denes, Ervin; Divia, Roberto; Fuchs, Ulrich; Grigore, Alexandru; Simonetti, Giuseppe; Soos, Csaba; Telesca, Adriana; Vande Vyvre, Pierre; von Haller, Barthelemy

    2012-12-01

    ALICE (A Large Ion Collider Experiment) is the heavy-ion detector studying the physics of strongly interacting matter and the quark-gluon plasma at the CERN LHC (Large Hadron Collider). The DAQ (Data Acquisition System) facilities handle the data flow from the detectors electronics up to the mass storage. The DAQ system is based on a large farm of commodity hardware consisting of more than 600 devices (Linux PCs, storage, network switches), and controls hundreds of distributed hardware and software components interacting together. This paper presents Orthos, the alarm system used to detect, log, report, and follow-up abnormal situations on the DAQ machines at the experimental area. The main objective of this package is to integrate alarm detection and notification mechanisms with a full-featured issues tracker, in order to prioritize, assign, and fix system failures optimally. This tool relies on a database repository with a logic engine, SQL interfaces to inject or query metrics, and dynamic web pages for user interaction. We describe the system architecture, the technologies used for the implementation, and the integration with existing monitoring tools.

  18. Orthos, an alarm system for the ALICE DAQ operations

    International Nuclear Information System (INIS)

    Chapeland, Sylvain; Carena, Franco; Carena, Wisla; Chibante Barroso, Vasco; Costa, Filippo; Divia, Roberto; Fuchs, Ulrich; Grigore, Alexandru; Simonetti, Giuseppe; Soos, Csaba; Telesca, Adriana; Vande Vyvre, Pierre; Von Haller, Barthelemy; Denes, Ervin

    2012-01-01

    ALICE (A Large Ion Collider Experiment) is the heavy-ion detector studying the physics of strongly interacting matter and the quark-gluon plasma at the CERN LHC (Large Hadron Collider). The DAQ (Data Acquisition System) facilities handle the data flow from the detectors electronics up to the mass storage. The DAQ system is based on a large farm of commodity hardware consisting of more than 600 devices (Linux PCs, storage, network switches), and controls hundreds of distributed hardware and software components interacting together. This paper presents Orthos, the alarm system used to detect, log, report, and follow-up abnormal situations on the DAQ machines at the experimental area. The main objective of this package is to integrate alarm detection and notification mechanisms with a full-featured issues tracker, in order to prioritize, assign, and fix system failures optimally. This tool relies on a database repository with a logic engine, SQL interfaces to inject or query metrics, and dynamic web pages for user interaction. We describe the system architecture, the technologies used for the implementation, and the integration with existing monitoring tools.

  19. Organic liquid scintillation detectors for on-the-fly neutron/gamma alarming and radionuclide identification in a pedestrian radiation portal monitor

    Science.gov (United States)

    Paff, Marc Gerrit; Ruch, Marc L.; Poitrasson-Riviere, Alexis; Sagadevan, Athena; Clarke, Shaun D.; Pozzi, Sara

    2015-07-01

    We present new experimental results from a radiation portal monitor based on the use of organic liquid scintillators. The system was tested as part of a 3He-free radiation portal monitor testing campaign at the European Commission's Joint Research Centre in Ispra, Italy, in February 2014. The radiation portal monitor was subjected to a wide range of test conditions described in ANSI N42.35, including a variety of gamma-ray sources and a 20,000 n/s 252Cf source. A false alarm test tested whether radiation portal monitors ever alarmed in the presence of only natural background. The University of Michigan Detection for Nuclear Nonproliferation Group's system triggered zero false alarms in 2739 trials. It consistently alarmed on a variety of gamma-ray sources travelling at 1.2 m/s at a 70 cm source to detector distance. The neutron source was detected at speeds up to 3 m/s and in configurations with up to 8 cm of high density polyethylene shielding. The success of on-the-fly radionuclide identification varied with the gamma-ray source measured as well as with which of two radionuclide identification methods was used. Both methods used a least squares comparison between the measured pulse height distributions to library spectra to pick the best match. The methods varied in how the pulse height distributions were modified prior to the least squares comparison. Correct identification rates were as high as 100% for highly enriched uranium, but as low as 50% for 241Am. Both radionuclide identification algorithms produced mixed results, but the concept of using liquid scintillation detectors for gamma-ray and neutron alarming in radiation portal monitor was validated.

  20. The effectiveness of nurse education and training for clinical alarm response and management: a systematic review.

    Science.gov (United States)

    Yue, Liqing; Plummer, Virginia; Cross, Wendy

    2017-09-01

    To identify the effectiveness of education interventions provided for nurses for clinical alarm response and management. Some education has been undertaken to improve clinical alarm response, but the evidence for evaluating effectiveness for nurse education interventions is limited. Systematic review. A systematic review of experimental studies published in English from 2005-2015 was conducted in four computerised databases (MEDLINE, EMBASE, CINAHL and Scopus). After identification, screening and appraisal using Joanna Briggs Institute instruments, quality research papers were selected, data extraction and analysis followed. Five studies met the inclusion criteria for alarm response and no articles were concerned with clinical alarm education for management. All had different types and methods of interventions and statistical pooling was not possible. Response accuracy, response time and perceptions were consistent when different interventions were adopted. A positive effect was identified when learning about general alarms, single alarms, sequential alarms and medium-level alarms for learning as the primary task. Nurses who were musically trained had a faster and more accurate alarm response. Simulation interventions had a positive effect, but the effect of education provided in the care unit was greater. Overall, clinical alarm awareness was improved through education activities. Nurses are the main users of healthcare alarms and work in complex environments with high numbers of alarms, including nuisance alarms and other factors. Alarm-related adverse events are common. The findings of a small number of experimental studies with diverse evidence included consideration of various factors when formulating education strategies. The factors which influence effectiveness of nurse education are nurse demographics, nurse participants with musical training, workload and characteristics of alarms. Education interventions based in clinical practice settings increase

  1. The impact of recent changes in smoke alarm legislation on residential fire injuries and smoke alarm ownership in New South Wales, Australia.

    Science.gov (United States)

    Harvey, Lara A; Poulos, Roslyn G; Sherker, Shauna

    2013-01-01

    In 2006, New South Wales (NSW) state legislation changed from requiring smoke alarms in new houses only to all houses. We evaluated the impact of this legislative change on residential fire injury and smoke alarm ownership characteristics. Residential fire injuries for 2002 to 2010 were identified from hospitalization data for all hospitals in NSW. Data relating to smoke alarm ownership and demographic factors were obtained from the NSW Population Health Survey. Negative binomial regression analysis was used to analyze trends over time. Prior to the introduction of universal legislation, hospitalization rates were increasing slightly; however, following the introduction of legislation, hospitalization rates decreased by an estimated 36.2% (95% confidence interval [CI], 16.7-55.8) annually. Smoke alarm ownership increased from 73.3% (95% CI, 72.5-74.2) prelegislation to 93.6% (95% CI, 93.1-94.2) 18 months postlegislation. Thirty percent of households reported testing their alarms regularly. Speaking a language other than English (relative risks [RRs], 1.82; 95% CI, 1.44-2.99), allowing smoking in the home (RR, 1.73; 95% CI, 1.31-2.27), and being part of the most disadvantaged socioeconomic group (RR, 1.47; 95% CI, 1.14-1.91) remain major risk factors for nonownership. Broadening the scope of state legislation has had a positive impact on residential fire-related hospitalizations and smoke alarm ownership. However, it is of concern that the legislation has been the least effective in increasing smoke alarm ownership among non-English-speaking households, in households where smoking is allowed, in low socioeconomic households, and that a high proportion of householders do not test their smoke alarms regularly. Targeted campaigns are needed to reach these high-risk groups and to ensure that smoke alarms are functional.

  2. Attitude Importance and the False Consensus Effect.

    Science.gov (United States)

    Fabrigar, Leandre R.; Krosnick, Jon A.

    1995-01-01

    Explores the possibility that importance may regulate the magnitude of the false consensus effect. Analysis revealed a strong false consensus effect but no reliable relation between its magnitude and attitude importance. Results contradict assumptions that the false consensus effect arises from attitudes that directly or indirectly influence…

  3. Summary of work carried out in the field of N4 plant series alarm processing

    International Nuclear Information System (INIS)

    Joly, J.-J.; Maurin, S.

    1990-01-01

    This document summarizes work executed or under way regarding the processing of new N4 plant series alarms. A review of the specific objectives is provided as well as a general description of the processing of these alarms. A description of the systems and prototypes developed is then provided: -autonomous N4 alarm supplementary processing system, -logic check expert system, -functional design check expert system based on qualitative system modeling

  4. Volatile compound diversity and conserved alarm behaviour in Triatoma dimidiata.

    Science.gov (United States)

    May-Concha, Irving; Rojas, Julio C; Cruz-López, Leopoldo; Ibarra-Cerdeña, Carlos N; Ramsey, Janine M

    2015-02-06

    Triatoma dimidiata (Latreille) is a key vector complex of Trypanosoma cruzi, etiologic agent of Chagas disease, as it spans North, Central, and South America. Although morphological and genetic studies clearly indicate existence of at least five clades within the species, there has been no robust or systematic revision, or appropriate nomenclature change for species within the complex. Three of the clades (haplogroups) are distributed in Mexico, and recent evidence attests to dispersal of clades across previously "presumed" monotypic geographic regions. Evidence of niche conservatism among sister species of this complex suggests that geographic dispersal is possible for non-sympatric populations, although no information is available on the behavioural aspects of potential interclade interactions, for instance whether differentiation of chemical signaling or response to these signals could impede communication among the haplogroups. Volatiles emitted by disturbed bugs, Brindley's (BGs), and metasternal (MGs) glands were identified using solid-phase micro-extraction (SPME) and gas chromatography coupled mass spectrometry (GC-MS). Volatile compounds emitted by BGs and MGs, and those secreted by disturbed nymphs and adults, of the three Mexican T. dimidiata haplogroups were tested for avoidance behaviour by conspecific nymphs and adults using an olfactometer. Triatoma dimidiata haplogroups all have three age-related alarm responses: absence of response by early stage nymphs, stage-specific response by 4-5th stage nymphs, and a shared 4-5th nymph and adult response to adult compounds. Disturbed bugs released 15 to 24 compounds depending on the haplogroup, among which were three pyrazines, the first report of these organoleptics in Triatominae. Isobutyric acid from BGs was the most abundant molecule in the response in all haplogroups, in addition to 15 (h1) to 21 (h2 and h3) MG compounds. Avoidance behaviour of disturbed bugs and volatiles emitted by BGs were haplogroup

  5. ALARM, Thermohydraulics of BWR with Jet Pumps During LOCA

    International Nuclear Information System (INIS)

    Araya, F.; Akimoto, M.

    1985-01-01

    1 - Nature of physical problem solved: ALARM-B2 which is an improved version of ALARM-B1 is a computer program to analyze thermo-hydraulic phenomena of BWR during a blowdown period under a large-break loss-of-coolant accident condition with special emphasis on the heat transfer phenomena in the core region. 2 - Method of solution: A so called volume-junction method is used to present fluid conservations. The primary system is divided into a number of special elements called 'control-volumes'. The system of partial differential equations describing fluid conservations for a stream-tube are integrated over a number of control volumes. The resulting set of simultaneous differential equations that is based on the assumptions of one-dimensional, homogeneous and thermal- equilibrium flow is linearized and solved for a small time increment by a simple explicit numerical technique. The one-dimensional heat conduction equations describing temperature profiles within solid material are written in finite difference forms which are linearized and solved by the Crank-Nicholson implicit method. In order to simulate the blowdown heat transfer phenomena, the code has correlation packages for heat transfer coefficient and critical heat flux. The heat generation in the core is given by a point reactor kinetics model with six groups of delayed neutrons and decay of eleven groups of fission products and actinides. The solution technique of the reactor kinetics is based on the Runge-Kutta method. ALARM-B2 has the models to simulate various components incorporated in BWRs such as jet pumps, recirculation pumps, steam separators, valves, and so on. The discharge and injection systems are modeled by leak and fill systems, respectively. 3 - Restrictions on the complexity of the problem: As this has been developed to simulate a blowdown thermo-hydraulic transient during a large break LOCA, users must pay attention when applying the code to any medium or small break LOCAs or to later phases

  6. Advanced alarm system design and human performance: Guidance development and current research

    Energy Technology Data Exchange (ETDEWEB)

    O` Hara, J M [Brookhaven National Lab., Upton, NY (United States)

    1997-09-01

    This paper describes a research program sponsored by the U.S. Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. Guidance has been developed based on a broad base of technical and research literature. As part of the development effort, aspects of alarm system design for which the technical basis was insufficient to support guidance development were identified and prioritized. Research is currently underway to address the highest priority topics: alarm processing and display characteristics. (author). 29 refs, 2 figs.

  7. Advanced alarm system design and human performance: Guidance development and current research

    International Nuclear Information System (INIS)

    O'Hara, J.M.

    1997-01-01

    This paper describes a research program sponsored by the U.S. Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. Guidance has been developed based on a broad base of technical and research literature. As part of the development effort, aspects of alarm system design for which the technical basis was insufficient to support guidance development were identified and prioritized. Research is currently underway to address the highest priority topics: alarm processing and display characteristics. (author). 29 refs, 2 figs

  8. Receivers matter: the meaning of alarm calls and competition for nest sites in a bird community.

    Science.gov (United States)

    Parejo, Deseada; Avilés, Jesús M; Expósito-Granados, Mónica

    2018-04-11

    Animal communities may constitute information networks where individuals gain information on predation risk by eavesdropping on alarm calls of other species. However, communities include species in different trophic levels, and it is not yet known how the trophic level of the receiver influences the informative value of a call. Furthermore, no empirical study has yet tested how increased competition may influence the value of alarm calls for distinct receivers. Here, we identify the importance of alarm calls emitted by a small owl, the little owl (Athene noctua), on the structure of a cavity-nesting bird community including mesopredators and primary prey under variable levels of competition for nest holes. Competitors sharing top predators with the callers and prey of the callers interpreted alarm and non-alarm calls differently. Competitors chose preferentially alarm and non-alarm patches over control patches to breed, while prey selected alarm patches. In contrast, competition for nest sites affected habitat selection of prey species more than that of competitors of the callers. This study provides support for a changing value of alarm calls and competition for nest sites for distinct receivers related to niche overlapping among callers and eavesdroppers, therefore, calling attention to possible cascading effects by the use of information in natural communities.

  9. Development of Alarm System link Drawing for Operation Support for APR1400 Digital Main Control Room

    International Nuclear Information System (INIS)

    Kim, Ki-Hwan

    2016-01-01

    Digitalized MMI(Man-Machine Interface) including Digital Main Control Room(MCR) and digital I and C system was being applied for SKN 3 and 4 Nuclear Power Plant(NPP) and subsequent APR1400 NPP type. But, operators can not easily find instrument for alarm immediately. Therefore, Alarm system is required to easily find instrument for Alarm. For this implementation, we will plan system design considering design feature without affecting network load and CPU load. We have developed Alarm system link drawing for digital MCR. Operators of the digitalized MCR navigates from their consoles to the drawings related to the plant alarms and their instruments or the operation status. Such method gives cognitive load to the operators having to travel to different locations in finding the related information. Screen Sharing System, which is the fundamental technique for Drawing Interconnection Alarm System is close to completion, and it should be functionally tested and verified by the human factor engineering. For the actual application to the operating plants, the drawings to be interconnected to the alarms and the opinions from the operators/maintenance departments for designating alarm number should be surveyed, Also, another function that allows the access to the alarm related drawings not only from the MCR but also from the other offices

  10. Development of Alarm System link Drawing for Operation Support for APR1400 Digital Main Control Room

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ki-Hwan [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    Digitalized MMI(Man-Machine Interface) including Digital Main Control Room(MCR) and digital I and C system was being applied for SKN 3 and 4 Nuclear Power Plant(NPP) and subsequent APR1400 NPP type. But, operators can not easily find instrument for alarm immediately. Therefore, Alarm system is required to easily find instrument for Alarm. For this implementation, we will plan system design considering design feature without affecting network load and CPU load. We have developed Alarm system link drawing for digital MCR. Operators of the digitalized MCR navigates from their consoles to the drawings related to the plant alarms and their instruments or the operation status. Such method gives cognitive load to the operators having to travel to different locations in finding the related information. Screen Sharing System, which is the fundamental technique for Drawing Interconnection Alarm System is close to completion, and it should be functionally tested and verified by the human factor engineering. For the actual application to the operating plants, the drawings to be interconnected to the alarms and the opinions from the operators/maintenance departments for designating alarm number should be surveyed, Also, another function that allows the access to the alarm related drawings not only from the MCR but also from the other offices.

  11. Multi-parameter vital sign database to assist in alarm optimization for general care units.

    Science.gov (United States)

    Welch, James; Kanter, Benjamin; Skora, Brooke; McCombie, Scott; Henry, Isaac; McCombie, Devin; Kennedy, Rosemary; Soller, Babs

    2016-12-01

    Continual vital sign assessment on the general care, medical-surgical floor is expected to provide early indication of patient deterioration and increase the effectiveness of rapid response teams. However, there is concern that continual, multi-parameter vital sign monitoring will produce alarm fatigue. The objective of this study was the development of a methodology to help care teams optimize alarm settings. An on-body wireless monitoring system was used to continually assess heart rate, respiratory rate, SpO 2 and noninvasive blood pressure in the general ward of ten hospitals between April 1, 2014 and January 19, 2015. These data, 94,575 h for 3430 patients are contained in a large database, accessible with cloud computing tools. Simulation scenarios assessed the total alarm rate as a function of threshold and annunciation delay (s). The total alarm rate of ten alarms/patient/day predicted from the cloud-hosted database was the same as the total alarm rate for a 10 day evaluation (1550 h for 36 patients) in an independent hospital. Plots of vital sign distributions in the cloud-hosted database were similar to other large databases published by different authors. The cloud-hosted database can be used to run simulations for various alarm thresholds and annunciation delays to predict the total alarm burden experienced by nursing staff. This methodology might, in the future, be used to help reduce alarm fatigue without sacrificing the ability to continually monitor all vital signs.

  12. INEL test reactor facility alarms: descriptions, technical specifications, and modification procedure

    International Nuclear Information System (INIS)

    Potash, L.M.; Boone, M.P.

    1980-04-01

    This report identifies standards, procedures, and practices which will affect any attempt to integrate or introduce human engineering principles into nuclear power plant alarm systems. Additional information concerning type of signal used, expected reaction, type of sensor, etc., is presented because of its relevance to future work on alarm system integration. The INEL test reactors were studied. Interviews were conducted with operators, designers, and management personnel. Additional information was obtained from available documentation. Only fire-alarm systems, and to a lesser extent, criticality alarms, have detailed industry-wide standards. One general standard has been written for control-room annunciators

  13. Non-specific alarm calls trigger mobbing behavior in Hainan gibbons (Nomascus hainanus).

    Science.gov (United States)

    Deng, Huaiqing; Gao, Kai; Zhou, Jiang

    2016-09-30

    Alarm calls are important defensive behaviors. Here, we report the acoustic spectrum characteristics of alarm calls produced by Hainan gibbons (Nomascus hainanus) inhabiting Bawangling National Nature Reserve in Hainan, China. Analysis of call data collected from 2002-2014 shows that alarm calls are emitted by all family group members, except infants. Alarm behavior included simple short alarming calls (7-10 min) followed by longer variable-frequency mobbing calls lasting 5-12 min. The duration of individual alarming and mobbing calls was 0.078 ± 0.014 s and 0.154 ± 0.041 s at frequency ranges of 520-1000 Hz and 690-3920 Hz, respectively. Alarming call duration was positively associated with group size. The alarm calls can trigger mobbing behavior in Hainan gibbons; this is a defense way of social animals, and first report among the primates' species. The system of vocal alarm behavior described in this critically endangered species is simple and effective.

  14. Resolving MC and A alarms from process monitoring in a fuel fabrication facility

    International Nuclear Information System (INIS)

    Smith, B.W.; Razvi, J.

    1984-01-01

    Process monitoring data can be used for generating material loss estimates. The intent of using process control data is to enhance nuclear material control and accounting for the timely detection and resolution of discrepancies. The purpose of an alarm resolution system is to distinguish between system errors and an actual loss of nuclear material. A study has been performed to develop and test a site-specific set of alarm resolution procedures. The results of the study are described and include the frequency of alarms, the causes of alarms, the type of resolution, and the modeling of loss estimates

  15. Development of semiconductor radiation sensors for portable alarm-dosimeter

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. K.; Moon, B. S.; Chung, C. E.; Hong, S. B.; Kim, J. Y.; Kim, J. B.; Han, S. H.; Lee, W. G. [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2001-01-01

    We studied Semiconductor Radiation Sensors for Portable Alarm-Dosimeter. We calculated response functions for gamma energy 0.021, 0.122, 0.662, 0.835, 1.2 MeV using EGS4 codes. When we measured at various distance from source to detector, the detection efficiency of Si semiconductor detector was better than that of GM tube. The linear absorption coefficients of steel and aluminum plate were measured. These experimental results of the response of detector for intensity of radiation field coincide to the theoretical expectation. The count value of Si detector was changed with changing thickness of steel as changing threshold voltage of discriminator, and the linear absorption coefficient increased with increasing threshold voltage. Radiation detection efficiency shows difference at each threshold voltage condition. This results coincided to the theoretical simulation. 33 refs., 27 figs., 8 tabs. (Author)

  16. A new fire alarm system for electrical installations

    CERN Document Server

    Pietersen, A H

    1978-01-01

    Fires in electrical installations are considered to develop in four phases - initiation, smouldering, flame formation and heat development. Cables are among the more sensitive components, with working temperatures around 50 degrees C and fire detection at 70 degrees C. Conventional alarms include smoke detectors. The new technique described uses microcapsules containing powder forming a gas of the Freon type after diffusion. A typical microcapsule loses 4% per year and has a natural life of 10 years. Fabrication methods are described. Detection is by gas concentration, with a sensitivity of 1 to 10 ppm, or by acoustic methods with microphones to pick up the sound of fractures. Pressure/temperature characteristics of various types of Freon mixtures commercially available are given in graphical form.

  17. Design of remote control alarm system by microwave detection

    Science.gov (United States)

    Wang, Junli

    2018-04-01

    A microwave detection remote control alarm system is designed, which is composed of a Microwave detectors, a radio receiving/transmitting module and a digital encoding/decoding IC. When some objects move into the surveillance area, microwave detectors will generate a control signal to start transmitting system. A radio control signal will be spread by the transmitting module, once the signal can be received, and it will be disposed by some circuits, arousing some voices that awake the watching people. The whole device is a modular configuration, it not only has some advantage of frequency stable, but also reliable and adjustment-free, and it is suitable for many kinds of demands within the distance of 100m.

  18. Definition of areas requiring criticality alarm annunciation and emergency control

    International Nuclear Information System (INIS)

    Hobson, J.M.

    1988-01-01

    The design of fissile material handling at British Nuclear Fuels plc requires the provision of a criticality incident detection system unless a specific case for omission can be formally made. Where such systems are provided, the 100 mSv contour resulting from a reference criticality incident must be restricted to an area of administrative control within which it is reasonably practicable to provide alarm annunciation and for which emergency arrangements can be defined. For typical reprocessing plant applications, the definition of these areas, and their restriction by provision of shielding where necessary, potentially requires a very large number of three dimensional neutron transport calculations in complex geometries. However, by considering the requirements and nature of this assessment, simple generic methods have been developed and justified. Consequently, rapid and inexpensive assessments of control areas can be carried out

  19. Soft real-time alarm messages for ATLAS TDAQ

    Science.gov (United States)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-05-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG—Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring "interesting" parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  20. Soft real-time alarm messages for ATLAS TDAQ

    International Nuclear Information System (INIS)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-01-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  1. Soft real-time alarm messages for ATLAS TDAQ

    Energy Technology Data Exchange (ETDEWEB)

    Darlea, G., E-mail: georgiana.lavinia.darlea@cern.c [CERN, Geneva (Switzerland); Al Shabibi, A.; Martin, B.; Lehmann Miotto, G. [CERN, Geneva (Switzerland)

    2010-05-21

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  2. The Effectiveness of a Wireless Modular Bed Absence Sensor Device for Fall Prevention among Older Inpatients.

    Science.gov (United States)

    Subermaniam, Kogilavani; Welfred, Ridgwan; Subramanian, Pathmawathi; Chinna, Karuthan; Ibrahim, Fatimah; Mohktar, Mas S; Tan, Maw Pin

    2016-01-01

    Falls and fall-related injuries are increasingly serious issues among elderly inpatients due to population aging. The bed-exit alarm has only previously been evaluated in a handful of studies with mixed results. Therefore, we evaluated the effectiveness of a modular bed absence sensor device (M-BAS) in detecting bed exits among older inpatients in a middle income nation in East Asia. Patients aged ≥65 years on an acute geriatric ward who were able to mobilize with or without walking aids and physical assistance were recruited to the study. The total number of alarms and the numbers of true and false alarms were recorded by ward nurses. The M-BAS device is placed across the mattress of all consenting participants. Nurses' workload was assessed using the National Aeronautics and Space Administration-Task Load Index (NASA-TLX) score, while nurses' perceptions were surveyed. The sensitivity of the M-BAS was 100% with a positive predictive value of 68% and a nuisance alarm rate of 31%. There was a significant reduction in total NASA-TLX workload score (mean difference = 14.34 ± 13.96 SD, p  < 0.001) at the end of the intervention period. 83% of the nurses found the device useful for falls prevention, 97% found it user friendly, and 87% would use it in future. The M-BAS was able to accurately detect bed absence episodes among geriatric inpatients and alert nurses accordingly. The use of the device significantly reduced the total workload score, while the acceptability of the device was high among our nurses. A larger, cluster randomized study to measure actual falls outcome associated with the use of the device is now indicated.

  3. Increases of Obesity and Overweight in Children: an Alarm for Parents and Policymakers

    Directory of Open Access Journals (Sweden)

    Gholam Hasan Khadaee

    2016-04-01

    Full Text Available Childhood obesity is one of the most serious public health challenges of the 21st century. The problem is global and is steadily affecting many low- and middle-income countries, particularly in urban settings. The prevalence has increased at an alarming rate. Globally, in 2013 the number of overweight children under the age of five years old, is estimated to be over 42 million. Close to 31 million of these are living in developing countries. In the WHO African Region alone the number of overweight or obese children increased from 4 to 9 million over the same period. The vast majority of overweight or obese children live in developing countries, where the rate of increase has been more than 30% higher than that of developed countries. If current trends continue the number of overweight or obese infants and young children globally will increase to 70 million by 2025.  Without intervention, obese infants and young children will likely continue to be obese during childhood, adolescence and adulthood. Overweight and obesity are largely preventable. Supportive policies, environments, schools and communities are fundamental in shaping parents’ and children’s choices, making the healthier choice of foods and regular physical activity the easiest choice (accessible, available and affordable, and therefore preventing obesity.

  4. When one is not enough: prevalence and characteristics of homes not adequately protected by smoke alarms.

    Science.gov (United States)

    Peek-Asa, C; Allareddy, V; Yang, J; Taylor, C; Lundell, J; Zwerling, C

    2005-12-01

    The National Fire Protection Association (NFPA) has specific recommendations about the number, location, and type of smoke alarms that are needed to provide maximum protection for a household. No previous studies have examined whether or not homes are completely protected according to these guidelines. The authors describe the prevalence and home characteristics associated with compliance to recommendations for smoke alarm installation by the NFPA. Data are from the baseline on-site survey of a randomized trial to measure smoke alarm effectiveness. The trial was housed in a longitudinal cohort study in a rural Iowa county. Of 1005 homes invited, 691 (68.8%) participated. Information about smoke alarm type, placement, and function, as well as home and occupant characteristics, was collected through an on-site household survey. Although 86.0% of homes had at least one smoke alarm, only 22.3% of homes (approximately one in five) were adequately protected according to NFPA guidelines. Fourteen percent of homes had no functioning smoke alarms. More than half of the homes with smoke alarms did not have enough of them or had installed them incorrectly, and 42.4% of homes with alarms had at least one alarm that did not operate. Homes with at least one high school graduate were nearly four times more likely to be fully protected. Homes that had multiple levels, a basement, or were cluttered or poorly cleaned were significantly less likely to be fully protected. These findings indicate that consumers may not be knowledgeable about the number of alarms they need or how to properly install them. Occupants are also not adequately maintaining the alarms that are installed.

  5. A proactive alarm reduction method and its human factors validation test for a main control room for SMART

    International Nuclear Information System (INIS)

    Jang, Gwi-sook; Suh, Sang-moon; Kim, Sa-kil; Suh, Yong-suk; Park, Je-yun

    2013-01-01

    Highlights: ► A proactive alarm reduction method improves effectiveness on the alarm reduction. ► The method suppresses alarms based on the ECA rules and facts for the alarm reduction under an alarm flood situation. ► The alarm reduction logics are supplemented to a high hit ratio of the reduction logics during on-line operations. ► The method is validated by human factors validation test based on regulatory requirements. -- Abstract: Conventional alarm systems tend to overwhelm operators during a transient because of a large number of nearly simultaneous annunciator activations with varying degrees of relevance to operator tasks. Thus alarm processing techniques have developed to support operators in coping with the volume of alarms, to identify which alarms are significant, and to reduce the need for operators to infer the plant conditions. This paper proposes a proactive alarm reduction method for SMART (System-integrated Modular Advanced ReacTor) whereby based on the contents of the past operating effects alarm reduction is carried out during the next transient. We designed and implemented the proactive alarm reduction system and constructed the environment for the human factors validation test. Also, eight subjects actually working in a nuclear power plant (NPP) tested the practical effectiveness of the proposed proactive alarm reduction method according to the procedure of human factors validation test under a dynamic simulation of a partial scope for an NPP.

  6. Combined roentgenoultrasonic diagnosis of false pancreatic cysts

    International Nuclear Information System (INIS)

    Dubrov, Eh.Ya.; Beresneva, Eh.A.; Chervonenkis, A.V.; Morozova, N.A.

    1986-01-01

    X-ray and ultrasound semiotics of false pancreatic cysts in 21 patients have been described. Such a study proves to be highly informative permitting early detection of false pancreatic cysts and observation of the stages of their formation and development of complications. The ultrasound method has advantages for the investigation of patients in early time of false cyst formation and provides an opportunity to detect formations of minimum sizes

  7. Emotions and false memories: valence or arousal?

    Science.gov (United States)

    Corson, Yves; Verrier, Nadège

    2007-03-01

    The effects of mood on false memories have not been studied systematically until recently. Some results seem to indicate that negative mood may reduce false recall and thus suggest an influence of emotional valence on false memory. The present research tested the effects of both valence and arousal on recall and recognition and indicates that the effect is actually due to arousal. In fact, whether participants' mood is positive, negative, or neutral, false memories are significantly more frequent under conditions of high arousal than under conditions of low arousal.

  8. Design for safety : A new service for alarming and informing the population in case of emergency

    NARCIS (Netherlands)

    Jagtman, H.M.

    2012-01-01

    In case of emergencies the population in danger should be alarmed so individuals can take action to get or remain out of danger. For alarming the population the means available are limited. Many countries have outdoor sirens. They operability however is limited since the siren has only one implicit

  9. Use of alarm features in referral of febrile children to the emergency department : an observational study

    NARCIS (Netherlands)

    van Ierland, Yvette; Elshout, Gijs; Moll, Henritte A.; Nijman, Ruud G.; Vergouwe, Yvonne; van der Lei, Johan; Berger, Marjolein Y.; Oostenbrink, Rianne

    Background The diagnostic value of alarm features of serious infections in low prevalence settings is unclear. Aim To explore to what extent alarm features play a role in referral to the emergency department (ED) by GPs who face a febrile child during out-of-hours care. Design and setting

  10. Writing short alarm messages : A matter of education, training and practice

    NARCIS (Netherlands)

    Jagtman, H.M.

    2013-01-01

    The Netherlands has a new tool to alarm and inform the population in case of crises. NL-Alert can simultaneously draw people’s attention and explain the crisis matter. The use requires determining of both the impact area and the alarm text. This raises questions about required knowledge and

  11. Is it wise to protect false targets?

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    The paper considers a system consisting of genuine elements and false targets that cannot be distinguished by the attacker's observation. The false targets can be destroyed with much less effort than the genuine elements. We show that even when an attacker cannot distinguish between the genuine elements and the false targets, in many cases it can enhance the attack efficiency using a double attack strategy in which it tries first to eliminate with minimal effort as many false targets as possible in the first attack and then distributes its entire remaining resource among all surviving targets in the second attack. The model for evaluating the system vulnerability in the double attack is suggested for a single genuine element, and multiple genuine elements configured in parallel or in series. This model assumes that in both attacks the attacking resource is distributed evenly among the attacked targets. The defender can optimize its limited resource distribution between deploying more false targets and protecting them better. The attacker can optimize its limited resource distribution between two attacks. The defense strategy is analyzed based on a two period minmax game. A numerical procedure is suggested that allows the defender to find the optimal resource distribution between deploying and protecting the false targets. The methodology of optimal attack and defense strategies analysis is demonstrated. It is shown that protecting the false targets may reduce the efficiency of the double attack strategy and make this strategy ineffective in situations with low contest intensity and few false targets. - Highlights: ► The efficiency of the double attack tactics against using false targets is analyzed. ► The role of the false target protection in system survivability enhancement is shown. ► The resource distribution between deploying more false targets and protecting them better is optimized. ► Both series and parallel systems are considered.

  12. Social influence and mental routes to the production of authentic false memories and inauthentic false memories.

    Science.gov (United States)

    Wagner, Michael F; Skowronski, John J

    2017-05-01

    Two studies assessed the extent to which people incorporated false facts provided by bogus others into their own recognition memory reports, and how these false memory reports were affected by: (a) truth of the information in others' summaries supporting the false facts, (b) motivation to process stories and summaries, (c) source credibility, and (d) ease of remembering original facts. False memory report frequency increased when false facts in a summary were supported by true information and varied inversely with the ease with which original facts could be remembered. Results from a measure probing participants' memory perceptions suggest that some false memories are authentic: People sometimes lack awareness of both the incorporation of false facts into their memory reports and where the false facts came from. However, many false memories are inauthentic: Despite reporting a false memory, people sometimes retain knowledge of the original stimulus and/or the origin of false facts. Copyright © 2017. Published by Elsevier Inc.

  13. The use of simulation in the development of human factors guidelines for alarm systems

    International Nuclear Information System (INIS)

    O'Hara, J.; Brown, W.S.; Wachtel, J.; Persensky, J.

    1997-01-01

    This paper describes a research program sponsored by the US Nuclear Regulatory Commission to address the human factors engineering (HFE) aspects of nuclear power plant alarm systems. The overall objective of the program is to develop HFE review guidance for advanced alarm systems. As part of this program, guidance was developed based on a broad review and analysis of technical and research literature. In the course of guidance development, aspects of alarm system design for which the technical basis was insufficient to support guidance developed were identified. Experimental research is currently underway to address the highest priority topics: alarm processing and display characteristics. This paper provides an overview of the approach to guidance development and discusses the role of simulation in the development approach. Finally, the current simulator-based experiment is described to illustrate how the alarm system design features are being studied

  14. Application of neural networks to multiple alarm processing and diagnosis in nuclear power plants

    International Nuclear Information System (INIS)

    Cheon, Se Woo; Chang Soon Heung; Chung, Hak Yeong

    1992-01-01

    This paper presents feasibility studies of multiple alarm processing and diagnosis using neural networks. The back-propagation neural network model is applied to the training of multiple alarm patterns for the identification of failure in a reactor coolant pump (RCP) system. The general mapping capability of the neural network enables to identify a fault easily. The case studies are performed with emphasis on the applicability of the neural network to pattern recognition problems. It is revealed that the neural network model can identify the cause of multiple alarms properly, even when untrained or sensor-failed alarm symptoms are given. It is also shown that multiple failures are easily identified using the symptoms of multiple alarms

  15. Stimulus-response time to alarms of the intra-aortic balloon pump: safe care practices

    Directory of Open Access Journals (Sweden)

    Andrezza Serpa Franco

    Full Text Available ABSTRACT Objective: To characterize the sound alarms of the Intra-Aortic Balloon Pump (IABP during aortic counterpulsation therapy; to measure the stimulus-response time of the team to these; and to discuss the implications of increasing this time for patient safety from the alarm fatigue perspective. Method: This is an observational and descriptive study with quantitative and qualitative approach, case study type, carried out in a Cardiac Surgical Intensive Care Unit. Results: The most audible IABP alarm was the one of high priority increased-reduced diastolic blood pressure. The stimulus-response time was 33.9 seconds on average. Conclusion: Managing the alarms of these equipment is essential to minimize the occurrence of the alarm fatigue phenomenon and to offer a safer assistance to patients who rely on this technology.

  16. Expert systems and microwave communication systems alarms processing: A feasibility study

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, B.; Goeltz, R.; Purucker, S.

    1987-07-01

    This report presents the results of a feasibility study conducted by Oak Ridge National Laboratory (ORNL) for the Bonneville Power Administration concerning the applicability of Artificial Intelligence (AI) technology to process alarms associated with Bonneville's Microwave Communication System (MCS). Specifically, the discussion focuses on the characteristics of a prototype expert system/database management system (DBMS) configuration capable of intelligently processing alarms, efficiently storing alarm-based historical data, and providing analysis and reporting tools. Such a system has the potential to improve response to critical alarms, increase the information content of a large volume of complicated data, free operators from performing routine analysis, and provide alarm information to operators, field personnel, and management through queries and automatically produced reports.

  17. Can False Memories Prime Problem Solutions?

    Science.gov (United States)

    Howe, Mark L.; Garner, Sarah R.; Dewhurst, Stephen A.; Ball, Linden J.

    2010-01-01

    Previous research has suggested that false memories can prime performance on related implicit and explicit memory tasks. The present research examined whether false memories can also be used to prime higher order cognitive processes, namely, insight-based problem solving. Participants were asked to solve a number of compound remote associate task…

  18. Explaining the Development of False Memories.

    Science.gov (United States)

    Reyna, Valerie F.; Holliday, Robyn; Marche, Tammy

    2002-01-01

    Reviews explanatory dimensions of children's false memory relevant to forensic practice: measurement, development, social factors, individual differences, varieties of memories and memory judgments, and varieties of procedures inducing false memories. Asserts that recent studies fail to use techniques that separate acquiescence from memory…

  19. New false color mapping for image fusion

    NARCIS (Netherlands)

    Toet, A.; Walraven, J.

    1996-01-01

    A pixel based colour mapping algorithm is presented that produces a fused false colour rendering of two gray level images representing different sensor modalities. The result-ing fused false colour images have a higher information content than each of the original images and retain sensor-specific

  20. Effects of Instructions on False Recognition.

    Science.gov (United States)

    Mueller, John H.; And Others

    Four experiments were conducted to examine the effects of various processing instructions on the rate of false recognition. The continuous single-item procedure was used, and false recognitions of four types were examined: synonyms, antonyms, nonsemantic associates, and homonyms. The instructions encouraged subjects to think of associates, usages…

  1. The probability of the false vacuum decay

    International Nuclear Information System (INIS)

    Kiselev, V.; Selivanov, K.

    1983-01-01

    The closed expession for the probability of the false vacuum decay in (1+1) dimensions is given. The probability of false vacuum decay is expessed as the product of exponential quasiclassical factor and a functional determinant of the given form. The method for calcutation of this determinant is developed and a complete answer for (1+1) dimensions is given

  2. Rapid induction of false memory for pictures.

    Science.gov (United States)

    Weinstein, Yana; Shanks, David R

    2010-07-01

    Recognition of pictures is typically extremely accurate, and it is thus unclear whether the reconstructive nature of memory can yield substantial false recognition of highly individuated stimuli. A procedure for the rapid induction of false memories for distinctive colour photographs is proposed. Participants studied a set of object pictures followed by a list of words naming those objects, but embedded in the list were names of unseen objects. When subsequently shown full colour pictures of these unseen objects, participants consistently claimed that they had seen them, while discriminating with high accuracy between studied pictures and new pictures whose names did not appear in the misleading word list. These false memories can be reported with high confidence as well as the feeling of recollection. This new procedure allows the investigation of factors that influence false memory reports with ecologically valid stimuli and of the similarities and differences between true and false memories.

  3. Priming analogical reasoning with false memories.

    Science.gov (United States)

    Howe, Mark L; Garner, Sarah R; Threadgold, Emma; Ball, Linden J

    2015-08-01

    Like true memories, false memories are capable of priming answers to insight-based problems. Recent research has attempted to extend this paradigm to more advanced problem-solving tasks, including those involving verbal analogical reasoning. However, these experiments are constrained inasmuch as problem solutions could be generated via spreading activation mechanisms (much like false memories themselves) rather than using complex reasoning processes. In three experiments we examined false memory priming of complex analogical reasoning tasks in the absence of simple semantic associations. In Experiment 1, we demonstrated the robustness of false memory priming in analogical reasoning when backward associative strength among the problem terms was eliminated. In Experiments 2a and 2b, we extended these findings by demonstrating priming on newly created homonym analogies that can only be solved by inhibiting semantic associations within the analogy. Overall, the findings of the present experiments provide evidence that the efficacy of false memory priming extends to complex analogical reasoning problems.

  4. Detection and classification of alarm threshold violations in condition monitoring systems working in highly varying operational conditions

    Science.gov (United States)

    Strączkiewicz, M.; Barszcz, T.; Jabłoński, A.

    2015-07-01

    All commonly used condition monitoring systems (CMS) enable defining alarm thresholds that enhance efficient surveillance and maintenance of dynamic state of machinery. The thresholds are imposed on the measured values such as vibration-based indicators, temperature, pressure, etc. For complex machinery such as wind turbine (WT) the total number of thresholds might be counted in hundreds multiplied by the number of operational states. All the parameters vary not only due to possible machinery malfunctions, but also due to changes in operating conditions and these changes are typically much stronger than the former ones. Very often, such a behavior may lead to hundreds of false alarms. Therefore, authors propose a novel approach based on parameterized description of the threshold violation. For this purpose the novelty and severity factors are introduced. The first parameter refers to the time of violation occurrence while the second one describes the impact of the indicator-increase to the entire machine. Such approach increases reliability of the CMS by providing the operator with the most useful information of the system events. The idea of the procedure is presented on a simulated data similar to those from a wind turbine.

  5. Detection and classification of alarm threshold violations in condition monitoring systems working in highly varying operational conditions

    International Nuclear Information System (INIS)

    Strączkiewicz, M; Barszcz, T; Jabłoński, A

    2015-01-01

    All commonly used condition monitoring systems (CMS) enable defining alarm thresholds that enhance efficient surveillance and maintenance of dynamic state of machinery. The thresholds are imposed on the measured values such as vibration-based indicators, temperature, pressure, etc. For complex machinery such as wind turbine (WT) the total number of thresholds might be counted in hundreds multiplied by the number of operational states. All the parameters vary not only due to possible machinery malfunctions, but also due to changes in operating conditions and these changes are typically much stronger than the former ones. Very often, such a behavior may lead to hundreds of false alarms. Therefore, authors propose a novel approach based on parameterized description of the threshold violation. For this purpose the novelty and severity factors are introduced. The first parameter refers to the time of violation occurrence while the second one describes the impact of the indicator-increase to the entire machine. Such approach increases reliability of the CMS by providing the operator with the most useful information of the system events. The idea of the procedure is presented on a simulated data similar to those from a wind turbine. (paper)

  6. Simulator testing of the Westinghouse aware alarm management system

    Energy Technology Data Exchange (ETDEWEB)

    Carrera, J P; Easter, J R; Roth, E M [Westinghouse Electric Corp., Pittsburgh, PA (United States)

    1997-09-01

    Over the last year, Westinghouse engineers and operators from the Beznau nuclear power station (KKB), owned by the Nordostschweizerische Krafwerke AG of Baden, Switzerland, have been installing and testing the Westinghouse AWARE Alarm Management System in Beznau/SNUPPS operator training simulator, owned and operated by the Westinghouse Electric Corp., in Waltz Mill, PA, USA. The testing has focused primarily on validating the trigger logic data base and on familiarizing the utility`s training department with the operation of the system in a real-time environment. Some of the tests have included plant process scenarios in which the computerized Emergency Procedures were available and used through the COMPRO (COMputerized PROcedures) System in conjunction with the AWARE System. While the results to date are qualitative from the perspective of system performance and improvement in message presentation, the tests have generally confirmed the expectations of the design. There is a large reduction in the number of messages that the control room staff must deal with during major process abnormalities, yet at times of relative minor disturbances, some additional messages are available which add clarification, e.g., ``Pump Trouble`` messages. The ``flow`` of an abnormality as it progresses from one part of the plant`s processes to another is quite visible. Timing of the messages and the lack of message avalanching is proving to give the operators additional time to respond to messages. Generally, the anxiety level to ``do something`` immediately upon a reactor trip appears to be reduced. (author). 8 refs.

  7. Behavioral responses of Pacific lamprey to alarm cues

    Science.gov (United States)

    Porter, Laurie L.; Hayes, Michael C.; Jackson, Aaron D.; Burke, Brian J.; Moser, Mary L.; Wagner, R. Steven

    2017-01-01

    Pacific lamprey (Entosphenus tridentatus), an anadromous ectoparasite, faces several challenges during adult migration to spawning grounds. Developing methods to address these challenges is critical to the success of ongoing conservation efforts. The challenges are diverse, and include anthropogenic alterations to the ecosystem resulting in loss of habitat, impassable barriers such as dams, climate change impacts, and altered predator fields. We conducted a behavioral study to understand how adult migrating Pacific lamprey respond to potential alarm cues: White Sturgeon (Acipenser transmontanus), human saliva, decayed Pacific lamprey, and river otter (Lontra canadensis). Research has shown that some species of lamprey can be guided to a location using odors and similar cues may be useful as a management tool for Pacific lamprey. Experiments were conducted over 2 nights and measured the number of entries (count) and duration of time spent (occupancy) by adult lamprey in each arm of a two-choice maze. During the first night, no odor was added to test for selection bias between arms. During the second night odor was added to one arm of the maze. Contrary to expectations, lamprey were significantly attracted to the river otter odor in both count and occupancy. No significant differences were found in the response of lamprey to the other three odors. Results from this study indicate that Pacific lamprey do respond to some odors; however, additional tests are necessary to better identify the types of odors and concentrations that elicit a repeatable response.

  8. Simulator testing of the Westinghouse aware alarm management system

    International Nuclear Information System (INIS)

    Carrera, J.P.; Easter, J.R.; Roth, E.M.

    1997-01-01

    Over the last year, Westinghouse engineers and operators from the Beznau nuclear power station (KKB), owned by the Nordostschweizerische Krafwerke AG of Baden, Switzerland, have been installing and testing the Westinghouse AWARE Alarm Management System in Beznau/SNUPPS operator training simulator, owned and operated by the Westinghouse Electric Corp., in Waltz Mill, PA, USA. The testing has focused primarily on validating the trigger logic data base and on familiarizing the utility's training department with the operation of the system in a real-time environment. Some of the tests have included plant process scenarios in which the computerized Emergency Procedures were available and used through the COMPRO (COMputerized PROcedures) System in conjunction with the AWARE System. While the results to date are qualitative from the perspective of system performance and improvement in message presentation, the tests have generally confirmed the expectations of the design. There is a large reduction in the number of messages that the control room staff must deal with during major process abnormalities, yet at times of relative minor disturbances, some additional messages are available which add clarification, e.g., ''Pump Trouble'' messages. The ''flow'' of an abnormality as it progresses from one part of the plant's processes to another is quite visible. Timing of the messages and the lack of message avalanching is proving to give the operators additional time to respond to messages. Generally, the anxiety level to ''do something'' immediately upon a reactor trip appears to be reduced. (author). 8 refs

  9. The semantics of emotion in false memory.

    Science.gov (United States)

    Brainerd, C J; Bookbinder, S H

    2018-03-26

    The emotional valence of target information has been a centerpiece of recent false memory research, but in most experiments, it has been confounded with emotional arousal. We sought to clarify the results of such research by identifying a shared mathematical relation between valence and arousal ratings in commonly administered normed materials. That relation was then used to (a) decide whether arousal as well as valence influences false memory when they are confounded and to (b) determine whether semantic properties that are known to affect false memory covary with valence and arousal ratings. In Study 1, we identified a quadratic relation between valence and arousal ratings of words and pictures that has 2 key properties: Arousal increases more rapidly as function of negative valence than positive valence, and hence, a given level of negative valence is more arousing than the same level of positive valence. This quadratic function predicts that if arousal as well as valence affects false memory when they are confounded, false memory data must have certain fine-grained properties. In Study 2, those properties were absent from norming data for the Cornell-Cortland Emotional Word Lists, indicating that valence but not arousal affects false memory in those norms. In Study 3, we tested fuzzy-trace theory's explanation of that pattern: that valence ratings are positively related to semantic properties that are known to increase false memory, but arousal ratings are not. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  10. How does negative emotion cause false memories?

    Science.gov (United States)

    Brainerd, C J; Stein, L M; Silveira, R A; Rohenkohl, G; Reyna, V F

    2008-09-01

    Remembering negative events can stimulate high levels of false memory, relative to remembering neutral events. In experiments in which the emotional valence of encoded materials was manipulated with their arousal levels controlled, valence produced a continuum of memory falsification. Falsification was highest for negative materials, intermediate for neutral materials, and lowest for positive materials. Conjoint-recognition analysis produced a simple process-level explanation: As one progresses from positive to neutral to negative valence, false memory increases because (a) the perceived meaning resemblance between false and true items increases and (b) subjects are less able to use verbatim memories of true items to suppress errors.

  11. Current management of inguinal false aneurysms

    DEFF Research Database (Denmark)

    Houlind, Kim; Jepsen, Jørn M; Saicu, Cristian

    2017-01-01

    False aneurysms are formed as a result of bleeding causing a hematoma to compress the surrounding tissue. The majority of false aneurysms presenting to the vascular surgeon are caused by iatrogenic injury to an artery. Although anastomotic failure occurs, a much higher number is caused by bleeding...... vessels. endovascular treatment with coils or covered stent grafts have proven useful in infected ilio-femoral false aneurysms. Open surgical repair may be the best treatment in the setting of imminent rupture, massive haematoma and skin necrosis. We present three patient cases treated with open surgery...

  12. Mental Rotation in False Belief Understanding.

    Science.gov (United States)

    Xie, Jiushu; Cheung, Him; Shen, Manqiong; Wang, Ruiming

    2018-05-01

    This study examines the spontaneous use of embodied egocentric transformation (EET) in understanding false beliefs in the minds of others. EET involves the participants mentally transforming or rotating themselves into the orientation of an agent when trying to adopt his or her visuospatial perspective. We argue that psychological perspective taking such as false belief reasoning may also involve EET because of what has been widely reported in the embodied cognition literature, showing that our processing of abstract, propositional information is often grounded in concrete bodily sensations which are not apparently linked to higher cognition. In Experiment 1, an agent placed a ball into one of two boxes and left. The ball then rolled out and moved either into the other box (new box) or back into the original one (old box). The participants were to decide from which box they themselves or the agent would try to recover the ball. Results showed that false belief performance was affected by increased orientation disparity between the participants and the agent, suggesting involvement of embodied transformation. In Experiment 2, false belief was similarly induced and the participants were to decide if the agent would try to recover the ball in one specific box. Orientation disparity was again found to affect false belief performance. The present results extend previous findings on EET in visuospatial perspective taking and suggest that false belief reasoning, which is a kind of psychological perspective taking, can also involve embodied rotation, consistent with the embodied cognition view. Copyright © 2018 Cognitive Science Society, Inc.

  13. Alarm pheromone does not modulate 22-kHz calls in male rats.

    Science.gov (United States)

    Muyama, Hiromi; Kiyokawa, Yasushi; Inagaki, Hideaki; Takeuchi, Yukari; Mori, Yuji

    2016-03-15

    Rats are known to emit a series of ultrasonic vocalizations, termed 22-kHz calls, when exposed to distressing stimuli. Pharmacological studies have indicated that anxiety mediates 22-kHz calls in distressed rats. We previously found that exposure to the rat alarm pheromone increases anxiety in rats. Therefore, we hypothesized that the alarm pheromone would increase 22-kHz calls in pheromone-exposed rats. Accordingly, we tested whether exposure to the alarm pheromone induced 22-kHz calls, as well as whether the alarm pheromone increased 22-kHz calls in response to an aversive conditioned stimulus (CS). Rats were first fear-conditioned to an auditory and contextual CS. On the following day, the rats were either exposed to the alarm pheromone or a control odor that was released from the neck region of odor-donor rats. Then, the rats were re-exposed to the aversive CS. The alarm pheromone neither induced 22-kHz calls nor increased 22-kHz calls in response to the aversive CS. In contrast, the control odor unexpectedly reduced the total number and duration of 22-kHz calls elicited by the aversive CS, as well as the duration of freezing. These results suggest that the alarm pheromone does not affect 22-kHz calls in rats. However, we may have found evidence for an appeasing olfactory signal, released from the neck region of odor-donor rats. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. A dynamical management for the handling of alarms at CERN; Une supervision dynamique pour la gestion des alarmes au CERN

    Energy Technology Data Exchange (ETDEWEB)

    Parisot, F

    2007-06-15

    The LHC (large hadron collider) is a huge 27 km long particle accelerator that is being installed 100 meter deep underground near Geneva. This machine requires a sophisticated and complex safety system in charge of the security of staff, infrastructure and equipment. The main features of this system is to be completely redundant by itself and be flexible enough to incorporate new parameters from modification of the accelerating system or from new equipment. The redundancy has been thoroughly studied, for instance a cable can be made of copper threads while the other is an optic fiber which add more safety by being able to cope better with the diversity of accidental situations. The LHC site has been divided into 33 security areas and 4 levels of emergency have been set: level 0 is the conveyance of pure information, level 1 is the conveyance of more important information that requires the intervention of an operator within the day, level 2 requires the intervention of an operator immediately, and level 3 is the emergency level for the intervention of the fire brigade. This safety system is in charge of 300000 parameters from a large variety of sensors and manages 17000 alarms. (A.C.)

  15. Judging the urgency of non-verbal auditory alarms: a case study.

    Science.gov (United States)

    Arrabito, G Robert; Mondor, Todd; Kent, Kimberley

    2004-06-22

    When designed correctly, non-verbal auditory alarms can convey different levels of urgency to the aircrew, and thereby permit the operator to establish the appropriate level of priority to address the alarmed condition. The conveyed level of urgency of five non-verbal auditory alarms presently used in the Canadian Forces CH-146 Griffon helicopter was investigated. Pilots of the CH-146 Griffon helicopter and non-pilots rated the perceived urgency of the signals using a rating scale. The pilots also ranked the urgency of the alarms in a post-experiment questionnaire to reflect their assessment of the actual situation that triggers the alarms. The results of this investigation revealed that participants' ratings of perceived urgency appear to be based on the acoustic properties of the alarms which are known to affect the listener's perceived level of urgency. Although for 28% of the pilots the mapping of perceived urgency to the urgency of their perception of the triggering situation was statistically significant for three of the five alarms, the overall data suggest that the triggering situations are not adequately conveyed by the acoustic parameters inherent in the alarms. The pilots' judgement of the triggering situation was intended as a means of evaluating the reliability of the alerting system. These data will subsequently be discussed with respect to proposed enhancements in alerting systems as it relates to addressing the problem of phase of flight. These results call for more serious consideration of incorporating situational awareness in the design and assignment of auditory alarms in aircraft.

  16. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Science.gov (United States)

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being poured...

  17. A basic design of alarm system for the future nuclear power plants in Korea

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Hur, Seop; Shin, Jae-Hwal; Koo, In-Soo; Park, Jong-Kyun

    1997-01-01

    The design of an advanced alarm system is under way to apply to the new MMIS for the future nuclear power plants in Korea. Based on the alarm system design bases we established the design requirements and are now refining them with the results of evaluation through the prototype. To realize the advanced system new algorithms for alarm processing and display are implemented and various new devices are examined. The evaluation for the design is performed in accordance with the verification and validation plans and through the prototype. (author). 7 refs, 2 figs

  18. Alarm analysis of secondary loop system based on MFM and SDG methods

    International Nuclear Information System (INIS)

    Yang Ning; Lu Gubing; Chen Pan

    2014-01-01

    The multilevel flow model (MFM) and the signed directed graph (SDG) were combined to analyze the alarm signals of the secondary loop system for nuclear power plant. The MFM was used to delaminate and describe nuclear power plant, and the SDG was used to analyze the logicality of the facility sign in the MFM. Two kinds of faults in the secondary loop system in nuclear power plant were simulated and the alarm signals were analyzed. The simulation results show that the fault source can be identified exactly and the transmit route of the alarm signals can be described clearly, which is helpful for operators to judge. (authors)

  19. Development of methods and means to improve a performance of microprocessor shock sensors for car alarms

    Directory of Open Access Journals (Sweden)

    S. A. Vasyukov

    2014-01-01

    Full Text Available Existing shock sensors for car protection using the sensitive elements (SE of piezoelectric, microphone and electromagnetic types and the analogue circuitry of signal processing, have a number of essential shortcomings:- piezoelectric sensitive elements have no characteristics repeatability that complicates their use in mass production;- microphone sensors are structurally complicated and demand difficult information signal processing;- sensitive elements of electromagnetic sensors demand individual control (a specified clearance to be set between a magnet and the coil.Use of analogue elements (resistors, capacitors in the amplifier and filter circuits reduces temporary and temperature stability of characteristics. An adjustment of the sensor operating zones via variable resistors on a printed circuit is extremely inconvenient and doesn't allow to change quickly the sensor sensitivity depending on an external situation (for example, to increase quickly an operating zone of the sensor with an alarm system of a key fob when securing a car in the country or in the woods, or to reduce it in the street with heavy traffic streams.An analogue circuit–based sensor design disables its automatic adaptation to such external impacts as a rain, a stream passing by cars, etc.The article considers how to solve some of above problems while designing the two-zone digital shock sensors with a SE of electromagnetic type. It shows the SE design developed by the authors as a module containing the coil and a magnet, secured on the coil axis in a silicone extension. The circuitry solution and algorithms of signals processing allowed authors to realize a remote control of the prevention and alarm zones (with 16 gradation of sensitivity. The algorithm of self-adaptation to the repeating external impacts is proposed. The developed method to form the basic levels of digital comparators for each gradation of sensitivity enables the sensor to have the straight

  20. False memories in social anxiety disorder

    Directory of Open Access Journals (Sweden)

    PRISCILA DE CAMARGO PALMA

    Full Text Available Abstract Background False memories are memories of events that never occurred or that occurred, but not exactly as we recall. Events with emotional content are subject to false memories production similar to neutral events. However, individual differences, such as the level of maladjustment and emotional instability characteristics of Social Anxiety Disorder (SAD, may interfere in the production of false memories. Objectives This study aimed to assess the effect of emotion in memory performance for an event witnessed by participants with and without SAD. Methods Participants were 61 young adults with SAD and 76 without any symptoms of SAD who were randomly assigned to watch a story with or without emotional arousal. Participants answered a subjective scale of emotion about the story and a recognition memory test. Results Participants with SAD recovered more true memories and more false memories for the non-emotional version compared to the emotional version of the story. Overall, participants with SAD produced fewer false memories compared to those without SAD. Discussion This finding suggests that social anxiety may have a significant impact on emotional memory accuracy, which may assist in the development and improvement of techniques for therapeutic intervention.

  1. False Memories for Affective Information in Schizophrenia.

    Science.gov (United States)

    Fairfield, Beth; Altamura, Mario; Padalino, Flavia A; Balzotti, Angela; Di Domenico, Alberto; Mammarella, Nicola

    2016-01-01

    Studies have shown a direct link between memory for emotionally salient experiences and false memories. In particular, emotionally arousing material of negative and positive valence enhanced reality monitoring compared to neutral material since emotional stimuli can be encoded with more contextual details and thereby facilitate the distinction between presented and imagined stimuli. Individuals with schizophrenia appear to be impaired in both reality monitoring and memory for emotional experiences. However, the relationship between the emotionality of the to-be-remembered material and false memory occurrence has not yet been studied. In this study, 24 patients and 24 healthy adults completed a false memory task with everyday episodes composed of 12 photographs that depicted positive, negative, or neutral outcomes. Results showed how patients with schizophrenia made a higher number of false memories than normal controls ( p  false memories ( p  > 0.05) resulting from erroneous inferences but did interact with plausible, script consistent errors in patients (i.e., neutral episodes yielded a higher degree of errors than positive and negative episodes). Affective information reduces the probability of generating causal errors in healthy adults but not in patients suggesting that emotional memory impairments may contribute to deficits in reality monitoring in schizophrenia when affective information is involved.

  2. Remedies by competitors for false advertising.

    Science.gov (United States)

    Hirsch, B D; Wilcox, D P

    1990-05-01

    Patients who are victimized as a consequence of false medical advertising are not the only ones who can sue for damages. Under section 43(a) of the Lanham Act, effective November 17, 1989, anyone "who believes that he or she is or is likely to be damaged" by deceptive advertising may bring a civil action for damages (1). Competing physicians may sue other physicians who falsely advertise that they possess unique skills and achieve better results than other physicians because they employ exclusive methods of treatment or claim that certain surgical procedures they perform in the office are absolutely safe and without risk or who advertise false professional credentials to lure patients. Voluntary informed consent excludes the use of deceit. Misrepresentation through advertising deprives a patient of the right to exercise an informed consent (2). A patient who relies on a doctor's false advertising in agreeing to a procedure that causes the patient injury may sue for malpractice even if the procedure was performed without negligence. False medical advertising also exposes the advertiser to litigation by competitors for unfair competition. This article is concerned with the remedy that may be available for instituting private litigation against physicians and other health care providers who engage in untruthful advertising.

  3. False Memories for Affective Information in Schizophrenia

    Science.gov (United States)

    Fairfield, Beth; Altamura, Mario; Padalino, Flavia A.; Balzotti, Angela; Di Domenico, Alberto; Mammarella, Nicola

    2016-01-01

    Studies have shown a direct link between memory for emotionally salient experiences and false memories. In particular, emotionally arousing material of negative and positive valence enhanced reality monitoring compared to neutral material since emotional stimuli can be encoded with more contextual details and thereby facilitate the distinction between presented and imagined stimuli. Individuals with schizophrenia appear to be impaired in both reality monitoring and memory for emotional experiences. However, the relationship between the emotionality of the to-be-remembered material and false memory occurrence has not yet been studied. In this study, 24 patients and 24 healthy adults completed a false memory task with everyday episodes composed of 12 photographs that depicted positive, negative, or neutral outcomes. Results showed how patients with schizophrenia made a higher number of false memories than normal controls (p false memories (p > 0.05) resulting from erroneous inferences but did interact with plausible, script consistent errors in patients (i.e., neutral episodes yielded a higher degree of errors than positive and negative episodes). Affective information reduces the probability of generating causal errors in healthy adults but not in patients suggesting that emotional memory impairments may contribute to deficits in reality monitoring in schizophrenia when affective information is involved. PMID:27965600

  4. An investigation of false positive dosimetry results

    International Nuclear Information System (INIS)

    Lewandowski, M.A.; Davis, S.A.; Goff, T.E.; Wu, C.F.

    1996-01-01

    The Waste Isolation Pilot Plant (WIPP) is a facility designed for the demonstration of the safe disposal of transuranic waste. Currently, the radiation source term is confined to sealed calibration and check sources since WIPP has not received waste for disposal. For several years the WIPP Dosimetry Group has operated a Harshaw Model 8800C reader to analyze Harshaw 8801-7776 thermoluminescent cards (3 TLD-700 and 1 TLD-600) with 8805 holder. The frequency of false positive results for quarterly dosimeter exchanges is higher than desired by the Dosimetry Group management. Initial observations suggested that exposure to intense ambient sunlight may be responsible for the majority of the false positive readings for element 3. A study was designed to investigate the possibility of light leaking through the holder and inducing a signal in element 3. This paper discusses the methods and results obtained, with special emphasis placed on recommendations to reduce the frequency of light-induced false positive readings

  5. False iliac artery aneurysm following renal transplantation

    DEFF Research Database (Denmark)

    Levi, N; Sønksen, Jens Otto Reimers; Schroeder, T V

    1999-01-01

    We report a very rare case of a false iliac artery aneurysm following renal transplantation. The patient was a 51-year-old women who presented with a painful 10 x 10 cm pulsating mass in her left iliac fossa. The patient had received a second cadaveric renal transplantation 5 years previously....... The graft never functioned and transplant nephrectomy was performed 2 weeks later. A CT-scanning showed a 10 x 10 cm large aneurysm arising from the left external iliac artery. At operation a large false aneurysm was identified arising from the original transplant anastomotic site. Due to the extent...

  6. Real-time Alarm Monitoring System for Detecting Driver Fatigue in Wireless Areas

    Directory of Open Access Journals (Sweden)

    Rongrong Fu

    2017-04-01

    Full Text Available The purpose of this paper was to develop a real-time alarm monitoring system that can detect the fatigue driving state through wireless communication. The drivers’ electroencephalogram (EEG signals were recorded from occipital electrodes. Seven EEG rhythms with different frequency bands as gamma, hbeta, beta, sigma, alpha, theta and delta waves were extracted. They were simultaneously assessed using relative operating characteristic (ROC curves and grey relational analysis to select one as the fatigue feature. The research results showed that the performance of theta wave was the best one. Therefore, theta wave was used as fatigue feature in the following alarm device. The real-time alarm monitoring system based on the result has been developed, once the threshold was settled by using the data of the first ten minutes driving period. The developed system can detect driver fatigue and give alarm to indicate the onset of fatigue automatically.

  7. 30 CFR 75.352 - Actions in response to AMS malfunction, alert, or alarm signals.

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH MANDATORY SAFETY STANDARDS-UNDERGROUND COAL MINES Ventilation..., or alarm signal is received at the designated surface location, the sensor(s) that are activated must...

  8. Intelligent buildings, automatic fire alarm and fire-protection control system

    International Nuclear Information System (INIS)

    Tian Deyuan

    1999-01-01

    The author describes in brief the intelligent buildings, and the automatic fire alarm and fire-protection control system. On the basis of the four-bus, three-bus and two-bus, a new transfer technique was developed

  9. COUNTERMEASURE FOR MINIMIZE UNWANTED ALARM OF AUTOMATIC FIRE NOTIFICATION SYSTEM IN THE REPUBLIC OF KOREA

    Directory of Open Access Journals (Sweden)

    Hasung Kong

    2015-01-01

    Full Text Available In this article investigated the cause of error through survey to building officials for minimizing the unwanted alarm of automatic fire notification and suggested countermeasure for minimizing the unwanted alarm. The main cause of the unwanted alarm is defective fire detector, interlocking with automatic fire detection system, lack in fire safety warden’s ability, worn-out fire detect receiving system. The countermeasure for minimizing unwanted alarm is firstly, tightening up the standard of model approval, Secondly, interlocking with cross-section circuit method fire extinguishing system or realizing automatic fire notification system interlocking with home network, thirdly, tightening up licensing examination of fire safety warden, lastly, it suggested term of use rule of fire detect receiving system. 

  10. COUNTERMEASURE FOR MINIMIZE UNWANTED ALARM OF AUTOMATIC FIRE NOTIFICATION SYSTEM IN THE REPUBLIC OF KOREA

    Directory of Open Access Journals (Sweden)

    Hasung Kong

    2015-01-01

    Full Text Available In this article investigated the cause of error through survey to building officials for minimizing the unwanted alarm of automatic fire notification and suggested countermeasure for minimizing the unwanted alarm. The main cause of the unwanted alarm is defective fire detector, interlocking with automatic fire detection system, lack in fire safety warden’s ability, worn-out fire detect receiving system. The countermeasure for minimizing unwanted alarm is firstly, tightening up the standard of model approval, Secondly, interlocking with cross-section circuit method fire extinguishing system or realizing automatic fire notification system interlocking with home network, thirdly, tightening up licensing examination of fire safety warden, lastly, it suggested term of use rule of fire detect receiving system.

  11. Plutonium Finishing Plant (PFP) Criticality Alarm System Commercial Grade Item (CGI) Critical Characteristics

    International Nuclear Information System (INIS)

    WHITE, W.F.

    1999-01-01

    This document specifies the critical characteristics for Commercial Grade Items (CGI) procured for PFP's criticality alarm system as required by HNF-PRO-268 and HNF-PRO-1819. These are the minimum specifications that the equipment must meet in order to properly perform its safety function. There may be several manufacturers or models that meet the critical characteristics for any one item. PFP's Criticality Alarm System includes the nine criticality alarm system panels and their associated hardware. This includes all parts up to the first breaker in the electrical distribution system. Specific system boundaries and justifications are contained in HNF-SD-CP-SDD-003, ''Definition and Means of Maintaining the Criticality Detectors and Alarms Portion of the PFP Safety Envelope.'' The procurement requirements associated with the system necessitates procurement of some system equipment as Commercial Grade Items in accordance with HNF-PRO-268, ''Control of Purchased Items and Services.''

  12. Advances in software development for intelligent interfaces for alarm and emergency management consoles

    International Nuclear Information System (INIS)

    Moseley, M.R.; Olson, C.E.

    1986-01-01

    Recent advances in technology allow features like voice synthesis, voice and speech recognition, image understanding, and intelligent data base management to be incorporated in computer driven alarm and emergency management information systems. New software development environments make it possible to do rapid prototyping of custom applications. Three examples using these technologies are discussed. 1) Maximum use is made of high-speed graphics and voice synthesis to implement a state-of-the-art alarm processing and display system with features that make the operator-machine interface efficient and accurate. 2) An application generator which has the capability of ''building'' a specific alarm processing and display application in a matter of a few hours, using the site definition developed in the security planning phase to produce the custom application. 3) A software tool, is described which permits rapid prototyping of human-machine interfaces for a variety of applications including emergency management, alarm display and process information display

  13. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  14. Development of alarm cause tracking system for Korea standard nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Jung Woon; Kim, Jung Taek; Park, Jae Chang; Lee, Hyun Chul; Park, Joong Pal

    2004-05-01

    The proposed system, the ACTS(Alarm Cause Tracking System), in the 1st and 2nd development period(2001. 7 ∼ 2003. 6), tracks and displays the causes of alarms on-line from computerized logic diagrams. And the system highlights the specific procedures related the causes in the procedure of the alarm. In this period(2003. 7 ∼ 2004. 4), we developed the ACTS for Korea standard nuclear power plant. Also, we computerized control logic diagrams and alarm procedures for the ACTS. A long-term target is to apply the ACTS at the real power plant, and a short-term target is to connect the ACTS with the ITF(Intergrated Test Facility) in KAERI site to develop other applications

  15. Alarm symptoms of upper gastrointestinal cancer and contact to general practice

    DEFF Research Database (Denmark)

    Rasmussen, Sanne; Larsen, Pia Veldt; Svendsen, Rikke Pilsgaard

    2015-01-01

    INTRODUCTION: Survival of upper gastrointestinal (GI) cancer depends on early stage diagnosis. Symptom-based guidelines and fast-track referral systems have been implemented for use in general practice. To improve diagnosis of upper GI cancer, knowledge on prevalence of alarm symptoms...... between 1.1% ("repeated vomiting") and 3.4% ("difficulty swallowing"). Women had higher odds of experiencing "repeated vomiting" and "persistent and recent-onset abdominal pain", but lower odds of experiencing "upper GI bleeding". The proportion of people contacting their GP with each of the four specific...... alarm symptoms ranged from 24.3% ("upper GI bleeding") to 39.9% ("repeated vomiting"). For each combination of two specific alarm symptoms, at least 52% contacted their GP. CONCLUSION: The specific alarm symptoms of upper GI cancer are not very prevalent in the general population. The proportion of GP...

  16. False memories, but not false beliefs, affect implicit attitudes for food preferences.

    Science.gov (United States)

    Howe, David; Anderson, Rachel J; Dewhurst, Stephen A

    2017-09-01

    Previous studies have found that false memories and false beliefs of childhood experiences can have attitudinal consequences. Previous studies have, however, focused exclusively on explicit attitude measures without exploring whether implicit attitudes are similarly affected. Using a false feedback/imagination inflation paradigm, false memories and beliefs of enjoying a certain food as a child were elicited in participants, and their effects were assessed using both explicit attitude measures (self-report questionnaires) and implicit measures (a Single-Target Implicit Association Test). Positive changes in explicit attitudes were observed both in participants with false memories and participants with false beliefs. In contrast, only participants with false memories exhibited more positive implicit attitudes. The findings are discussed in terms of theories of explicit and implicit attitudes. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  18. Cutaneous factitia in elderly patients: alarm signal for psychiatric disorders

    Directory of Open Access Journals (Sweden)

    Chiriac A

    2014-03-01

    choose the proper therapy is mandatory for all these cases. Dermatologists and all physicians who take care of old patients must recognize the disorder in order to provide optimum care for this chronic condition. We emphasize therefore the importance of psychiatric evaluation and treatment to avoid the major risk of suicide. Skin lesions must be regarded as an alarm signal in critical cases, especially in senior people. Keywords: pathomimia, elderly, psychiatric disorders

  19. Dosimetric properties of the pocket alarm dosimeter type Graetz TDW 10/20

    International Nuclear Information System (INIS)

    Hauser, M.; Burgkhardt, B.; Piesch, E.

    1980-08-01

    In personnel monitoring pocket dosimeters with build-in alarm devices are increasingly in use. The report presents results of a test performed at Karlsruhe. The properties investigated are above all linearity and reproducibility of the dose reading as well as of the acustic alarm indication, dependence on the dose reading, the photon energy, the direction of the radiation incidence, the dose rate, the temperature and operational characteristic of the batteries. (orig./HP) [de

  20. Integrated knowledge base tool for acquisition and verification of NPP alarm systems

    International Nuclear Information System (INIS)

    Park, Joo Hyun; Seong, Poong Hyun

    1998-01-01

    Knowledge acquisition and knowledge base verification are important activities in developing knowledge-based systems such as alarm processing systems. In this work, we developed the integrated tool, for knowledge acquisition and verification of NPP alarm processing systems, by using G2 tool. The tool integrates document analysis method and ECPN matrix analysis method, for knowledge acquisition and knowledge verification, respectively. This tool enables knowledge engineers to perform their tasks from knowledge acquisition to knowledge verification consistently

  1. Habituation of adult sea lamprey repeatedly exposed to damage-released alarm and predator cues

    Science.gov (United States)

    Imre, Istvan; Di Rocco, Richard T.; Brown, Grant E.; Johnson, Nicholas

    2016-01-01

    Predation is an unforgiving selective pressure affecting the life history, morphology and behaviour of prey organisms. Selection should favour organisms that have the ability to correctly assess the information content of alarm cues. This study investigated whether adult sea lamprey Petromyzon marinus habituate to conspecific damage-released alarm cues (fresh and decayed sea lamprey extract), a heterospecific damage-released alarm cue (white sucker Catostomus commersoniiextract), predator cues (Northern water snake Nerodia sipedon washing, human saliva and 2-phenylethylamine hydrochloride (PEA HCl)) and a conspecific damage-released alarm cue and predator cue combination (fresh sea lamprey extract and human saliva) after they were pre-exposed 4 times or 8 times, respectively, to a given stimulus the previous night. Consistent with our prediction, adult sea lamprey maintained an avoidance response to conspecific damage-released alarm cues (fresh and decayed sea lamprey extract), a predator cue presented at high relative concentration (PEA HCl) and a conspecific damage-released alarm cue and predator cue combination (fresh sea lamprey extract plus human saliva), irrespective of previous exposure level. As expected, adult sea lamprey habituated to a sympatric heterospecific damage-released alarm cue (white sucker extract) and a predator cue presented at lower relative concentration (human saliva). Adult sea lamprey did not show any avoidance of the Northern water snake washing and the Amazon sailfin catfish extract (heterospecific control). This study suggests that conspecific damage-released alarm cues and PEA HCl present the best options as natural repellents in an integrated management program aimed at controlling the abundance of sea lamprey in the Laurentian Great Lakes.

  2. Unique thermal record in False Bay

    CSIR Research Space (South Africa)

    Grundlingh, ML

    1993-10-01

    Full Text Available Over the past decade False Bay has assumed a prime position in terms of research in to large South African bays. This is manifested by investigations that cover flow conditions modelling, thermal structure, management, biology and nutrients, geology...

  3. Acute effects of triazolam on false recognition.

    Science.gov (United States)

    Mintzer, M Z; Griffiths, R R

    2000-12-01

    Neuropsychological, neuroimaging, and electrophysiological techniques have been applied to the study of false recognition; however, psychopharmacological techniques have not been applied. Benzodiazepine sedative/anxiolytic drugs produce memory deficits similar to those observed in organic amnesia and may be useful tools for studying normal and abnormal memory mechanisms. The present double-blind, placebo-controlled repeated measures study examined the acute effects of orally administered triazolam (Halcion; 0.125 and 0.25 mg/70 kg), a benzodiazepine hypnotic, on performance in the Deese (1959)/Roediger-McDermott (1995) false recognition paradigm in 24 healthy volunteers. Paralleling previous demonstrations in amnesic patients, triazolam produced significant dose-related reductions in false recognition rates to nonstudied words associatively related to studied words, suggesting that false recognition relies on normal memory mechanisms impaired in benzodiazepine-induced amnesia. The results also suggested that relative to placebo, triazolam reduced participants' reliance on memory for item-specific versus list-common semantic information and reduced participants' use of remember versus know responses.

  4. Underpowered samples, false negatives, and unconscious learning.

    Science.gov (United States)

    Vadillo, Miguel A; Konstantinidis, Emmanouil; Shanks, David R

    2016-02-01

    The scientific community has witnessed growing concern about the high rate of false positives and unreliable results within the psychological literature, but the harmful impact of false negatives has been largely ignored. False negatives are particularly concerning in research areas where demonstrating the absence of an effect is crucial, such as studies of unconscious or implicit processing. Research on implicit processes seeks evidence of above-chance performance on some implicit behavioral measure at the same time as chance-level performance (that is, a null result) on an explicit measure of awareness. A systematic review of 73 studies of contextual cuing, a popular implicit learning paradigm, involving 181 statistical analyses of awareness tests, reveals how underpowered studies can lead to failure to reject a false null hypothesis. Among the studies that reported sufficient information, the meta-analytic effect size across awareness tests was d z = 0.31 (95 % CI 0.24-0.37), showing that participants' learning in these experiments was conscious. The unusually large number of positive results in this literature cannot be explained by selective publication. Instead, our analyses demonstrate that these tests are typically insensitive and underpowered to detect medium to small, but true, effects in awareness tests. These findings challenge a widespread and theoretically important claim about the extent of unconscious human cognition.

  5. Development of the False-Memory Illusion

    Science.gov (United States)

    Brainerd, C. J.; Forrest, T. J.; Karibian, D.; Reyna, V. F.

    2006-01-01

    The counterintuitive developmental trend in the Deese-Roediger-McDermott (DRM) illusion (that false-memory responses increase with age) was investigated in learning-disabled and nondisabled children from the 6- to 14-year-old age range. Fuzzy-trace theory predicts that because there are qualitative differences in how younger versus older children…

  6. False memories for affective information in Schizophrenia

    Directory of Open Access Journals (Sweden)

    Beth Fairfield

    2016-11-01

    Full Text Available Studies have shown a direct link between memory for emotionally salient experiences and false memories. In particular, emotionally arousing material of negative and positive valence enhanced reality monitoring compared to neutral material since emotional stimuli can be encoded with more contextual details and thereby facilitate the distinction between presented and imagined stimuli. Individuals with schizophrenia appear to be impaired in both reality monitoring and memory for emotional experiences. However, the relationship between the emotionality of the-to-be-remembered material and false memory occurrence has not yet been studied. In this study, twenty-four patients and twenty-four healthy adults completed a false memory task with everyday episodes composed of 12 photographs that depicted positive, negative or neutral outcomes. Results showed how patients with schizophrenia made a higher number of false memories than normal controls (p0.05 resulting from erroneous inferences but did interact with plausible, script consistent errors in patients (i.e. neutral episodes yielded a higher degree of errors than positive and negative episodes. Affective information reduces the probability of generating causal errors in healthy adults but not in patients suggesting that emotional memory impairments may contribute to deficits in reality monitoring in schizophrenia when affective information is involved.

  7. No effect of stress on false recognition.

    Science.gov (United States)

    Beato, María Soledad; Cadavid, Sara; Pulido, Ramón F; Pinho, María Salomé

    2013-02-01

    The present study aimed to analyze the effect of acute stress on false recognition in the Deese/Roediger-McDermott (DRM) paradigm. In this paradigm, lists of words associated with a non-presented critical lure are studied and, in a subsequent memory test, critical lures are often falsely remembered. In two experiments, participants were randomly assigned to either the stress group (Trier Social Stress Test) or the no-stress control group. Because we sought to control the level-of-processing at encoding, in Experiment 1, participants created a visual mental image for each presented word (deep encoding). In Experiment 2, participants performed a shallow encoding (to respond whether each word contained the letter "o"). The results indicated that, in both experiments, as predicted, heart rate and STAI-S scores increased only in the stress group. However, false recognition did not differ across stress and no-stress groups. Results suggest that, although psychosocial stress was successfully induced, it does not enhance the vulnerability of individuals with acute stress to DRM false recognition, regardless of the level of processing.

  8. COMPARATIVE EFFICACY OF NEEM (Azadirachta indica), FALSE ...

    African Journals Online (AJOL)

    Osondu

    Abstract. A study to evaluate the insecticidal properties of some plants was undertaken. Powder and aqueous extracts of Neem, Azadirachta indica, False sesame, Ceratotheca sesamoides and the Physic nut, Jatropha curcas were evaluated as grain protectants against the cowpea seed beetle, Callosobruchus maculatus.

  9. Breast cancer screening: evidence for false reassurance?

    NARCIS (Netherlands)

    R. de Gelder (Rianne); E. As, van (Elisabeth); M.M.A. Tilanus-Linthorst (Madeleine); C.C.M. Bartels (Carina); R. Boer (Rob); G. Draisma (Gerrit); H.J. de Koning (Harry)

    2008-01-01

    textabstractTumour stage distribution at repeated mammography screening is, unexpectedly, often not more favourable than stage distribution at first screenings. False reassurance, i.e., delayed symptom presentation due to having participated in earlier screening rounds, might be associated with

  10. Mapping the Real and the False

    DEFF Research Database (Denmark)

    Kuever, Erika

    2014-01-01

    Purpose -- To show that Chinese consumers are constantly redefining and revaluing goods along the axes of the real and the false, with little regard for legal definitions of brand authenticity or “fakeness.” Findings -- In their everyday consumption practices and navigation of a complex and often...

  11. Distance Sensitive Bloom Filters Without False Negatives

    DEFF Research Database (Denmark)

    Goswami, Mayank; Pagh, Rasmus; Silvestri, Francesco

    2017-01-01

    A Bloom filter is a widely used data-structure for representing a set S and answering queries of the form “Is x in S?”. By allowing some false positive answers (saying ‘yes’ when the answer is in fact ‘no’) Bloom filters use space significantly below what is required for storing S. In the distanc...

  12. False elevation of carboxyhemoglobin: case report.

    Science.gov (United States)

    Mehrotra, Shruti; Edmonds, Marcia; Lim, Rodrick K

    2011-02-01

    Carbon monoxide toxicity in infants and children, like adults, produce nonspecific symptoms with normal vital signs necessitating the serum measurement of carboxyhemoglobin (COHb). In infants, the COHb may be falsely elevated. Our goal was to report a case of suspected carbon monoxide toxicity in an infant and the likely cause of the falsely elevated serum COHb. A previously healthy 3-month-old girl presented to the pediatric emergency department (ED) with smoke inhalation from a defective furnace. She was asymptomatic. On examination, she was alert, with Glasgow Coma Scale of 15 and normal vital signs. Cardiorespiratory and neurological examinations were completely normal. Because of concern regarding carbon monoxide poisoning, she was treated with normobaric oxygen therapy. Initial and subsequent serum COHb levels were persistently elevated, despite treatment and the infant appearing clinically well. As such, she had a prolonged stay in the ED. Further investigations found that fetal hemoglobin interferes with the spectrophotometric method used to analyze serum COHb levels. Carboxyhemoglobin serum level, in infants, may be falsely elevated due to the fetal hemoglobin interfering with standard methods of analysis. Knowledge of the false elevation using standard spectrophotometric methods of COHb in clinically well-appearing infants can decrease unnecessary oxygen therapy and monitoring time in the ED.

  13. A Synchronization Account of False Recognition

    Science.gov (United States)

    Johns, Brendan T.; Jones, Michael N.; Mewhort, Douglas J. K.

    2012-01-01

    We describe a computational model to explain a variety of results in both standard and false recognition. A key attribute of the model is that it uses plausible semantic representations for words, built through exposure to a linguistic corpus. A study list is encoded in the model as a gist trace, similar to the proposal of fuzzy trace theory…

  14. Effects of integrated designs of alarm and process information on diagnosis performance in digital nuclear power plants.

    Science.gov (United States)

    Wu, Xiaojun; She, Manrong; Li, Zhizhong; Song, Fei; Sang, Wei

    2017-12-01

    In the main control rooms of nuclear power plants (NPPs), operators frequently switch between alarm displays and system-information displays to incorporate information from different screens. In this study, we investigated two integrated designs of alarm and process information - integrating alarm information into process displays (denoted as Alarm2Process integration) and integrating process information into alarm displays (denoted as Process2Alarm integration). To analyse the effects of the two integration approaches and time pressure on the diagnosis performance, a laboratory experiment was conducted with ninety-six students. The results show that compared with the non-integrated case, Process2Alarm integration yields better diagnosis performance in terms of diagnosis accuracy, time required to generate correct hypothesis and completion time. In contrast, the Alarm2Process integration leads to higher levels of workload, with no improvement in diagnosis performance. The diagnosis performance of Process2Alarm integration was consistently better than that of Alarm2Process integration, regardless of the levels of time pressure. Practitioner Summary: To facilitate operator's synthesis of NPP information when performing diagnosis tasks, we proposed to integrate process information into alarm displays. The laboratory validation shows that the integration approach significantly improves the diagnosis performance for both low and high time-pressure levels.

  15. Comparison of sound propagation and perception of three types of backup alarms with regards to worker safety

    Directory of Open Access Journals (Sweden)

    Véronique Vaillancourt

    2013-01-01

    Full Text Available A technology of backup alarms based on the use of a broadband signal has recently gained popularity in many countries. In this study, the performance of this broadband technology is compared to that of a conventional tonal alarm and a multi-tone alarm from a worker-safety standpoint. Field measurements of sound pressure level patterns behind heavy vehicles were performed in real work environments and psychoacoustic measurements (sound detection thresholds, equal loudness, perceived urgency and sound localization were carried out in the laboratory with human subjects. Compared with the conventional tonal alarm, the broadband alarm generates a much more uniform sound field behind vehicles, is easier to localize in space and is judged slighter louder at representative alarm levels. Slight advantages were found with the tonal alarm for sound detection and for perceived urgency at low levels, but these benefits observed in laboratory conditions would not overcome the detrimental effects associated with the large and abrupt variations in sound pressure levels (up to 15-20 dB within short distances observed in the field behind vehicles for this alarm, which are significantly higher than those obtained with the broadband alarm. Performance with the multi-tone alarm generally fell between that of the tonal and broadband alarms on most measures.

  16. The challenge of localizing vehicle backup alarms: Effects of passive and electronic hearing protectors, ambient noise level, and backup alarm spectral content

    Directory of Open Access Journals (Sweden)

    Khaled A Alali

    2011-01-01

    Full Text Available A human factors experiment employed a hemi-anechoic sound field in which listeners were required to localize a vehicular backup alarm warning signal (both a standard and a frequency-augmented alarm in 360-degrees azimuth in pink noise of 60 dBA and 90 dBA. Measures of localization performance included: (1 percentage correct localization, (2 percentage of right--left localization errors, (3 percentage of front-rear localization errors, and (4 localization absolute deviation in degrees from the alarm′s actual location. In summary, the data demonstrated that, with some exceptions, normal hearing listeners′ ability to localize the backup alarm in 360-degrees azimuth did not improve when wearing augmented hearing protectors (including dichotic sound transmission earmuffs, flat attenuation earplugs, and level-dependent earplugs as compared to when wearing conventional passive earmuffs or earplugs of the foam or flanged types. Exceptions were that in the 90 dBA pink noise, the flat attenuation earplug yielded significantly better accuracy than the polyurethane foam earplug and both the dichotic and the custom-made diotic electronic sound transmission earmuffs. However, the flat attenuation earplug showed no benefit over the standard pre-molded earplug, the arc earplug, and the passive earmuff. Confusions of front-rear alarm directions were most significant in the 90 dBA noise condition, wherein two types of triple-flanged earplugs exhibited significantly fewer front-rear confusions than either of the electronic muffs. On all measures, the diotic sound transmission earmuff resulted in the poorest localization of any of the protectors due to the fact that its single-microphone design did not enable interaural cues to be heard. Localization was consistently more degraded in the 90 dBA pink noise as compared with the relatively quiet condition of the 60 dBA pink noise. A frequency-augmented backup alarm, which incorporated 400 Hz and 4000 Hz components

  17. Creating a false memory in the hippocampus.

    Science.gov (United States)

    Ramirez, Steve; Liu, Xu; Lin, Pei-Ann; Suh, Junghyup; Pignatelli, Michele; Redondo, Roger L; Ryan, Tomás J; Tonegawa, Susumu

    2013-07-26

    Memories can be unreliable. We created a false memory in mice by optogenetically manipulating memory engram-bearing cells in the hippocampus. Dentate gyrus (DG) or CA1 neurons activated by exposure to a particular context were labeled with channelrhodopsin-2. These neurons were later optically reactivated during fear conditioning in a different context. The DG experimental group showed increased freezing in the original context, in which a foot shock was never delivered. The recall of this false memory was context-specific, activated similar downstream regions engaged during natural fear memory recall, and was also capable of driving an active fear response. Our data demonstrate that it is possible to generate an internally represented and behaviorally expressed fear memory via artificial means.

  18. Cosmic chirality both true and false.

    Science.gov (United States)

    Barron, Laurence D

    2012-12-01

    The discrete symmetries of parity P, time reversal T, and charge conjugation C may be used to characterize the properties of chiral systems. It is well known that parity violation infiltrates into ordinary matter via an interaction between the nucleons and electrons, mediated by the Z(0) particle, that lifts the degeneracy of the mirror-image enantiomers of a chiral molecule. Being odd under P but even under T, this P-violating interaction exhibits true chirality and so may induce absolute enantioselection under all circumstances. It has been suggested that CP violation may also infiltrate into ordinary matter via a P-odd, T-odd interaction mediated by the (as yet undetected) axion. This CP-violating interaction exhibits false chirality and so may induce absolute enantioselection in processes far from equilibrium. Both true and false cosmic chirality should be considered together as possible sources of homochirality in the molecules of life. Copyright © 2012 Wiley Periodicals, Inc.

  19. Underlying processes behind false perspective production

    Directory of Open Access Journals (Sweden)

    Antonio L. Manzanero

    2016-01-01

    Full Text Available This study aimed to determine the extent to which Reality Monitoring (RM content analysis can provide useful information when discriminating between actual versus false statements. Participants were instructed to either describe a traffic accident as eyewitness actual role or to describe the accident as a simulated victim. Data were analysed in terms of accuracy and quality, and were represented using high dimensional visualization (HDV. In Experiment 1 (between-participant design, participants made significantly more references to cognitive operations, more self-references and less changes in order when describing the event as simulated victim. In Experiment 2 (within-participants design participants also made significantly more references to cognitive operations and more self references when describing the event from the simulated victim as well as being less accurate, providing less irrelevant information and more evalúative comments. HDV graphics indicated that false statements differ holistically from actual ones.

  20. The problem with false vacuum Higgs inflation

    International Nuclear Information System (INIS)

    Fairbairn, Malcolm; Grothaus, Philipp; Hogan, Robert

    2014-01-01

    We investigate the possibility of using the only known fundamental scalar, the Higgs, as an inflaton with minimal coupling to gravity. The peculiar appearance of a plateau or a false vacuum in the renormalised effective scalar potential suggests that the Higgs might drive inflation. For the case of a false vacuum we use an additional singlet scalar field, motivated by the strong CP problem, and its coupling to the Higgs to lift the barrier allowing for a graceful exit from inflation by mimicking hybrid inflation. We find that this scenario is incompatible with current measurements of the Higgs mass and the QCD coupling constant and conclude that the Higgs can only be the inflaton in more complicated scenarios

  1. False Context Fear Memory in Rats

    Science.gov (United States)

    Bae, Sarah; Holmes, Nathan M.; Westbrook, R. Frederick

    2015-01-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control…

  2. Detecting false intent using eye blink measures

    Directory of Open Access Journals (Sweden)

    Frank M Marchak

    2013-10-01

    Full Text Available Eye blink measures have been shown to be diagnostic in detecting deception regarding past acts. Here we examined – across two experiments with increasing degrees of ecological validity – whether changes in eye blinking can be used to determine false intent regarding future actions. In both experiments, half of the participants engaged in a mock crime and then transported an explosive device with the intent of delivering it to a ‘contact’ that would use it to cause a disturbance. Eye blinking was measured for all participants when presented with three types of questions: relevant to intent to transport an explosive device, relevant to intent to engage in an unrelated illegal act, and neutral questions. Experiment 1 involved standing participants watching a video interviewer with audio presented ambiently. Experiment 2 involved standing participants questioned by a live interviewer. Across both experiments, changes in blink count during and immediately following individual questions, total number of blinks, and maximum blink time length differentiated those with false intent from truthful intent participants. In response to questions relevant to intent to deliver an explosive device versus questions relevant to intent to deliver illegal drugs, those with false intent showed a suppression of blinking during the questions when compared to the ten second period after the end of the questions, a lower number of blinks, and shorter maximum blink duration. The results are discussed in relation to detecting deception about past activities as well as to the similarities and differences to detecting false intent as described by prospective memory and arousal.

  3. Constrained potential method for false vacuum decays

    International Nuclear Information System (INIS)

    Park, Jae-hyeon

    2010-11-01

    A procedure is reported for numerical analysis of false vacuum transition in a model with multiple scalar fields. It is a refined version of the approach by Konstandin and Huber. The alteration makes it possible to tackle a class of problems that was difficult or unsolvable with the original method, i.e. those with a distant or nonexistent true vacuum. An example with an unbounded-from-below direction is presented. (orig.)

  4. Alarm systems detect volcanic tremor and earthquake swarms during Redoubt eruption, 2009

    Science.gov (United States)

    Thompson, G.; West, M. E.

    2009-12-01

    We ran two alarm algorithms on real-time data from Redoubt volcano during the 2009 crisis. The first algorithm was designed to detect escalations in continuous seismicity (tremor). This is implemented within an application called IceWeb which computes reduced displacement, and produces plots of reduced displacement and spectrograms linked to the Alaska Volcano Observatory internal webpage every 10 minutes. Reduced displacement is a measure of the amplitude of volcanic tremor, and is computed by applying a geometrical spreading correction to a displacement seismogram. When the reduced displacement at multiple stations exceeds pre-defined thresholds and there has been a factor of 3 increase in reduced displacement over the previous hour, a tremor alarm is declared. The second algorithm was to designed to detect earthquake swarms. The mean and median event rates are computed every 5 minutes based on the last hour of data from a real-time event catalog. By comparing these with thresholds, three swarm alarm conditions can be declared: a new swarm, an escalation in a swarm, and the end of a swarm. The end of swarm alarm is important as it may mark a transition from swarm to continuous tremor. Alarms from both systems were dispatched using a generic alarm management system which implements a call-down list, allowing observatory scientists to be called in sequence until someone acknowledged the alarm via a confirmation web page. The results of this simple approach are encouraging. The tremor alarm algorithm detected 26 of the 27 explosive eruptions that occurred from 23 March - 4 April. The swarm alarm algorithm detected all five of the main volcanic earthquake swarm episodes which occurred during the Redoubt crisis on 26-27 February, 21-23 March, 26 March, 2-4 April and 3-7 May. The end-of-swarm alarms on 23 March and 4 April were particularly helpful as they were caused by transitions from swarm to tremor shortly preceding explosive eruptions; transitions which were

  5. False confessions, expert testimony, and admissibility.

    Science.gov (United States)

    Watson, Clarence; Weiss, Kenneth J; Pouncey, Claire

    2010-01-01

    The confession of a criminal defendant serves as a prosecutor's most compelling piece of evidence during trial. Courts must preserve a defendant's constitutional right to a fair trial while upholding the judicial interests of presenting competent and reliable evidence to the jury. When a defendant seeks to challenge the validity of that confession through expert testimony, the prosecution often contests the admissibility of the expert's opinion. Depending on the content and methodology of the expert's opinion, testimony addressing the phenomenon of false confessions may or may not be admissible. This article outlines the scientific and epistemological bases of expert testimony on false confession, notes the obstacles facing its admissibility, and provides guidance to the expert in formulating opinions that will reach the judge or jury. We review the 2006 New Jersey Superior Court decision in State of New Jersey v. George King to illustrate what is involved in the admissibility of false-confession testimony and use the case as a starting point in developing a best-practice approach to working in this area.

  6. Porocercospora seminalis gen. et comb. nov., the causal organism of buffalograss false smut

    NARCIS (Netherlands)

    Amaradasa, B.S.; Madrid, H.; Groenewald, J.Z.; Crous, P.W.; Amundsen, K.

    2014-01-01

    False smut caused by Cercospora seminalis is an important disease of buffalograss (Buchloë dactyloides) affecting seed production. The pathogen prevents normal caryopsis development and causes considerable yield loss and reduced seed germination. The current taxonomic placement of the false-smut

  7. Communication strategies and timeliness of response to life critical telemetry alarms.

    Science.gov (United States)

    Bonzheim, Kimberly A; Gebara, Rani I; O'Hare, Bridget M; Ellis, R Darin; Brand, Monique A; Balar, Salil D; Stockman, Rita; Sciberras, Annette M; Haines, David E

    2011-05-01

    A centralized electrocardiogram telemetry monitoring system (TMS) facilitates early identification of critical arrhythmias and acute medical decompensation. Timely intervention can only be performed if abnormalities are communicated rapidly to the direct caregiver. The study objectives were to measure effectiveness of bi-directional voice communication badges versus one-way alphanumeric pagers for telemetry alarm response and communication loop closure. A sequential observational pilot study of nursing response to TMS alarms compared communication technologies on four nursing units in a 1,061 bed tertiary care hospital with 264 TMS channels of telemetry over a 2-year period. Subsequently, the communication technologies were compared in a randomized fashion on a 68-bed progressive cardiac care unit. Caregivers were blinded to the protocol. All alarm responses were recorded during two periods using either pagers or voice communication devices. Alarm response time and closure of the communication loop were analyzed in a blinded fashion. The direct communication functionality of the badge significantly shortened the time to first contact, time to completion, and rate of closure of the communication loop in both the pilot and study phases. Median time to first contact with the communication badge was 0.5  min, compared to 1.6  min with pager communication (p Communication loop closure was achieved in 100% of clinical alarms using the badge versus 19% with the pager (p Communication badge technology reduced alarm time to first contact and completion as well as facilitated communication loop closures. Immediate two-way communication significantly impacted practice, alarm management, and resulted in faster bedside care.

  8. A new diagnosis method using alarm annunciation for FBR power plants

    International Nuclear Information System (INIS)

    Ozaki, Y.; Suda, K.; Yoshikawa, S.; Ozawa, K.

    1997-01-01

    We discuss the methodology diversity for diagnosis reasoning in autonomous operation system, and propose a new diagnosis method using alarm annunciation system. The methodology diversity is assured by preparing plural agents, each of which is based on its own different methodology, therefore, it is expected for the reliability in diagnosis to be improved. Meanwhile, the combination of annunciated alarms is expected to be peculiar to the anomalous phenomenon or accident. Moreover, as the state of affairs is developing, each appearance of the pattern is changing with time peculiarly to each anomaly or accident. The matter is utilized for the new diagnosis method. The patterns of annunciated alarms with progress of the events are prepared in advance under the condition of the anomalies or accidents by use of plant simulatory. The diagnostic reasoning can be done by comparing the obtained combination of annunciated alarms with the reference templates, pattern matching method. On the other hand, we have another method, called as COBWEB used for conceptual classification in cognitive science, to reason for diagnosis. We have carried out the experiments using the loop type LMFBR plant simulator to obtain the various combinations of annunciated alarms with progress of the events under the conditions of anomalies and accidents. The examined cases were related to the anomalies and accidents in the water/steam system of the LMFBR power plant. We have obtained the conclusions that it is effective to reason the causes of anomalies using the annunciated alarms. We are going to apply the pattern matching technique or COBWEB method into the diagnostic reasoning to confirm the performance of the proposed diagnosis method based on the alarm annunciation. (author). 5 refs, 14 figs

  9. Nitric Acid Revamp and Upgrading of the Alarm & Protection Safety System at Petrokemija, Croatia

    Directory of Open Access Journals (Sweden)

    Hoško, I.

    2012-04-01

    Full Text Available Every industrial production, particularly chemical processing, demands special attention in conducting the technological process with regard to the security requirements. For this reason, production processes should be continuously monitored by means of control and alarm safety instrumented systems. In the production of nitric acid at Petrokemija d. d., the original alarm safety system was designed as a combination of an electrical relay safety system and transistorized alarm module system. In order to increase safety requirements and modernize the technological process of nitric acid production, revamping and upgrading of the existing alarm safety system was initiated with a new microprocessor system. The newly derived alarm safety system, Simatic PCS 7, links the function of "classically" distributed control (DCS and logical systems in a common hardware and software platform with integrated engineering tools and operator interface to meet the minimum safety standards with safety integrity level 2 (SIL2 up to level 3 (SIL3, according to IEC 61508 and IEC 61511. This professional paper demonstrates the methodology of upgrading the logic of the alarm safety system in the production of nitric acid in the form of a logical diagram, which was the basis for a further step in its design and construction. Based on the mentioned logical diagram and defined security requirements, the project was implemented in three phases: analysis and testing, installation of the safety equipment and system, and commissioning. Developed also was a verification system of all safety conditions, which could be applied to other facilities for production of nitric acid. With the revamped and upgraded interlock alarm safety system, a new and improved safety boundary in the production of nitric acid was set, which created the foundation for further improvement of the production process in terms of improved analysis.

  10. A new diagnosis method using alarm annunciation for nuclear power plants

    International Nuclear Information System (INIS)

    Ozaki, Yoshihiko; Suda, Kazunori; Ozawa, Kenji

    1997-01-01

    We discuss the methodology diversity for diagnosis reasoning in an autonomous operation system, and propose a new diagnosis method using an alarm annunciation system. The combination of annunciated alarms is expected to be peculiar to the anomalous phenomenon or accident. Moreover, as the state of affairs is developing, each appearance of the pattern is changing with time peculiarly to each anomaly or accident. The matter is utilized for the new diagnosis method. The patterns of annunciated alarms with progress of the events are prepared in advance under the condition of the anomalies or accidents by use of a plant simulator. The diagnostic reasoning can be done by comparing the obtained combination of annunciated alarms with the reference templates by using pattern matching method. On the other hand, we have another method, called COBWEB used for conceptual classification in cognitive science, to reason for diagnosis. We have carried out the experiments using the loop type LMFBR plant simulator to obtain the various combinations of annunciated alarms with progress of the events under the conditions of anomalies and accidents. The examined cases were related to the anomalies and accidents in the water/steam system of the LMFBR power plant. The simulation examination showed that each change of the pattern of annunciated alarms is specific to each anomaly or accident, and we have applied the pattern matching technique and COBWEB methods into the diagnostic reasoning using annunciated alarms. We could show the capability of these two methods to reason and focus among various candidates of causes of anomalies with gradually improved conviction degree as time passes from the occurrence of anomalies. It was also confirmed that these methods are effective in diagnosis reasoning as a way the operators are doing the diagnosis reasoning in existing plants. (author)

  11. Interspecific semantic alarm call recognition in the solitary Sahamalaza sportive lemur, Lepilemur sahamalazensis.

    Directory of Open Access Journals (Sweden)

    Melanie Seiler

    Full Text Available As alarm calls indicate the presence of predators, the correct interpretation of alarm calls, including those of other species, is essential for predator avoidance. Conversely, communication calls of other species might indicate the perceived absence of a predator and hence allow a reduction in vigilance. This "eavesdropping" was demonstrated in birds and mammals, including lemur species. Interspecific communication between taxonomic groups has so far been reported in some reptiles and mammals, including three primate species. So far, neither semantic nor interspecific communication has been tested in a solitary and nocturnal lemur species. The aim of this study was to investigate if the nocturnal and solitary Sahamalaza sportive lemur, Lepilemur sahamalazensis, is able to access semantic information of sympatric species. During the day, this species faces the risk of falling prey to aerial and terrestrial predators and therefore shows high levels of vigilance. We presented alarm calls of the crested coua, the Madagascar magpie-robin and aerial, terrestrial and agitation alarm calls of the blue-eyed black lemur to 19 individual Sahamalaza sportive lemurs resting in tree holes. Songs of both bird species' and contact calls of the blue-eyed black lemur were used as a control. After alarm calls of crested coua, Madagascar magpie-robin and aerial alarm of the blue-eyed black lemur, the lemurs scanned up and their vigilance increased significantly. After presentation of terrestrial alarm and agitation calls of the blue-eyed black lemur, the animals did not show significant changes in scanning direction or in the duration of vigilance. Sportive lemur vigilance decreased after playbacks of songs of the bird species and contact calls of blue-eyed black lemurs. Our results indicate that the Sahamalaza sportive lemur is capable of using information on predator presence as well as predator type of different sympatric species, using their referential

  12. [Repeated poisoning episodes: Alarm sign of risk situations].

    Science.gov (United States)

    García González, Elsa; Trenchs Sainz de la Maza, Victoria; Martínez Sánchez, Lidia; Ferrer Bosch, Nuria; Luaces Cubells, Carles

    2017-11-01

    Prevention is an essential aspect in paediatric poisonings, especially when recurrent episodes are detected. The aims of this article are to detect the recurrence rate for suspected poisoning in emergency consultations, as well as to identify the cases in which specific preventive measures are indicated, and to determine whether the creation of a specific item for recurrent episodes in the computerised medical records system facilitates its detection. A retrospective study was conducted on patients less than 18 years of age treated in the emergency room due to suspected poisoning during 2013 and 2014. Patients were divided according to the presence or absence of previous episodes. From January 2014, a specific item is present in the computerised medical records of the poisoned patient, where the history of previous episodes is registered. The preventive measures used between both groups were compared. A total of 731 consultations were recorded for suspected poisoning. A history of previous episodes was detected in 9% of cases. Medical injury reports and follow-up in outpatient clinics were more often performed in patients with recurrent episodes than in patients without them (28.8% vs 18.0%, P=.034, and 65.2% vs. 18.8%, P<.001, respectively). In 2013, the recurrence rate was 5.9% vs 12% in 2014 (P=.004). The recurrence rate observed is significant. Although preventive measures are more frequently indicated in these patients, their application is low. The creation of a specific item for recurrent episodes in a computerised medical records system facilitates their detection. Copyright © 2016 Asociación Española de Pediatría. Publicado por Elsevier España, S.L.U. All rights reserved.

  13. Analysis of false positive and false negative cytological diagnosis of breast lesions

    International Nuclear Information System (INIS)

    Jamal, Awtif A.; Mansoor, I.

    2001-01-01

    To study the reasons for interpretive errors in false negative and false positive diagnosis of breast carcinoma on fine needle aspiration cytology material. We reviewed only those cases in which cytohistological discrepancies were found, where the cytologic material was abnormal and to some extent misinterpreted or both. There was only one false negative case (false negative fraction 0.32%) proved histologically as ductal carcinoma and four false positive cases (false positive fraction 1.2%); 2 fibroadenoma; 1 fibrocystic disease; and 1 stromal fibrosis. Smears of the two false positive fibroadenoma cases showed very high cellularity, overcrowded clusters and frequent stripped nuclei. The fibrocystic case showed tight clusters of apocrine cells and sheets of loosely aggregated macrophages that were over interpreted. Smears of the false negative ductal carcinoma was hypocellular overall, and the cells showed minimal nuclear pleomorphism. Overcrowded clusters and hypercellular smears should be carefully assessed for uniformity of cells and detailed nuclear and cytomorphological features. If the full-blown malignant cytomorphological changes are not visible, a diagnosis of suspicious or inconclusive should be made and frozen section recommended before surgery. Hypocellularity and relatively nuclear monomorphism are the reasons for failure to diagnose malignant breast lesions. Careful attention should be paid to extreme nuclear monomorphism and absence of naked bipolar cells. A cytologically atypical or suspicious diagnosis together with positive radiological and clinical findings should suggest a diagnosis of malignancy. (author)

  14. Filing false vice reports: Distinguishing true from false allegations of rape

    NARCIS (Netherlands)

    de Zutter, A.; Horselenberg, R.; van Koppen, P.J.

    2017-01-01

    False allegations constitute a problem since they may cause harm. To study the difference between true and false allegations we used a quasi-experimental approach. In the control condition likely true allegations were retrieved from criminal files. The victims, all female, were between the ages of

  15. The acute physiological stress response to an emergency alarm and mobilization during the day and at night.

    Science.gov (United States)

    Hall, Sarah J; Aisbett, Brad; Tait, Jamie L; Turner, Anne I; Ferguson, Sally A; Main, Luana C

    2016-01-01

    The purpose of this study was to investigate the acute physiological stress response to an emergency alarm and mobilization during the day and at night. Sixteen healthy males aged 25 ± 4 years (mean ± SD) spent four consecutive days and nights in a sleep laboratory. This research used a within-participants design with repeated measures for time, alarm condition (alarm or control), and trial (day or night). When an alarm sounded, participants were required to mobilize immediately. Saliva samples for cortisol analysis were collected 0 min, 15 min, 30 min, 45 min, 60 min, 90 min, and 120 min after mobilization, and at corresponding times in control conditions. Heart rate was measured continuously throughout the study. Heart rate was higher in the day (F(20,442) = 9.140, P night (F(23,459) = 8.356, P day alarm and day control conditions. Cortisol was higher (F(6,183) = 2.450, P night alarm and mobilization compared to the night control condition. The magnitude of difference in cortisol between night control and night alarm conditions was greater (F(6,174) = 4.071, P day control and day alarm conditions. The augmented heart rate response to the day and night alarms supports previous observations in field settings. Variations in the cortisol responses between conditions across the day and night may relate to differences in participants' ability to interpret the alarm when sleeping versus when awake.

  16. The nature of alarm communication in Constrictotermes cyphergaster (Blattodea: Termitoidea: Termitidae: the integration of chemical and vibroacoustic signals

    Directory of Open Access Journals (Sweden)

    Paulo F. Cristaldo

    2015-12-01

    Full Text Available Alarm signalling is of paramount importance to communication in all social insects. In termites, vibroacoustic and chemical alarm signalling are bound to operate synergistically but have never been studied simultaneously in a single species. Here, we inspected the functional significance of both communication channels in Constrictotermes cyphergaster (Termitidae: Nasutitermitinae, confirming the hypothesis that these are not exclusive, but rather complementary processes. In natural situations, the alarm predominantly attracts soldiers, which actively search for the source of a disturbance. Laboratory testing revealed that the frontal gland of soldiers produces a rich mixture of terpenoid compounds including an alarm pheromone. Extensive testing led to identification of the alarm pheromone being composed of abundant monoterpene hydrocarbons (1S-α-pinene and myrcene, along with a minor component, (E-β-ocimene. The vibratory alarm signalling consists of vibratory movements evidenced as bursts; a series of beats produced predominantly by soldiers. Exposing termite groups to various mixtures containing the alarm pheromone (crushed soldier heads, frontal gland extracts, mixture of all monoterpenes, and the alarm pheromone mixture made of standards resulted in significantly higher activity in the tested groups and also increased intensity of the vibratory alarm communication, with the responses clearly dose-dependent. Lower doses of the pheromone provoked higher numbers of vibratory signals compared to higher doses. Higher doses induced long-term running of all termites without stops necessary to perform vibratory behaviour. Surprisingly, even crushed worker heads led to low (but significant increases in the alarm responses, suggesting that other unknown compound in the worker's head is perceived and answered by termites. Our results demonstrate the existence of different alarm levels in termites, with lower levels being communicated through

  17. Problems with False Vacua in Supersymmetric Theories

    CERN Document Server

    Bajc, Borut; Senjanovic, Goran

    2011-01-01

    It has been suggested recently that in a consistent theory any Minkowski vacuum must be exactly stable. As a result, a large class of theories that in ordinary treatment would appear sufficiently long-lived, in reality make no sense. In particular, this applies to supersymmetric models in which global supersymmetry is broken in a false vacuum. We show that in any such theory the dynamics of supersymmetry breaking cannot be decoupled from the Planck scale physics. This finding poses an obvious challenge for the idea of low-scale metastable (for example gauge) mediation.

  18. Sleep deprivation increases formation of false memory.

    Science.gov (United States)

    Lo, June C; Chong, Pearlynne L H; Ganesan, Shankari; Leong, Ruth L F; Chee, Michael W L

    2016-12-01

    Retrieving false information can have serious consequences. Sleep is important for memory, but voluntary sleep curtailment is becoming more rampant. Here, the misinformation paradigm was used to investigate false memory formation after 1 night of total sleep deprivation in healthy young adults (N = 58, mean age ± SD = 22.10 ± 1.60 years; 29 males), and 7 nights of partial sleep deprivation (5 h sleep opportunity) in these young adults and healthy adolescents (N = 54, mean age ± SD = 16.67 ± 1.03 years; 25 males). In both age groups, sleep-deprived individuals were more likely than well-rested persons to incorporate misleading post-event information into their responses during memory retrieval (P memory during sleep curtailment, and suggest the need to assess eyewitnesses' sleep history after encountering misleading information. © 2016 The Authors. Journal of Sleep Research published by John Wiley & Sons Ltd on behalf of European Sleep Research Society.

  19. Il nuovo reato di false comunicazioni sociali

    Directory of Open Access Journals (Sweden)

    Lorenzo Maria Corvucci

    2015-12-01

    Full Text Available The author examines the new offence of false social communication introduced by the Italian law dated 27 may 2015 n.69 in force from 14 June 2015. Considering the modifications added to the new offence of false accounting- basically explained to highlight the novum - the attention is paid on a specific major issue, previously discussed by the fifth section of the Italian Supreme Court competent in this matter after a few months from the moment the new law came in force. The questions applies to the fact whether the fraudulent evidence should remain to be punishable as the new discipline has limited the object of the criminal conduct only to “material relevant facts which are untrue” or to the omission of material relevant facts whose communication is imposed by the law regulating the economic situation, the assets and financial position of the company or of the group to which the company belongs. In this way any reference to the evaluations contained in the text previously in force is eliminated. Omissive conduct is the new definition recalling the two previous rules (art. 2621 and 2622 of the Italian civil code.

  20. Age differences in false memory: The importance of retrieval monitoring processes and their modulation by memory quality.

    Science.gov (United States)

    Fandakova, Yana; Sander, Myriam C; Grandy, Thomas H; Cabeza, Roberto; Werkle-Bergner, Markus; Shing, Yee Lee

    2018-02-01

    Older adults are more likely than younger adults to falsely recall past episodes that occurred differently or not at all. We examined whether older adults' propensity for false associative memory is related to declines in postretrieval monitoring processes and their modulation with varying memory representations. Younger (N = 20) and older adults (N = 32) studied and relearned unrelated scene-word pairs, followed by a final cued recall that was used to distribute the pairs for an associative recognition test 24 hours later. This procedure allowed individualized formation of rearranged pairs that were made up of elements of pairs that were correctly recalled in the final cued recall ("high-quality" pairs), and of pairs that were not correctly recalled ("low-quality" pairs). Both age groups falsely recognized more low-quality than high-quality rearranged pairs, with a less pronounced reduction in false alarms to high-quality pairs in older adults. In younger adults, cingulo-opercular activity was enhanced for false alarms and for low-quality correct rejections, consistent with its role in postretrieval monitoring. Older adults did not show such modulated recruitment, suggesting deficits in their selective engagement of monitoring processes given variability in the fidelity of memory representations. There were no age differences in hippocampal activity, which was higher for high-quality than low-quality correct rejections in both age groups. These results demonstrate that the engagement of cingulo-opercular monitoring mechanisms varies with memory representation quality and contributes to age-related deficits in false associative memory. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  1. False memory for face in short-term memory and neural activity in human amygdala.

    Science.gov (United States)

    Iidaka, Tetsuya; Harada, Tokiko; Sadato, Norihiro

    2014-12-03

    Human memory is often inaccurate. Similar to words and figures, new faces are often recognized as seen or studied items in long- and short-term memory tests; however, the neural mechanisms underlying this false memory remain elusive. In a previous fMRI study using morphed faces and a standard false memory paradigm, we found that there was a U-shaped response curve of the amygdala to old, new, and lure items. This indicates that the amygdala is more active in response to items that are salient (hit and correct rejection) compared to items that are less salient (false alarm), in terms of memory retrieval. In the present fMRI study, we determined whether the false memory for faces occurs within the short-term memory range (a few seconds), and assessed which neural correlates are involved in veridical and illusory memories. Nineteen healthy participants were scanned by 3T MRI during a short-term memory task using morphed faces. The behavioral results indicated that the occurrence of false memories was within the short-term range. We found that the amygdala displayed a U-shaped response curve to memory items, similar to those observed in our previous study. These results suggest that the amygdala plays a common role in both long- and short-term false memory for faces. We made the following conclusions: First, the amygdala is involved in detecting the saliency of items, in addition to fear, and supports goal-oriented behavior by modulating memory. Second, amygdala activity and response time might be related with a subject's response criterion for similar faces. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Monitoring techniques and alarm procedures for CMS services and sites in WLCG

    Energy Technology Data Exchange (ETDEWEB)

    Molina-Perez, J. [UC, San Diego; Bonacorsi, D. [Bologna U.; Gutsche, O. [Fermilab; Sciaba, A. [CERN; Flix, J. [Madrid, CIEMAT; Kreuzer, P. [CERN; Fajardo, E. [Andes U., Bogota; Boccali, T. [INFN, Pisa; Klute, M. [MIT; Gomes, D. [Rio de Janeiro State U.; Kaselis, R. [Vilnius U.; Du, R. [Beijing, Inst. High Energy Phys.; Magini, N. [CERN; Butenas, I. [Vilnius U.; Wang, W. [Beijing, Inst. High Energy Phys.

    2012-01-01

    The CMS offline computing system is composed of roughly 80 sites (including most experienced T3s) and a number of central services to distribute, process and analyze data worldwide. A high level of stability and reliability is required from the underlying infrastructure and services, partially covered by local or automated monitoring and alarming systems such as Lemon and SLS, the former collects metrics from sensors installed on computing nodes and triggers alarms when values are out of range, the latter measures the quality of service and warns managers when service is affected. CMS has established computing shift procedures with personnel operating worldwide from remote Computing Centers, under the supervision of the Computing Run Coordinator at CERN. This dedicated 24/7 computing shift personnel is contributing to detect and react timely on any unexpected error and hence ensure that CMS workflows are carried out efficiently and in a sustained manner. Synergy among all the involved actors is exploited to ensure the 24/7 monitoring, alarming and troubleshooting of the CMS computing sites and services. We review the deployment of the monitoring and alarming procedures, and report on the experience gained throughout the first two years of LHC operation. We describe the efficiency of the communication tools employed, the coherent monitoring framework, the proactive alarming systems and the proficient troubleshooting procedures that helped the CMS Computing facilities and infrastructure to operate at high reliability levels.

  3. Monitoring techniques and alarm procedures for CMS Services and Sites in WLCG

    International Nuclear Information System (INIS)

    Molina-Perez, J; Sciabà, A; Magini, N; Bonacorsi, D; Gutsche, O; Flix, J; Kreuzer, P; Fajardo, E; Boccali, T; Klute, M; Gomes, D; Kaselis, R; Butenas, I; Du, R; Wang, W

    2012-01-01

    The CMS offline computing system is composed of roughly 80 sites (including most experienced T3s) and a number of central services to distribute, process and analyze data worldwide. A high level of stability and reliability is required from the underlying infrastructure and services, partially covered by local or automated monitoring and alarming systems such as Lemon and SLS; the former collects metrics from sensors installed on computing nodes and triggers alarms when values are out of range, the latter measures the quality of service and warns managers when service is affected. CMS has established computing shift procedures with personnel operating worldwide from remote Computing Centers, under the supervision of the Computing Run Coordinator at CERN. This dedicated 24/7 computing shift personnel is contributing to detect and react timely on any unexpected error and hence ensure that CMS workflows are carried out efficiently and in a sustained manner. Synergy among all the involved actors is exploited to ensure the 24/7 monitoring, alarming and troubleshooting of the CMS computing sites and services. We review the deployment of the monitoring and alarming procedures, and report on the experience gained throughout the first two years of LHC operation. We describe the efficiency of the communication tools employed, the coherent monitoring framework, the proactive alarming systems and the proficient troubleshooting procedures that helped the CMS Computing facilities and infrastructure to operate at high reliability levels.

  4. Development of alarm logics for critical function monitoring in SMART-P reactor

    Energy Technology Data Exchange (ETDEWEB)

    Seong, Seung Hwan; Hur, Seop; Seo, Jae Kwang; Lee, Tae Ho; Park, Cheon Tae; Kang, Han Ok

    2003-04-01

    The alarm logics for the critical functions of SMART-P reactor are developed, which are based on the those of Korean Standard Nuclear power Plant(KSNP). The SMART-P reactor is an integral typed nuclear power plant and has the some different design features compared to those of KSNP. It, however, has the similar features in critical functions because it is a kind of pressurized water reactor. The alarm logics for Critical Function Monitoring System(CFMS) in SMART-P are developed from those for CFMS in KSNP. The alarm logics of CFMS in only the primary loop are, therefore, developed, though the general CFMS covered the status of primary and secondary loop including the features of the containment. The specific setpoint of related variables related to the alarm logics will be developed after the specific designs of SMART-P are finished. In appendix, we describe the conceptual architecture and variables of display screens on CFMS according to the developed alarm logics.

  5. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  6. Levels of alarm thresholds of meningitis outbreaks in Hamadan Province, west of Iran.

    Science.gov (United States)

    Faryadres, Mohammad; Karami, Manoochehr; Moghimbeigi, Abbas; Esmailnasab, Nader; Pazhouhi, Khabat

    2015-01-01

    Few studies have focused on syndromic data to determine levels of alarm thresholds to detection of meningitis outbreaks. The purpose of this study was to determine threshold levels of meningitis outbreak in Hamadan Province, west of Iran. Data on both confirmed and suspected cases of meningitis (fever and neurological symptom) form 21 March 2010 to 20 March 2012 were used in Hamadan Province, Iran. Alarm threshold levels of meningitis outbreak were determined using four different methods including absolute values or standard method, relative increase, statistical cutoff points and upper control limit of exponentially weighted moving average (EWMA) algorithm. Among 723 reported cases, 41 were diagnosed to have meningitis. Standard level of alarm thresholds for meningitis outbreak was determined as incidence of 5/100000 persons. Increasing 1.5 to two times in reported cases of suspected meningitis per week was known as the threshold levels according to relative increase method. An occurrence four cases of suspected meningitis per week that equals to 90th percentile was chosen as alarm thresholds by statistical cut off point method. The corresponding value according to EWMA algorithm was 2.57 i.e. three cases. Policy makers and staff of syndromic surveillance systems are highly recommended to apply the above different methods to determine the levels of alarm threshold.

  7. Benefit of an electronic medical record-based alarm in the optimization of stress ulcer prophylaxis.

    Science.gov (United States)

    Saad, Emanuel José; Bedini, Marianela; Becerra, Ana Florencia; Martini, Gustavo Daniel; Gonzalez, Jacqueline Griselda; Bolomo, Andrea; Castellani, Luciana; Quiroga, Silvana; Morales, Cristian; Leathers, James; Balderramo, Domingo; Albertini, Ricardo Arturo

    2018-06-09

    The use of stress ulcer prophylaxis (SUP) has risen in recent years, even in patients without a clear indication for therapy. To evaluate the efficacy of an electronic medical record (EMR)-based alarm to improve appropriate SUP use in hospitalized patients. We conducted an uncontrolled before-after study comparing SUP prescription in intensive care unit (ICU) patients and non-ICU patients, before and after the implementation of an EMR-based alarm that provided the correct indications for SUP. 1627 patients in the pre-intervention and 1513 patients in the post-intervention cohorts were included. The EMR-based alarm improved appropriate (49.6% vs. 66.6%, p<0.001) and reduced inappropriate SUP use (50.4% vs. 33.3%, p<0.001) in ICU patients only. These differences were related to the optimization of SUP in low risk patients. There was no difference in overt gastrointestinal bleeding between the two cohorts. Unjustified costs related to SUP were reduced by a third after EMR-based alarm use. The use of an EMR-based alarm improved appropriate and reduced inappropriate use of SUP in ICU patients. This benefit was limited to optimization in low risk patients and associated with a decrease in SUP costs. Copyright © 2018 Elsevier España, S.L.U. All rights reserved.

  8. "Alarm-corrected" ergonomic armrest use could improve learning curves of novices on robotic simulator.

    Science.gov (United States)

    Yang, Kun; Perez, Manuela; Hossu, Gabriela; Hubert, Nicolas; Perrenot, Cyril; Hubert, Jacques

    2017-01-01

    In robotic surgery, the professional ergonomic habit of using an armrest reduces operator fatigue and increases the precision of motion. We designed and validated a pressure surveillance system (PSS) based on force sensors to investigate armrest use. The objective was to evaluate whether adding an alarm to the PSS system could shorten ergonomic training and improve performance. Twenty robot and simulator-naïve participants were recruited and randomized in two groups (A and B). The PSS was installed on a robotic simulator, the dV-Trainer, to detect contact with the armrest. The Group A members completed three tasks on the dV-Trainer without the alarm, making 15 attempts at each task. The Group B members practiced the first two tasks with the alarm and then completed the final tasks without the alarm. The simulator provided an overall score reflecting the trainees' performance. We used the new concept of an "armrest load" score to describe the ergonomic habit of using the armrest. Group B had a significantly higher performance score (p ergonomic errors and accelerated professional ergonomic habit acquisition. The combination of the PSS and alarm is effective in significantly shortening the learning curve in the robotic training process.

  9. Advances in software development for intelligent interfaces for alarm and emergency management consoles

    International Nuclear Information System (INIS)

    Moseley, M.R.; Olson, C.E.

    1986-01-01

    Recent advances in technology allow features like voice synthesis, voice and speech recognition, image understanding, and intelligent data base management to be incorporated in computer driven alarm and emergency management information systems. New software development environments make it possible to do rapid prototyping of custom applications. Three examples using these technologies are discussed. (1) Maximum use is made of high-speed graphics and voice synthesis to implement a state-of-the-art alarm processing and display system with features that make the operator-machine interface efficient and accurate. Although very functional, this system is not portable or flexible; the software would have to be substantially rewritten for other applications. (2) An application generator which has the capability of ''building'' a specific alarm processing and display application in a matter of a few hours, using the site definition developed in the security planning phase to produce the custom application. This package is based on a standardized choice of hardware, within which it is capable of building a system to order, automatically constructing graphics, data tables, alarm prioritization rules, and interfaces to peripherals. (3) A software tool, the User Interface Management System (UIMS), is described which permits rapid prototyping of human-machine interfaces for a variety of applications including emergency management, alarm display and process information display. The object-oriented software of the UIMS achieves rapid prototyping of a new interface by standardizing to a class library of software objects instead of hardware objects

  10. The problem of false positives and false negatives in violent video game experiments.

    Science.gov (United States)

    Ferguson, Christopher J

    The problem of false positives and negatives has received considerable attention in behavioral research in recent years. The current paper uses video game violence research as an example of how such issues may develop in a field. Despite decades of research, evidence on whether violent video games (VVGs) contribute to aggression in players has remained mixed. Concerns have been raised in recent years that experiments regarding VVGs may suffer from both "false positives" and "false negatives." The current paper examines this issue in three sets of video game experiments, two sets of video game experiments on aggression and prosocial behaviors identified in meta-analysis, and a third group of recent null studies. Results indicated that studies of VVGs and aggression appear to be particularly prone to false positive results. Studies of VVGs and prosocial behavior, by contrast are heterogeneous and did not demonstrate any indication of false positive results. However, their heterogeneous nature made it difficult to base solid conclusions on them. By contrast, evidence for false negatives in null studies was limited, and little evidence emerged that null studies lacked power in comparison those highlighted in past meta-analyses as evidence for effects. These results are considered in light of issues related to false positives and negatives in behavioral science more broadly. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Psychoactive drugs and false memory: comparison of dextroamphetamine and delta-9-tetrahydrocannabinol on false recognition

    Science.gov (United States)

    Ballard, Michael E.; Gallo, David A.; de Wit, Harriet

    2014-01-01

    Rationale Several psychoactive drugs are known to influence episodic memory. However, these drugs’ effects on false memory, or the tendency to incorrectly remember nonstudied information, remain poorly understood. Objectives Here, we examined the effects of two commonly used psychoactive drugs, one with memory-enhancing properties (dextroamphetamine; AMP), and another with memory-impairing properties (Δ9-tetrahydrocannabinol; THC), on false memory using the Deese/Roediger–McDermott (DRM) illusion. Methods Two parallel studies were conducted in which healthy volunteers received either AMP (0, 10, and 20 mg) or THC (0, 7.5, and 15 mg) in within-subjects, randomized, double-blind designs. Participants studied DRM word lists under the influence of the drugs, and their recognition memory for the studied words was tested 2 days later, under sober conditions. Results As expected, AMP increased memory of studied words relative to placebo, and THC reduced memory of studied words. Although neither drug significantly affected false memory relative to placebo, AMP increased false memory relative to THC. Across participants, both drugs’ effects on true memory were positively correlated with their effects on false memory. Conclusions Our results indicate that AMP and THC have opposing effects on true memory, and these effects appear to correspond to similar, albeit more subtle, effects on false memory. These findings are consistent with previous research using the DRM illusion and provide further evidence that psychoactive drugs can affect the encoding processes that ultimately result in the creation of false memories. PMID:21647577

  12. Psychoactive drugs and false memory: comparison of dextroamphetamine and δ-9-tetrahydrocannabinol on false recognition.

    Science.gov (United States)

    Ballard, Michael E; Gallo, David A; de Wit, Harriet

    2012-01-01

    Several psychoactive drugs are known to influence episodic memory. However, these drugs' effects on false memory, or the tendency to incorrectly remember nonstudied information, remain poorly understood. Here, we examined the effects of two commonly used psychoactive drugs, one with memory-enhancing properties (dextroamphetamine; AMP), and another with memory-impairing properties (Δ(9)-tetrahydrocannabinol; THC), on false memory using the Deese/Roediger-McDermott (DRM) illusion. Two parallel studies were conducted in which healthy volunteers received either AMP (0, 10, and 20 mg) or THC (0, 7.5, and 15 mg) in within-subjects, randomized, double-blind designs. Participants studied DRM word lists under the influence of the drugs, and their recognition memory for the studied words was tested 2 days later, under sober conditions. As expected, AMP increased memory of studied words relative to placebo, and THC reduced memory of studied words. Although neither drug significantly affected false memory relative to placebo, AMP increased false memory relative to THC. Across participants, both drugs' effects on true memory were positively correlated with their effects on false memory. Our results indicate that AMP and THC have opposing effects on true memory, and these effects appear to correspond to similar, albeit more subtle, effects on false memory. These findings are consistent with previous research using the DRM illusion and provide further evidence that psychoactive drugs can affect the encoding processes that ultimately result in the creation of false memories.

  13. When are false-positive and false-negative 18F'FDG PET scans really false?

    International Nuclear Information System (INIS)

    Binns, D.S.; Hicks, R.J.; Fawcett, M.E.

    1999-01-01

    Full text: A 61-year-old male presented with locally advanced squamous cell carcinoma of the base of tongue. In the absence of wider metastatic disease on conventional staging, he was enrolled in a phase I, dose escalation chemoradiotherapy trial. In this study, therapeutic response to radiotherapy combined with cisplatin and a chemotherapeutic agent which specifically targets hypoxic cells (tirapazamine) was evaluated with serial 18 F-FDG PET scans. Baseline 18 F-FDG PET confirmed locally advanced disease, although a previously undetected lower cervical lymph node was identified and included in the radiotherapy portal. Whole-body PET revealed a small metabolically active area adjacent to the right hemidiaphragm. Respiratory gated, high-resolution helical CT failed to find structural evidence of disease and, as a result, the patient was enrolled in the 7 week therapy regime on the assumption that the PET finding was a false-positive result. Repeat 18 F-FDG PET scans at the middle, end and 12 weeks post-treatment showed excellent therapeutic response in the head and neck which was discordant with clinical and CT findings, and resolution of the metabolically active chest lesion. Despite the negative PET scan, persistent clinical and CT evidence of a residual tumour mass suggested a false-negative result and resulted in a neck lymph node dissection. This showed no evidence of malignant cells. Five months following treatment, the patient presented with pleural effusion at the base on the right lung. Subsequent CT scanning showed a small pleural lesion at the site of initial 18 F-FDG uptake. Biopsy confirmed metastatic disease. The apparent transient resolution of 18 F-FDG uptake in the pleural lesion with treatment presumably reflected a combination of reduced metabolic activity and size due to the partial, but not complete, cytotoxic effects of cisplatin. In conclusion, this case emphasizes the importance of pathological review and clinical follow-up in reconciling

  14. Improvement and test of alarm cause tracking system for Kori nuclear power plant units 3 and 4

    International Nuclear Information System (INIS)

    Lee, Jung Woon; Park, Jae Chang; Lee, Jung Woon; Kim, Jung Taek; Lyu, Sung Pil; Kim, Eun Ju; Park, Joong Pal

    2003-05-01

    The proposed system, ACTS(Alarm Cause Tracking System), in the 1st development period(2002. 7 ∼ 2003. 6), tracks and displays the causes of alarms on-line from computerized logic diagrams. And the system highlights the specific procedures related the causes in the procedure of the alarm. But, some problems were found in ACTS on editing logic diagram and logic processing in realtime for 2000 logic diagrams. In 2nd development period, we improved the data structure of graphic information for logic diagram and changed function oriented programming to object oriented programming for logic elements. Also, the display of precedent alarms which introduce many following alarms is provided to avoid confusion from the followed nuisance alarms. And logic input signal generator was developed to test the ACTS which generates input signal in time sequence of events acquired from simulator or real plant

  15. Testing jumps via false discovery rate control.

    Science.gov (United States)

    Yen, Yu-Min

    2013-01-01

    Many recently developed nonparametric jump tests can be viewed as multiple hypothesis testing problems. For such multiple hypothesis tests, it is well known that controlling type I error often makes a large proportion of erroneous rejections, and such situation becomes even worse when the jump occurrence is a rare event. To obtain more reliable results, we aim to control the false discovery rate (FDR), an efficient compound error measure for erroneous rejections in multiple testing problems. We perform the test via the Barndorff-Nielsen and Shephard (BNS) test statistic, and control the FDR with the Benjamini and Hochberg (BH) procedure. We provide asymptotic results for the FDR control. From simulations, we examine relevant theoretical results and demonstrate the advantages of controlling the FDR. The hybrid approach is then applied to empirical analysis on two benchmark stock indices with high frequency data.

  16. Testing jumps via false discovery rate control.

    Directory of Open Access Journals (Sweden)

    Yu-Min Yen

    Full Text Available Many recently developed nonparametric jump tests can be viewed as multiple hypothesis testing problems. For such multiple hypothesis tests, it is well known that controlling type I error often makes a large proportion of erroneous rejections, and such situation becomes even worse when the jump occurrence is a rare event. To obtain more reliable results, we aim to control the false discovery rate (FDR, an efficient compound error measure for erroneous rejections in multiple testing problems. We perform the test via the Barndorff-Nielsen and Shephard (BNS test statistic, and control the FDR with the Benjamini and Hochberg (BH procedure. We provide asymptotic results for the FDR control. From simulations, we examine relevant theoretical results and demonstrate the advantages of controlling the FDR. The hybrid approach is then applied to empirical analysis on two benchmark stock indices with high frequency data.

  17. True or False Customer Engagement Behaviour

    DEFF Research Database (Denmark)

    Haurum, Helle; Beckmann, Suzanne C.

    2014-01-01

    Customers’ engagement behaviours are considered an important source of value to the company. So far, the discussion has mainly been conceptual and focused on the company’s perspective. By adopting the customer’s perspective we investigated how customers perceive their service relationship...... encounters with a company, using in-depth interviews. We found the following key factors driving and explaining customers’ engagement behaviours: (1) transactions matter and inconsistent engagement behaviours are a reality, (2) mundane products and services are still highly relevant for customers, and (3......) different degrees of customer experience alignment with services and products exist. Moreover, the distinction between true and false engagement behaviours we suggest indeed is relevant and we could establish their mediating capabilities....

  18. False positive acetaminophen concentrations in icteric serum

    Directory of Open Access Journals (Sweden)

    L. de Jong

    2016-04-01

    Full Text Available Introduction: Serum concentrations of acetaminophen are measured to predict the risk of hepatotoxicity in cases of acetaminophen overdose and to identify acetaminophen use in patients with acute liver injury without a known cause. The acetaminophen concentration determines if treatment with N-acetyl cysteine, the antidote for acetaminophen poisoning, is warranted. Description: A 49-year-old woman was admitted to our hospital with a hepatic encephalopathy and a total serum bilirubin concentration of 442 µmol/l. The acetaminophen concentration of 11.5 mg/l was measured with an enzymatic-colorimetric assay, thus treatment with N-acetyl cysteine was started. Interestingly, the acetaminophen concentration remained unchanged (11.5–12.3 mg/l during a period of 4 consecutive days. In contrast, the acetaminophen concentration measured by HPLC, a chromatographic technique, remained undetectable Discussion: In the presented case, elevated bilirubin was the most likely candidate to interfere with acetaminophen assay causing false positive results. Bilirubin has intense absorbance in the ultraviolet and visible regions of the electromagnetic spectrum and for that reason it causes interference in an enzymatic-colorimetric assay. Conclusion: False positive acetaminophen laboratory test results may be found in icteric serum, when enzymatic-colorimetric assays are used for determination of an acetaminophen concentration. Questionable acetaminophen results in icteric serum should be confirmed by a non-enzymatic method, by means of ultrafiltration of the serum, or by dilution studies. Keywords: Acetaminophen, Enzymatic-colorimetric assays, HPLC, Bilirubin, Interference, Paracetamol, Liver failure, Jaundice

  19. Coincidence of scintigraphic false positive and false negative findings in parathyroid and thyroid adenomas (case report)

    Energy Technology Data Exchange (ETDEWEB)

    Mana, O.; Zatta, G.; Boccolari, S.; Barbesti, S.; Tarolo, G.L.

    1987-04-01

    The subtractive double tracer scintigraphy with /sup 201/Tl and /sup 99m/Tc is a useful technique in studying parathyroid nodules; nevertheless, this method can give misleading informations especially in presence of thyroid nodules with false positive and false negative findings. In this case report the technique was applied in studying a patient with three nodules (two thyroid adenomas and one parathyroid adenoma), where both scintigraphic and echographic methods provided misleading informations. The selective uptake of /sup 201/Tl in the upper region of the right thyroid lobe gave a false positive finding, while the increased uptake of /sup 99m/Tc in a hyperfunctioning thyroid adenoma of left lobe masked the parathyroid adenoma laying below, giving a false negative finding.

  20. Hemispheric asymmetries in discourse processing: evidence from false memories for lists and texts.

    Science.gov (United States)

    Ben-Artzi, Elisheva; Faust, Miriam; Moeller, Edna

    2009-01-01

    Previous research suggests that the right hemisphere (RH) may contribute uniquely to discourse and text processing by activating and maintaining a wide range of meanings, including more distantly related meanings. The present study used the word-lists false memory paradigm [Roediger, H. L., III, & McDermott, K. B. (1995). Creating false memories: Remembering words not presented in lists. Journal of Experimental Psychology: Learning, Memory, and Cognition, 21, 803-814.] to examine the hypothesis that difference between the two cerebral hemispheres in discourse processing may be due, at least partly, to memory representations for implicit text-related semantic information. Specifically, we tested the susceptibility of the left hemisphere (LH) and RH to unpresented target words following the presentation of semantically related words appearing in either word lists or short texts. Findings showed that the RH produced more false alarms than the LH for unpresented target words following either word lists or texts. These findings reveal hemispheric differences in memory for semantically related information and suggest that RH advantage in long-term maintenance of a wide range of text-related word meanings may be one aspect of its unique contribution to the construction of a discourse model. The results support the RH coarse semantic coding theory [Beeman, M. (1998). Coarse semantic coding and discourse comprehension. In M. Beeman & C. Chiarello (Eds.), Right hemisphere language comprehension: Perspectives from cognitive neuroscience (pp. 255-284). Mahwah, NJ: Erlbaum.] and suggest that hemispheric differences in semantic processing during language comprehension extend also to verbal memory.