語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Recent trends in peripheral security...
~
Deb, Dipankar.
Recent trends in peripheral security systems
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Recent trends in peripheral security systemsby Abhishek Rawat, Dipankar Deb, Jatin Upadhyay.
作者:
Rawat, Abhishek.
其他作者:
Deb, Dipankar.
出版者:
Singapore :Springer Singapore :2021.
面頁冊數:
xix, 107 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Security systems.
電子資源:
https://doi.org/10.1007/978-981-16-1205-3
ISBN:
9789811612053$q(electronic bk.)
Recent trends in peripheral security systems
Rawat, Abhishek.
Recent trends in peripheral security systems
[electronic resource] /by Abhishek Rawat, Dipankar Deb, Jatin Upadhyay. - Singapore :Springer Singapore :2021. - xix, 107 p. :ill., digital ;24 cm. - Services and business process reengineering,2524-5503. - Services and business process reengineering..
Introduction -- Design of Peripheral Security Module based on Exchange of Specific Data Rates -- System Design for the Detection of Humans Trapped in Snow -- WLAN based Smart Door Closer Design with Image Classification -- Robotic System Configuration with Localization, Path Planning and Computer Vision -- Secured System Design for Failure Mitigation of Railway Tracks.
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
ISBN: 9789811612053$q(electronic bk.)
Standard No.: 10.1007/978-981-16-1205-3doiSubjects--Topical Terms:
220506
Security systems.
LC Class. No.: HV8290 / .R38 2021
Dewey Class. No.: 621.389
Recent trends in peripheral security systems
LDR
:02581nmm a2200349 a 4500
001
598665
003
DE-He213
005
20210506085932.0
006
m d
007
cr nn 008maaau
008
211025s2021 si s 0 eng d
020
$a
9789811612053$q(electronic bk.)
020
$a
9789811612046$q(paper)
024
7
$a
10.1007/978-981-16-1205-3
$2
doi
035
$a
978-981-16-1205-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV8290
$b
.R38 2021
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
072
7
$a
TB
$2
thema
082
0 4
$a
621.389
$2
23
090
$a
HV8290
$b
.R257 2021
100
1
$a
Rawat, Abhishek.
$3
860915
245
1 0
$a
Recent trends in peripheral security systems
$h
[electronic resource] /
$c
by Abhishek Rawat, Dipankar Deb, Jatin Upadhyay.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
xix, 107 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Services and business process reengineering,
$x
2524-5503
505
0
$a
Introduction -- Design of Peripheral Security Module based on Exchange of Specific Data Rates -- System Design for the Detection of Humans Trapped in Snow -- WLAN based Smart Door Closer Design with Image Classification -- Robotic System Configuration with Localization, Path Planning and Computer Vision -- Secured System Design for Failure Mitigation of Railway Tracks.
520
$a
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
650
0
$a
Security systems.
$3
220506
650
0
$a
Electronic security systems.
$3
211150
650
1 4
$a
Data Engineering.
$3
839346
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Communications Engineering, Networks.
$3
273745
700
1
$a
Deb, Dipankar.
$3
830754
700
1
$a
Upadhyay, Jatin.
$3
892507
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Services and business process reengineering.
$3
862744
856
4 0
$u
https://doi.org/10.1007/978-981-16-1205-3
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000197348
電子館藏
1圖書
電子書
EB HV8290 .R257 2021 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-16-1205-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入