• Nenhum resultado encontrado

Top PDF AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)

AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)

AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)

... OpenCV enables us to teach the machine using its machine learning algorithms to distinguish between various user use cases and unauthorized perpetrators’ unusual unwanted activity in order to take appropriate action as ...

13

MMS Based Car Security System

MMS Based Car Security System

... car theft attempts, locally and internationally ...car security systems that had been produced lately, but the result is still disappointing as the number of car theft cases still ...powerful ...

4

An Authentication Middleware for Prevention of Information Theft

An Authentication Middleware for Prevention of Information Theft

... middleware system which provides strong safeguard for protecting personal and corporate data from susceptible ...AMPIT system is highly sensible for logging user activities; it has local activity logging ...

9

Automatic Door Access System Using Face Recognition

Automatic Door Access System Using Face Recognition

... keys, security cards, password or pattern to open the ...door security of sensitive locations by using face detection and ...and automatic door access ...door security system than other ...

6

PLC Based Automatic Multistoried Car Parking System

PLC Based Automatic Multistoried Car Parking System

... based Automatic Multistoried Car Parking ...highest security and greatest flexibility. Due to these advantages, this system can be used in hotels, railway stations, airports where crowding of car is ...

5

Safety and Security System for House Boats

Safety and Security System for House Boats

... comprehensive automatic system, for the safety of house boat as well as security of tourists, is not yet even been ...Fully automatic systems are available for ships, especially for their ...

9

Security Management System for 4G Heterogeneous Networks

Security Management System for 4G Heterogeneous Networks

... technology. Security issues in mobile computing are now presenting significant ...of security architectures for 4G ...Major security challenges in 4G heterogeneous networks are inherent in current ...

5

A new Fiscal and Social Security System

A new Fiscal and Social Security System

... social security individual contribution to individual social account and make the calculations of the relation with seller, because the seller could have the right to be reimbursed 31 (for a description of how the ...

65

Intrusion Detection System: Security Monitoring System

Intrusion Detection System: Security Monitoring System

... detection system (IDS) is an ad hoc security solution to protectflawed computer ...other security mechanisms such as authenticationmechanisms and ...computer system, analyse these data to find ...

5

SECURITY BREACH IN TRADING SYSTEM-COUNTERMEASURE USING IPTRACEBACK

SECURITY BREACH IN TRADING SYSTEM-COUNTERMEASURE USING IPTRACEBACK

... and theft of ...identified security breached firms suffer losses of 1-percentage to 5 percentage in the days immediately following a cyber attack, magnitudes the shareholder losses of 50 million dollar to ...

7

Coal Mines Security System

Coal Mines Security System

... as automatic detection Technology, communication technology and microcomputer technology, to realize the operational parameter intelligent monitored management of entire mining area, this system occupies ...

5

Automatic coverage based neighbour estimation system: a cloud-based implementation

Automatic coverage based neighbour estimation system: a cloud-based implementation

... A proposal of an automated NCL optimisation method to replace manual methods was made by Nguyen and Claussen [1]; its main concern was about the extra system overhead from iterating over excessively long NCLs, ...

12

Path Planning for Automatic Recharging System for Steep-Slope Vineyard Robots

Path Planning for Automatic Recharging System for Steep-Slope Vineyard Robots

... The strategic European research agenda for robotics [1] states that robots can improve agriculture efficiency and competitiveness. However, few commercial robots for agricultural applications are available [2]. In Europe ...

12

The Inter-American Security System: Changes and Challenges

The Inter-American Security System: Changes and Challenges

... for security cooperation with Central and South America, which means that there is continuity in many aspects of its mission, such as the “counter drug/ counter narcoterrorism” programs for Colombia, Mexico and ...

17

Enhancing Security in E-Health Communications using Multi-Agent System

Enhancing Security in E-Health Communications using Multi-Agent System

... the security needs in online communications, specifically in the e-health ...different security strengths to different types of communications in e-health, where each communication transmits different types ...

11

A decision support system for corporations cyber security risk management

A decision support system for corporations cyber security risk management

... configuration checking (e.g., XCCDF, FDCC) and other types of analyses are not included. For tools, not compliant with any such standards, this field is left blank. Entries in this field are based on supplier claims of ...

123

Software Theft Detection Using Birthmark Alg

Software Theft Detection Using Birthmark Alg

... code theft by identifying intrinsic properties of a ...the Theft of Windows Applications [11], This paper introduces dynamic software birthmarks which can be obtained while execution of Windows ...p. ...

7

USPLeaf: Automatic leaf area determination using a computer vision system

USPLeaf: Automatic leaf area determination using a computer vision system

... a system for image acquisition, and adopted a standard height of 45 and 40 cm, respectively, but high-resolution images would be required to ensure accuracy in the ...

10

Enhancing security of Pass Points system using variable tolerance

Enhancing security of Pass Points system using variable tolerance

... This system could have been implemented in other way i.e. continuously decreasing the tolerance levels over the number of clicks starting from 20 to 10 with 10 clicks. But we observed that psychologically users ...

5

Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria

Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria

... national security operations is paramount. For some time, the issue of security of life and property in Nigeria has taken a frightening dimension and an issue of great concern to citizens and the ...of ...

7

Show all 10000 documents...