Academic literature on the topic 'Alarm security and emergency system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Alarm security and emergency system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Alarm security and emergency system"

1

Deris, Anugrah. "SISTEM INFORMASI DARURAT PADA MINI MARKET MENGGUNAKAN MIKROKONTROLER ESP8266 BERBASIS INTERNET OF THINGS." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 16, no. 2 (2019): 283–88. http://dx.doi.org/10.33751/komputasi.v16i2.1622.

Full text
Abstract:
Increasing levels of crime have encouraged instrumentation and technology systems to deal with and expose crime cases. Emergency information systems on the mini market use ESP8266 microcontroller and have been built and analyzed to overcome this on the basis of the Internet of Things. Signals generated from this tool at shopping centers provide emergency information on the Website of the security unit. The results of the system test produced 3.6 seconds delay for power supply connections to NodeMcu. while the delay to calculate the Transmission (response signal) of the Security Unit, and the d
APA, Harvard, Vancouver, ISO, and other styles
2

Haefner, C. H. "Disaster Management at Frankfurt Airport." Journal of the World Association for Emergency and Disaster Medicine 1, no. 2 (1985): 133. http://dx.doi.org/10.1017/s1049023x00065250.

Full text
Abstract:
During peak hours at Frankfurt Airport, approximately 10,000 employees of 300 different firms, organizations and services simultaneously handle more than 10,000 passengers and accompanying people. Most of them are not familiar with the airport facilities and speak several different languages.Disaster management is the act of solving an organization problem under pressure of time. The leading role during the immediate action concerning major accidents or disasters is played by the Safety and Security Control Center of the airport operator, which alerts and controls all emergency services of the
APA, Harvard, Vancouver, ISO, and other styles
3

Ha, Kyoungryong, Euyhong Hwang, and Donmook Choi. "Problems and Improvement Measures of 「Special Act on the Safety Control of Publicly Used Establishments」." Journal of the Korean Society of Hazard Mitigation 20, no. 4 (2020): 87–93. http://dx.doi.org/10.9798/kosham.2020.20.4.87.

Full text
Abstract:
The examination of the transition process of the「Special Act on the Safety Control of Publicly Used Establishments」(hereinafter referred to as the "Publicly Used Establishments Act") shows that the related laws are being revised when major accidents result in human or property damage. People who intend to conduct a multi-use business must install safety facilities, etc., prescribed by Presidential Decree, in accordance with the standards prescribed by Ordinance of the Ministry of Public Administration and Security. In this study, the legal standards, construction and safety accident cases that
APA, Harvard, Vancouver, ISO, and other styles
4

Paradiso, Rita, Lionel Bourdon, and Giannicola Loriga. "Smart Sensing Uniforms for Emergency Operators." Advances in Science and Technology 60 (September 2008): 101–10. http://dx.doi.org/10.4028/www.scientific.net/ast.60.101.

Full text
Abstract:
Textile integration of smart sensor systems is the key technology for the success of future e-garments oriented to emergency operators. Ubiquitous recording and transmission of human and environmental data will allow combining comfort and protection leveraging with the existing smart textile, microelectronics and telecommunication technologies. The challenge offered by emergency situation is mainly in the difficulty to acquire data in a very aggressive environment, during hard physical activity; conditions that will increase the risks of signals artefacts, as well as the presence of positive a
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Shi Jie, Wei He, Shu Ming Jiang, et al. "Research and Development of Multi-Regional Monitoring Integration Technology Based on SIP Protocol." Applied Mechanics and Materials 433-435 (October 2013): 1403–9. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1403.

Full text
Abstract:
To solve the system overloading problem of sip protocol based on centralized monitoring and management system, we propose a new protocol system based on cross-regional stratification sip monitoring integrated management platform, it uses the automatic control technology, networking and communications technology, video / audio compression and transmission technology, sensors and integrated control technology and software engineering techniques. It is an integrated platform of biometrics, intelligent video analysis, anti-theft alarm techniques, 3G video management, valuables management, multifun
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Mu Yu, Wei Tian, Ying Wang, Wu Jing, and Xi Chen. "Risk Prevention Measures for Three-Tower and Four-Span Suspension Bridge under Vehicle Fire." Advanced Materials Research 919-921 (April 2014): 590–97. http://dx.doi.org/10.4028/www.scientific.net/amr.919-921.590.

Full text
Abstract:
Risk prevention measures were put forward about vehicle burning in operating periods for three-tower and four-span suspension bridge, combining with the characteristics of bridge vehicle burning accident. The article set up a traffic reporting system of the tankers for a bridge, and determined the report system of tankers across the bridge. Tankers should passed in the middle of the lane near the median under the guidance of bridge manager. Significant indicators were set on both ends of the bridge, so that vehicles could shunt rapidly in extreme fire conditions. Department of public security,
APA, Harvard, Vancouver, ISO, and other styles
7

Tung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.

Full text
Abstract:
This research creates home security service with social interaction based on a web-based multiple stations supervisory control framework. An Arduino controller is used as a thin-controller to control a home security system. Most control laws are computed in server-side, driving commands are transferred to local controllers for execution. A supervisory control server kept in a company can serve numerous Arduino controllers to provide home security service. The Arduino controller can sense door switch, motion detection, smoke detection, gas detection, CO detection, and an emergency button, and c
APA, Harvard, Vancouver, ISO, and other styles
8

Mózer, Vladimír, Tomas Loveček, Andrej Vel'as, and Linda Makovická. "Fire Safety and Security Threats Identification and Elimination." Advanced Materials Research 1001 (August 2014): 306–11. http://dx.doi.org/10.4028/www.scientific.net/amr.1001.306.

Full text
Abstract:
This paper deals with the topic of fire safety and security measures and their mutual interaction. A designer or stakeholder may be confronted with conflicting objectives regarding life safety and object security. Often, escape routes pass via areas that are under non-emergency conditions subject to access control, accessible only to members of staff, contractors, etc. When fire alarm is activated, it is necessary to provide fast and unhindered evacuation from the premises, which may involve using restricted-access back-of-house areas. On a case study – section of a shopping centre – the conce
APA, Harvard, Vancouver, ISO, and other styles
9

Apollonskiy, Stanislav M. "Functional safety electrified railways." Transportation systems and technology 2, no. 1 (2016): 136–53. http://dx.doi.org/10.17816/transsyst201621136-153.

Full text
Abstract:
The study of functional safety includes identification of specific hazards that may cause serious consequences (e.g., human sacrifices), and establishing for each of them maximum frequency of occurrence. Reveals equipment, failure of which may contribute to the occurrence of such situations. Such equipment is usually referred to as "security-related". Examples include process of control systems, process shutdown systems, equipment alarm systems, centralization and blocking on the railway, controls the movement of the vehicle, medical equipment, etc. In other words, any equipment (software or n
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Liwei, Robert Abbas, Fahad M. Almansour, Gurjot Singh Gaba, Roobaea Alroobaea, and Mehedi Masud. "An empirical study on vulnerability assessment and penetration detection for highly sensitive networks." Journal of Intelligent Systems 30, no. 1 (2021): 592–603. http://dx.doi.org/10.1515/jisys-2020-0145.

Full text
Abstract:
Abstract With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network secur
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Alarm security and emergency system"

1

Mihálik, Andrej. "Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378330.

Full text
Abstract:
This master's thesis deals with the design of an electronic security system as part of the physical security for the energy company in the Czech Republic. The electronic security system is designed to meet all legal requirements, internal directives and has also passed ISO 27001 certification. The Implementation of the security system is demonstrated on the selected object of the company that belongs to the elements of the critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
2

Friml, Lubomír. "Domovní alarm." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219726.

Full text
Abstract:
The thesis deals with the design and realization of electronic security system (ESS) for the house. ESS evaluates signals from radar move-detection sensors also allows connection of other types of move-detection, magnetic contacts, laser gates and smoke detector. The interruption is signaled via SMS sent to the owner of the building and via acoustic warning. The security system also allows the connection temperature sensors, as well as monitoring electricity consumption or central control home appliances and other devices. These features are optional, they can be used to remotely monitor the s
APA, Harvard, Vancouver, ISO, and other styles
3

Hamid, Lars-Eric, and Simon Möller. "How Secure is Verisure’s Alarm System?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295618.

Full text
Abstract:
Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. After an initial threat modeling, followedby penetration testing it turns out that the alarm system is not assecure as Verisure markets. We could find several security flawsin the system. Some of them let an attacker block the system,and others yield full control without the user’s knowledge. Thereare also a couple of vulnerabilities tha
APA, Harvard, Vancouver, ISO, and other styles
4

Chigani, Amine. "A Campus Situational Awareness and Emergency Response Management System Architecture." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/26782.

Full text
Abstract:
The history of university, college, and high school campuses is eventful with man-made tragedies ensuing a tremendous loss of life. Virginia Tech's April 16 shooting ignited the discussion about balancing openness and safety in open campus environments. Existing campus safety solutions are characterized by addressing bits and pieces of the problem. The perfect example is the recent influx in demand for Electronic Notification Systems (ENS) by many educational institutions following the tragedies at Virginia Tech and Northern Illinois University. Installing such systems is important, as it is a
APA, Harvard, Vancouver, ISO, and other styles
5

Lindeberg, Axel. "Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302999.

Full text
Abstract:
The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. Besides triggering an alarm when an intruder tries to break in, a modern system can now control your light bulbs, lock and unlock your front door remotely, and interact with your smart speaker. They are undeniably effective in deterring physical intrusion. However, given the recent rise in complexity how well do they hold up against cyber a
APA, Harvard, Vancouver, ISO, and other styles
6

Malý, Luděk. "Návrh metodiky řešení elektronického zabezpečeni objektu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217310.

Full text
Abstract:
Master’s Thesis is consider to security system design. In this Theses is described methodology of proposal of electronic security alarm according to valid standards and rules. In terms of standard and specification is created way of computerization of this design. Consequently, this procedure is software implemented. Results of algorithmic design are reviewed on hypothetic object.
APA, Harvard, Vancouver, ISO, and other styles
7

Judd, John David. "Stream splitting in support of intrusion detection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FJudd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Joseph W. "A Framework for Developing and Integrating Effective Routing Strategies Within the Emergency Decision Support System." DigitalCommons@CalPoly, 2011. https://digitalcommons.calpoly.edu/theses/671.

Full text
Abstract:
In recent years transportation professionals have shown increasing interest in evacuation planning. With the advances in computing technologies it is possible to simulate urban transportation networks with great detail. These details from the traffic simulation model can be used for devising strategies for evacuation and emergency response in case of a disaster. This thesis describes the modeling, calibration, and validation of the VISSIM traffic simulation model coded for downtown San Jose. The network is then used to test various evacuation scenarios to assess evacuation strategies that woul
APA, Harvard, Vancouver, ISO, and other styles
9

Zeitz, Kimberly Ann. "An Optimized Alert System Based on Geospatial Location Data." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49265.

Full text
Abstract:
Crises are spontaneous and highly variable events that lead to life threatening and urgent situations. As such, crisis and emergency notification systems need to be both flexible and highly optimized to quickly communicate to users. Implementing the fastest methods, however, is only half of the battle. The use of geospatial location is missing from alert systems utilized at university campuses across the United States. Our research included the design and implementation of a mobile application addition to our campus notification system. This addition is complete with optimizations includi
APA, Harvard, Vancouver, ISO, and other styles
10

Bell, Patrick M. "Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis Approach." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/574.

Full text
Abstract:
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these “focusing events” (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Alarm security and emergency system"

1

Engineering Equipment and Materials Users' Association. Alarm systems: A guide to design, management and procurement. 3rd ed. The Engineering Equipment and Materials Users' Association, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Force, Illinois Terrorism Task. Homeland security advisory system. Illinois Terrorism Task Force, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Becker & Mayer, ed. Keep out! door alarm: Build your own key card security system! Tangerine Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Balog, John N. The public transportation system security and emergency preparedness planning guide. Federal Transit Administration, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

National incident management system: Principles and practices. 2nd ed. Jones & Bartlett Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haider, Kazi Ashraf. Project introduction & implementation consultancy on national security & safety management system by establishing ADEMCO V-TRAN long-range (radio) security & safety wireless central control station (SSWCCS) base station & networking system for rapid development forces. Ministry of Home Affairs, Govt. of People's Republic of Bangladesh, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Agencies, Arkansas Board of Private Investigators and Private Security. Rules and regulations of the Arkansas Board of Private Investigators and Private Security Agencies and alarm system companies. The Board, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Division, Texas Bureau of Epidemiology Environmental Epidemiology and Toxicology. Texas Hazardous Substances Emergency Events Surveillance (HSEES) system December 2001 security survey of Texas industrial and transportation facilities. Environmental Epidemiology and Toxicology Division, Bureau of Epidemiology, Texas Dept. of Health, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

The National Incident Management System: Enhancing response to terrorist attacks : hearing before the Subcommittee on Emergency Preparedness and Response of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, second session, September 29, 2004. U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Buck, George. Preparing for terrorism: An emergency services guide. Delmar Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Alarm security and emergency system"

1

Li, Huiyang, Xianghong Sun, and Kan Zhang. "Voice Alarm System in Emergency Evacuation." In Engineering Psychology and Cognitive Ergonomics. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73331-7_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

García, Ana Cristina Bicharra, Luiz Andre Portes, Fernando Pinto, and Nayat Sanchez-Pi. "Real-Time Alarm Management System for Emergency Situations." In Studies in Computational Intelligence. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30732-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schulz, Dorothy Moses. "Emergency Management: Incident Command System." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_135-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schulz, Dorothy Moses. "Emergency Management: Incident Command System." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maras, Marie-Helen. "Industrial Control System." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-69891-5_17-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maras, Marie-Helen. "Industrial Control System." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lingaraj, K., N. Sreekanth, Moddiudin Kaja, K. M. S. Lokesh, Keni Prashanth, and V. Biradhar Nagaveni. "Information Security Emergency Plan Management System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-2750-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Yafei, Peng Gao, and Zhihua Li. "Design of Security Alarm System Based on LoRa Technology." In Geo-informatics in Sustainable Ecosystem and Society. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7025-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sethi, Parth, Lakshey Juneja, Punit Gupta, and Kaushlendra Kumar Pandey. "Safe Sole Distress Alarm System for Female Security Using IoT." In Proceedings of First International Conference on Smart System, Innovations and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-5828-8_81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Yaodong, Huiguang He, Baihua Xiao, Chunheng Wang, and Feiyue Wang. "CWME: A Framework of Group Support System for Emergency Responses." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11760146_99.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Alarm security and emergency system"

1

Song, Ning, Yan Zhou, Dongjie Tan, Yunbin Ma, Honghui Qiu, and Baisong Li. "Research on Fiber Perimeter Security Technique of Station." In 2012 9th International Pipeline Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/ipc2012-90074.

Full text
Abstract:
The oil or gas station is an important producing unit, building a perimeter security system is an available method for protecting the stations and improving the capacity of dealing with the emergency incident. However, building high walls or fence and patrolling the stations are the main protecting methods, it is difficult to detect invasion immediately. So, it is necessary to construct a stable and reliable perimeter security system to protect the station. Traditional fiber perimeter security technology protects the station by sensing fiber on the fence or wall, but the wind will produce many
APA, Harvard, Vancouver, ISO, and other styles
2

"Research on Citizen Emergency Alarm System." In 2018 4th International Conference on Education & Training, Management and Humanities Science. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/etmhs.2018.29013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mustakin, Zaheen, Saad Manzur, Tanzila Choudhury, Farzana Rahman, Sriram Chellappan, and A. B. M. Alim Al Islam. "Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms." In 2018 5th International Conference on Networking, Systems and Security (NSysS). IEEE, 2018. http://dx.doi.org/10.1109/nsyss.2018.8631372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yuanyuan Du, Yu Chen, Dan Wang, Jinzhao Liu, and Yongqiang Lu. "An android-based emergency alarm and healthcare management system." In 2011 International Symposium on Information Technology in Medicine and Education (ITME 2011). IEEE, 2011. http://dx.doi.org/10.1109/itime.2011.6130855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fangyan Yang and Lei Jin. "Research on rural emergency alarm system based on network." In 2010 International Conference on Future Information Technology and Management Engineering (FITME). IEEE, 2010. http://dx.doi.org/10.1109/fitme.2010.5656545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hua, Wu, Wang Cheng, Zhang Guangyuan, and Fan Weidan. "Design of Distributed Wireless Security Alarm System." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mahgoub, Asma, Nourhan Tarrad, Rana Elsherif, Abdulla Al-Ali, and Loay Ismail. "IoT-Based Fire Alarm System." In 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4). IEEE, 2019. http://dx.doi.org/10.1109/worlds4.2019.8904001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gu, Yu, Lei Chen, and Xiaoyong Ji. "Walking Security Alarm System for Mobile Phone Addicts." In 2nd International Forum on Management, Education and Information Technology Application (IFMEITA 2017). Atlantis Press, 2018. http://dx.doi.org/10.2991/ifmeita-17.2018.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Christ, Godwin, and Lavigne. "A prison guard Duress alarm location system." In Proceedings of IEEE International Carnahan Conference on Security Technology. IEEE, 1993. http://dx.doi.org/10.1109/ccst.1993.386816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ye, David, Weston Edens, Thomas T. Lu, and Tien-Hsin Chao. "Neural network target identification system for false alarm reduction." In SPIE Defense, Security, and Sensing, edited by David P. Casasent and Tien-Hsin Chao. SPIE, 2009. http://dx.doi.org/10.1117/12.820949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!