Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

9154 results about "False alarm" patented technology

A false alarm, also called a nuisance alarm, is the deceptive or erroneous report of an emergency, causing unnecessary panic and/or bringing resources (such as emergency services) to a place where they are not needed. False alarms may occur with residential burglary alarms, smoke detectors, industrial alarms, and in signal detection theory. False alarms have the potential to divert emergency responders away from legitimate emergencies, which could ultimately lead to loss of life. In some cases, repeated false alarms in a certain area may cause occupants to develop alarm fatigue and to start ignoring most alarms, knowing that each time it will probably be false.

Method and apparatus for remotely monitoring a site

The present invention is directed to providing systems and methods for remotely monitoring sites to provide real-time information which can readily permit distinguishing false alarms, and which can identify and track the precise location of an alarm. In embodiments, monitoring capabilities such as intrusion / fire detection and tracking capabilities, can be implemented through the use of multistate indicators in an interface which permits information to be transmitted using standard network protocols from a remote site to a monitoring station in near real-time. In embodiments, communications can be handed from the centrally located host monitoring station to a mobile monitoring station (for example, a laptop computer in a responding vehicle, such as a police or fire vehicle). Additional embodiments include the measurement of environmental parameters such as temperature, carbon monoxide and differential air pressure to detect, monitor and manage a fire event. These measurements along with selected controllable output devices deployed in a space, such as sprinkler control valves and individually or zoned sprinkler heads, are used to initiate and control fire suppression technology both locally and remotely. For instance, a system of the present invention may detect a fire and cause a sprinkler system to disburse water in a facility.
Owner:NETTALON SECURITY SYST

Method and apparatus for remotely monitoring a site

The present invention is directed to providing systems and methods for remotely monitoring sites to provide real time information which can readily permit false alarms to be distinguished, and which can identify and track the precise location of an alarm. In exemplary embodiments, monitoring capabilities such as intrusion/fire detection and tracking capabilities, can be implemented through the use of multistate indicators in a novel interface which permits information to be transmitted using standard network protocols from a remote site to a monitoring station in real-time over preexisting communication networks, such as the Internet. A wireless network can also be established using browser encapsulated communication programs (for example, active X control, Java applets, and so forth) to transmit data packets which comply with any standard wireless local area network protocol. Communications can thereby be established between a web server embedded in a centrally located host monitoring station and a separate security panel deployed in each of the buildings to be remotely monitored. In exemplary embodiments, communications can be handed off from the centrally located host monitoring station to a mobile monitoring station (for example, to a laptop computer in a responding vehicle, such as a police or fire vehicle). The handoff can be such that direct communications are established between a security panel site being monitored and the laptop, or over, for example, a cellular network or indirect communications can be established via the host monitoring station.
Owner:NETTALON SECURITY SYST

X-ray inspection system for detecting explosives and other contraband

InactiveUS7092485B2Rapidly and accurately discriminates among different substancesQuick checkUsing wave/particle radiation meansMaterial analysis by transmitting radiationX-rayExplosive material
A baggage scanning system and method employ combined angular and energy dispersive x-ray scanning to detect the presence of a contraband substance within an interrogation volume of a baggage item. The interrogation volume is illuminated with penetrating, polychromatic x-rays in a primary fan beam from a source such as a tungsten-anode x-ray tube. An energy-dependent absorption correction is determined from measurement of the attenuation of the fan beam at a plurality of different energies. Radiation coherently scattered by substances in the interrogation volume is detected by an energy-resolved x-ray detector operated at a plurality of scattering angles to form a plurality of scattering spectra. Each scattering spectrum is corrected for energy-dependent absorption and the corrected spectra are combined to produce a scattering pattern. The experimental scattering pattern is compared with reference patterns that uniquely characterize known contraband substances. The system and method can locate and identify a wide variety of contraband substances in an accurate, reliable manner. The system provides for automated screening, with the result that vagaries of human performance are virtually eliminated. False alarms and the need for hand inspection are reduced and detection efficacy is increased.
Owner:CONTROL SCREENING

Method and apparatus for remotely monitoring a site

The present invention is directed to providing systems and methods for remotely monitoring sites to provide real-time information which can readily permit distinguishing false alarms, and which can identify and track the precise location of an alarm. In embodiments, monitoring capabilities such as intrusion / fire detection and tracking capabilities, can be implemented through the use of multistate indicators in an interface which permits information to be transmitted using standard network protocols from a remote site to a monitoring station in near real-time. In embodiments, communications can be handed from the centrally located host monitoring station to a mobile monitoring station (for example, a laptop computer in a responding vehicle, such as a police or fire vehicle). Additional embodiments include the measurement of environmental parameters such as temperature, carbon monoxide and differential air pressure to detect, monitor and manage a fire event. These measurements along with selected controllable output devices deployed in a space, such as sprinkler control valves and individually or zoned sprinkler heads, are used to initiate and control fire suppression technology both locally and remotely. For instance, a system of the present invention may detect a fire and cause a sprinkler system to disburse water in a facility.
Owner:NETTALON SECURITY SYST

Method for preventing evacuation of plunger pump based on monitoring of output pressure

The invention relates to the technical field of monitoring of plunger pumps, in particular to a method for preventing evacuation of a plunger pump based on monitoring of the output pressure. The method relates to the plunger and an output pipeline, and is characterized in that a pressure data acquisition control device is arranged on the outlet pipeline; and a data processing method comprises the following steps that (1) the average value P0 of the output pressure is obtained, specifically, the output pressure setting tolerance delta P is set, the domain above a P0+delta P line is called a peak domain, and the domain below a P0-delta P line is called a valley domain; a peak domain counter A and a valley domain counter B are set correspondingly; the allowable difference value between the peak domain counter A and the valley domain counter B is the numerical value C; and an out-of-tolerance time counter D and an upper limit E are set; (2) pressure data Px is acquired; (3) abnormal data are removed; (4) the number of times of Px falling into the peak domain and the valley domain is calculated; and (5) whether the out-of-tolerance time D of the difference value between the peak domain counter A and the valley domain counter B exceeds a preset value E or not is judged, and if yes, an evacuation alarm is given out. Compared with a detection method in the prior art, the method is accurate and reliable, and false alarms are avoided.
Owner:JEREH OIL & GAS ENG

A method for preventing plunger pump from pumping out based on monitoring output pressure

The invention relates to the technical field of monitoring of plunger pumps, in particular to a method for preventing evacuation of a plunger pump based on monitoring of the output pressure. The method relates to the plunger and an output pipeline, and is characterized in that a pressure data acquisition control device is arranged on the outlet pipeline; and a data processing method comprises the following steps that (1) the average value P0 of the output pressure is obtained, specifically, the output pressure setting tolerance delta P is set, the domain above a P0+delta P line is called a peak domain, and the domain below a P0-delta P line is called a valley domain; a peak domain counter A and a valley domain counter B are set correspondingly; the allowable difference value between the peak domain counter A and the valley domain counter B is the numerical value C; and an out-of-tolerance time counter D and an upper limit E are set; (2) pressure data Px is acquired; (3) abnormal data are removed; (4) the number of times of Px falling into the peak domain and the valley domain is calculated; and (5) whether the out-of-tolerance time D of the difference value between the peak domain counter A and the valley domain counter B exceeds a preset value E or not is judged, and if yes, an evacuation alarm is given out. Compared with a detection method in the prior art, the method is accurate and reliable, and false alarms are avoided.
Owner:JEREH OIL & GAS ENG

Automatic vulnerability validation method

The invention provides an automatic vulnerability validation method. The method comprises the steps that firstly, validation information is collected, wherein an active detection way is adopted for carrying out information detection, topological detection, vulnerability detection and website directory structure detection on a target; secondly, the validation information is packaged, wherein suspicious vulnerability key information in vulnerability detection results is extracted, uniform-interface modularized packaging is carried out on the data; thirdly, a validation strategy is searched for, wherein according to the suspicious vulnerability identity and variety information, an appropriate attack script template and a vulnerability utilizing tool are selected; vulnerability validation is carried out, wherein scripts are called to be loaded into the packaged vulnerability information to carry out validation attack, and an utilization voucher is obtained and stored; fifthly, validation traces are removed, wherein validation attack traces are removed, sessions are recycled; finally, a scanning report is generated. The automatic vulnerability validation method solves the problem that an existing vulnerability scanning system is high in false alarm rate and cannot carry out effective validation, is automatic and procedural, can automatically recognize and validate vulnerabilities, lowers the requirement for the ability of non-professional staff and improves the vulnerability validation efficiency.
Owner:XIAN UNIV OF POSTS & TELECOMM +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products