Academic literature on the topic 'Intruder and hold-up alarm system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intruder and hold-up alarm system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intruder and hold-up alarm system"

1

Unabor, Philip O., and Michael S. Okundamiya. "Implementation of an Embedded Microcontroller-Based Intrusion Detection System." Journal of Advances in Science and Engineering 1, no. 1 (April 30, 2018): 27–32. http://dx.doi.org/10.37121/jase.v1i1.3.

Full text
Abstract:
This paper highlights the implementation of an embedded microcontroller-based intrusion detection system. The PIC16F84A microcontroller embedded in the system was programmed using the MikroC Language for the microcontrollers, to pick up an intrusion signal from the motion sensor, (which interprets the signal to be an electrical signal e.g. voltage), process it and then give a command to the display or output units. The output includes a 16x2 ALPHA liquid crystal display (LCD) and a buzzer (alarm unit), which in turn implement the command thereby notifying the environment of the presence of an intruder by displaying “Intruder Detected!” on the LCD and by a beeping sound with an interval of 0.5s delay by the alarm unit. The system was tested and was found to be efficient and suitable for solving myriad of security issues that confront us in modern times.
APA, Harvard, Vancouver, ISO, and other styles
2

F. Hussein, Loay, Anis Ben Aissa, Islam Abdalla Mohamed, Saed Alruwaili, and Abdalazi Alanzi. "Development of a Secured Vehicle Spot Detection System Using GSM." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 04 (February 26, 2021): 85. http://dx.doi.org/10.3991/ijim.v15i04.19267.

Full text
Abstract:
The number of vehicles stolen is increasing annually. The alarm system for vehicles is commonly used to expose the burglars publicly to make a scene. If the vehicle owner is far away, it will be hard to distinguish the threat to the vehicle from the intruder. To deter such crime, there should be a safer protection mechanism for vehicles around the globe. Moreover, overcrowd parking lot problems have always been an issue. Nevertheless, it became even worse with the progressing urbanization and population expansion. Anyone may have experienced that moment of panic when you realize you have no idea where you parked your vehicle. Note that, the keyless remote control of vehicles has a short-range radio transmitter. It usually can reach up 5–20 meters. Therefore, this paper develops a proposed system that is used for detecting vehicle location using Global System for Mobile Communications (GSM). It is basically capable to switch ON and OFF vehicle alarm system to detect the location of the vehicle in a crowded area. PIC microcontroller that has been embedded in the system programmed using C language. The intelligent proposed system also designs to enhance the security feature for the transportation era. The proposed system offers better service and cost-effective for the vehicle owners.
APA, Harvard, Vancouver, ISO, and other styles
3

Hart, Jan, and Veronika Nídlová. "The Risks of Data Transmissions in Intrusion and Hold-Up Alarm Systems and Solutions Thereto." Advanced Materials Research 905 (April 2014): 570–74. http://dx.doi.org/10.4028/www.scientific.net/amr.905.570.

Full text
Abstract:
With regard to the resulting security of the guarded building, the issue of data transmissions in intrusion and hold-up alarm systems is highly important. Several risk factors of operation impact upon intrusion and hold-up alarm systems, influencing the resulting running of the system. Whether this concerns incorrect installation, external influences impacting upon the devices, improper maintenance or an improperly trained user, all can lead to fatal consequences. Amongst the most fundamental risks which may arise are risks in data transmissions. When the alarm information is affected, the system can no longer be relied upon. On the basis of measurements and the results thereof, a number of innovations have been created, which should help better protect data transmissions.
APA, Harvard, Vancouver, ISO, and other styles
4

Paś, Jacek. "Teaching Methodology of Diagnosis Process on the Example of Intrusion and Hold-Up Alarm System." Journal of KONBiN 46, no. 1 (June 1, 2018): 215–34. http://dx.doi.org/10.2478/jok-2018-0031.

Full text
Abstract:
Abstract The article presents a teaching methodology of the diagnosis process of the technical and functional condition of intrusion and hold-up alarm system (SSWiN). Laboratory model SSWiN is a representation of a real intrusion and hold-up system. The lecturer has the opportunity to ask a dozen different independent damages. The aim of the laboratory exercises is to familiarize students with the methodology and structure of the diagnosis SSWiN.
APA, Harvard, Vancouver, ISO, and other styles
5

Pędzierska, Małgorzata, and Adam Rosiński. "Analysis of reliability power supply intrusion and hold-up systems presented in the standard PN-EN 50131-1:2009." Journal of KONBiN 42, no. 1 (June 1, 2017): 165–90. http://dx.doi.org/10.1515/jok-2017-0024.

Full text
Abstract:
Abstract The intrusion and hold-up system is one of the electronic security systems. The purpose of its application is to increase the level of safety for persons and property. This kind of solutions are used in all types of objects belonging to the critical infrastructure of the State. The article presents considerations for analysis reliability of intrusion and hold-up systems. Characterize them, taking into account the guidance contained in the standard “PN-EN50131-1:2009:Alarm systems-Intrusion and hold-up systems-part 1: System requirements”. Then performed an analysis of reliability that enable their comparison. In further research of this issue is planned to carry out similar analyses, but for systems of access control and video surveillance systems (also distributed structures).
APA, Harvard, Vancouver, ISO, and other styles
6

Gorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.

Full text
Abstract:
The analysis of problems of using authentication systems for automobile systems is carried out. It is shown that criminals are increasingly interested in modern car protection systems, cars are becoming more technological, which in turn opens up new opportunities for compromising the operation of vehicle components and systems, so security systems are increasingly required to ensure efficiency and safety. Modern systems of protection against illegal seizure of vehicles, better known as "alarms" try to deter attacks by intruders, but in turn can bring additional backdoors for intruders completely unintentionally, for example by adding an interesting feature to the car system, and then this feature can be dual due to problems with the authentication system. Therefore, based on this, car security systems must have the highest level of authentication security, which requires the use of a decentralized blockchain network with nodes for each car, authenticating the user in groups, this will move away from the standard client-server architecture, which is not sufficiently secure. . The main ways to solve this problem are to build a comprehensive security system, which in turn includes an improved and reliable authentication measure based on a decentralized blockchain network and two comprehensive schemes to update the critical data transmission system of the car – CAN network. The use of these systems will improve the security of the identification system and information flowing between critical units, which will improve the safety of the car from theft, as well as from the ability of attackers to create emergencies remotely.
APA, Harvard, Vancouver, ISO, and other styles
7

Ida Seraphim, B., E. Poovammal, Kadiyala Ramana, Natalia Kryvinska, and N. Penchalaiah. "A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8024–44. http://dx.doi.org/10.3934/mbe.2021398.

Full text
Abstract:
<abstract> <p>Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive utilization of the web raises stress over how to pass on electronic information safely. Usually, intruders try different attacks for getting sensitive information. An Intrusion Detection System (IDS) plays a crucial role in identifying the data and user deviations in an organization. In this paper, stream data mining is incorporated with an IDS to do a specific task. The task is to distinguish the important, covered up information successfully in less amount of time. The experiment focuses on improving the effectiveness of an IDS using the proposed Stacked Autoencoder Hoeffding Tree approach (SAE-HT) using Darwinian Particle Swarm Optimization (DPSO) for feature selection. The experiment is performed in NSL_KDD dataset the important features are obtained using DPSO and the classification is performed using proposed SAE-HT technique. The proposed technique achieves a higher accuracy of 97.7% when compared with all the other state-of-art techniques. It is observed that the proposed technique increases the accuracy and detection rate thus reducing the false alarm rate.</p> </abstract>
APA, Harvard, Vancouver, ISO, and other styles
8

Simon, O. A., U. I. Bature, K. I. Jahun, and N. M. Tahir. "Electronic doorbell system using keypad and GSM." International Journal of Informatics and Communication Technology (IJ-ICT) 9, no. 3 (December 1, 2020): 212. http://dx.doi.org/10.11591/ijict.v9i3.pp212-220.

Full text
Abstract:
<p><span lang="EN-US">In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
9

Lazo, Edwin O., Stephen Antonelli, Jun Aishima, Herbert J. Bernstein, Dileep Bhogadi, Martin R. Fuchs, Nicolas Guichard, et al. "Robotic sample changers for macromolecular X-ray crystallography and biological small-angle X-ray scattering at the National Synchrotron Light Source II." Journal of Synchrotron Radiation 28, no. 5 (August 23, 2021): 1649–61. http://dx.doi.org/10.1107/s1600577521007578.

Full text
Abstract:
Here we present two robotic sample changers integrated into the experimental stations for the macromolecular crystallography (MX) beamlines AMX and FMX, and the biological small-angle scattering (bioSAXS) beamline LiX. They enable fully automated unattended data collection and remote access to the beamlines. The system designs incorporate high-throughput, versatility, high-capacity, resource sharing and robustness. All systems are centered around a six-axis industrial robotic arm coupled with a force torque sensor and in-house end effectors (grippers). They have the same software architecture and the facility standard EPICS-based BEAST alarm system. The MX system is compatible with SPINE bases and Unipucks. It comprises a liquid nitrogen dewar holding 384 samples (24 Unipucks) and a stay-cold gripper, and utilizes machine vision software to track the sample during operations and to calculate the final mount position on the goniometer. The bioSAXS system has an in-house engineered sample storage unit that can hold up to 360 samples (20 sample holders) which keeps samples at a user-set temperature (277 K to 300 K). The MX systems were deployed in early 2017 and the bioSAXS system in early 2019.
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Yan Hui, and Dan Tong Zhang. "Research on One Kind of Intellectualization High Accuracy Digital Adjustment Direct Source." Applied Mechanics and Materials 599-601 (August 2014): 608–11. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.608.

Full text
Abstract:
The power source uses the digital adjustment, the closed loop real-time monitoring.The output precision is vary high. It also has both the dual over-load protection and alarm, which is suitable especially in each kind situation of the high accuracy request.This design intellectualization direct-current power supply uses the self-restraint keyboard entry. The system of intellectualization high accuracy digital adjustmen direct source contains D/A module and A/D module . D/A module adopts low-priced 8 bits DA chip. DAC0832 is a electric current exports type 8 bits D/A converter , adopting to reversing T type resistor network. The ADC0809 chip,with 8 bits AD changes ,accomplishes the data collect function and makes up into the closed cycle circuit. The inside of ADC0809 has output lock-memory implement , it can link up with AT89C51 monolithic machine directly. The stabilivolt outputed and over-stream protection module adopts the in-line stabilivolt circuit which has used three end integrated stabilivolt chip , adopting LM317 and LM337 series three hold adjustable stabilivolt tube., LM317 is a three end adjustable voltage stabilizer integrated circuit of USA country semiconductor company.The single-chip microcomputer receives voltage value information of keyboard input, and carries on processing.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Intruder and hold-up alarm system"

1

Černý, Jan. "Návrh zabezpečovacího systému areálu společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224586.

Full text
Abstract:
The content of this thesis is the complex security system proposal, specifically of PZTS system and CCTV system. The thesis is divided into three parts. The first part is analysis of the current state, the second is theoretical part and the third part is a practical part. The first part deals with the analysis of the current state of physical security and technical protection of the premises. The theoretical part deals with theoretical solutions for security system proposal. The practical part is focused on separate PZTS and CCTV systems proposal, that will meet all the requirements and standards of the customer.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Intruder and hold-up alarm system"

1

Kayacik, H. Gunes. "Current Challenges in Intrusion Detection Systems." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 305–11. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch042.

Full text
Abstract:
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 1995, 171 vulnerabilities were reported to CERT/CC © while in 2003, there were 3,784 reported vulnerabilities, increasing to 8,064 in 2006 (CERT/CC©, 2006). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks. Defensive operations can be categorized in two groups: static and dynamic. Static defense mechanisms are analogous to the fences around the premises of a building. In other words, static defensive operations are intended to provide barriers to attacks. Keeping operating systems and other software up-to-date and deploying firewalls at entry points are examples of static defense solutions. Frequent software updates can remove the software vulnerabilities, which are susceptible to exploits. Firewalls provide access control at the entry point; they therefore function in much the same way as a physical gate on a house. In other words, the objective of a firewall is to keep intruders out rather than catching them. Static defense mechanisms are the first line of defense, they are relatively easy to deploy and provide significant defense improvement compared to the initial unguarded state of the computer network. Moreover, they act as the foundation for more sophisticated defense mechanisms. No system is totally foolproof. It is safe to assume that intruders are always one step ahead in finding security holes in current systems. This calls attention to the need for dynamic defenses. Dynamic defense mechanisms are analogous to burglar alarms, which monitor the premises to find evidence of break-ins. Built upon static defense mechanisms, dynamic defense operations aim to catch the attacks and log information about the incidents such as source and nature of the attack. Therefore, dynamic defense operations accompany the static defense operations to provide comprehensive information about the state of the computer networks and connected systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intruder and hold-up alarm system"

1

Kaderabek, Jan. "Integration of Fibaro system to intruder and hold-up alarm systems." In 16th International Scientific Conference Engineering for Rural Development. Latvia University of Agriculture, 2017. http://dx.doi.org/10.22616/erdev2017.16.n228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography