Academic literature on the topic 'Intruder and hold-up alarm system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intruder and hold-up alarm system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intruder and hold-up alarm system"

1

Unabor, Philip O., and Michael S. Okundamiya. "Implementation of an Embedded Microcontroller-Based Intrusion Detection System." Journal of Advances in Science and Engineering 1, no. 1 (2018): 27–32. http://dx.doi.org/10.37121/jase.v1i1.3.

Full text
Abstract:
This paper highlights the implementation of an embedded microcontroller-based intrusion detection system. The PIC16F84A microcontroller embedded in the system was programmed using the MikroC Language for the microcontrollers, to pick up an intrusion signal from the motion sensor, (which interprets the signal to be an electrical signal e.g. voltage), process it and then give a command to the display or output units. The output includes a 16x2 ALPHA liquid crystal display (LCD) and a buzzer (alarm unit), which in turn implement the command thereby notifying the environment of the presence of an
APA, Harvard, Vancouver, ISO, and other styles
2

F. Hussein, Loay, Anis Ben Aissa, Islam Abdalla Mohamed, Saed Alruwaili, and Abdalazi Alanzi. "Development of a Secured Vehicle Spot Detection System Using GSM." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 04 (2021): 85. http://dx.doi.org/10.3991/ijim.v15i04.19267.

Full text
Abstract:
The number of vehicles stolen is increasing annually. The alarm system for vehicles is commonly used to expose the burglars publicly to make a scene. If the vehicle owner is far away, it will be hard to distinguish the threat to the vehicle from the intruder. To deter such crime, there should be a safer protection mechanism for vehicles around the globe. Moreover, overcrowd parking lot problems have always been an issue. Nevertheless, it became even worse with the progressing urbanization and population expansion. Anyone may have experienced that moment of panic when you realize you have no id
APA, Harvard, Vancouver, ISO, and other styles
3

Hart, Jan, and Veronika Nídlová. "The Risks of Data Transmissions in Intrusion and Hold-Up Alarm Systems and Solutions Thereto." Advanced Materials Research 905 (April 2014): 570–74. http://dx.doi.org/10.4028/www.scientific.net/amr.905.570.

Full text
Abstract:
With regard to the resulting security of the guarded building, the issue of data transmissions in intrusion and hold-up alarm systems is highly important. Several risk factors of operation impact upon intrusion and hold-up alarm systems, influencing the resulting running of the system. Whether this concerns incorrect installation, external influences impacting upon the devices, improper maintenance or an improperly trained user, all can lead to fatal consequences. Amongst the most fundamental risks which may arise are risks in data transmissions. When the alarm information is affected, the sys
APA, Harvard, Vancouver, ISO, and other styles
4

Paś, Jacek. "Teaching Methodology of Diagnosis Process on the Example of Intrusion and Hold-Up Alarm System." Journal of KONBiN 46, no. 1 (2018): 215–34. http://dx.doi.org/10.2478/jok-2018-0031.

Full text
Abstract:
Abstract The article presents a teaching methodology of the diagnosis process of the technical and functional condition of intrusion and hold-up alarm system (SSWiN). Laboratory model SSWiN is a representation of a real intrusion and hold-up system. The lecturer has the opportunity to ask a dozen different independent damages. The aim of the laboratory exercises is to familiarize students with the methodology and structure of the diagnosis SSWiN.
APA, Harvard, Vancouver, ISO, and other styles
5

Pędzierska, Małgorzata, and Adam Rosiński. "Analysis of reliability power supply intrusion and hold-up systems presented in the standard PN-EN 50131-1:2009." Journal of KONBiN 42, no. 1 (2017): 165–90. http://dx.doi.org/10.1515/jok-2017-0024.

Full text
Abstract:
Abstract The intrusion and hold-up system is one of the electronic security systems. The purpose of its application is to increase the level of safety for persons and property. This kind of solutions are used in all types of objects belonging to the critical infrastructure of the State. The article presents considerations for analysis reliability of intrusion and hold-up systems. Characterize them, taking into account the guidance contained in the standard “PN-EN50131-1:2009:Alarm systems-Intrusion and hold-up systems-part 1: System requirements”. Then performed an analysis of reliability that
APA, Harvard, Vancouver, ISO, and other styles
6

Gorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.

Full text
Abstract:
The analysis of problems of using authentication systems for automobile systems is carried out. It is shown that criminals are increasingly interested in modern car protection systems, cars are becoming more technological, which in turn opens up new opportunities for compromising the operation of vehicle components and systems, so security systems are increasingly required to ensure efficiency and safety. Modern systems of protection against illegal seizure of vehicles, better known as "alarms" try to deter attacks by intruders, but in turn can bring additional backdoors for intruders complete
APA, Harvard, Vancouver, ISO, and other styles
7

Ida Seraphim, B., E. Poovammal, Kadiyala Ramana, Natalia Kryvinska, and N. Penchalaiah. "A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8024–44. http://dx.doi.org/10.3934/mbe.2021398.

Full text
Abstract:
<abstract> <p>Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive utilization of the web raises stress over how to pass on electronic information safely. Usually, intruders try different attacks for getting sensitive information. An Intrusion Detection System (IDS) plays a crucial role in identifying the data and user deviations in an organization. In this paper, stream data mining is incorporated with an IDS to do a specific task. The task is to distinguish the important, covered up information successfully in less amount of time. The e
APA, Harvard, Vancouver, ISO, and other styles
8

Simon, O. A., U. I. Bature, K. I. Jahun, and N. M. Tahir. "Electronic doorbell system using keypad and GSM." International Journal of Informatics and Communication Technology (IJ-ICT) 9, no. 3 (2020): 212. http://dx.doi.org/10.11591/ijict.v9i3.pp212-220.

Full text
Abstract:
<p><span lang="EN-US">In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application
APA, Harvard, Vancouver, ISO, and other styles
9

Lazo, Edwin O., Stephen Antonelli, Jun Aishima, et al. "Robotic sample changers for macromolecular X-ray crystallography and biological small-angle X-ray scattering at the National Synchrotron Light Source II." Journal of Synchrotron Radiation 28, no. 5 (2021): 1649–61. http://dx.doi.org/10.1107/s1600577521007578.

Full text
Abstract:
Here we present two robotic sample changers integrated into the experimental stations for the macromolecular crystallography (MX) beamlines AMX and FMX, and the biological small-angle scattering (bioSAXS) beamline LiX. They enable fully automated unattended data collection and remote access to the beamlines. The system designs incorporate high-throughput, versatility, high-capacity, resource sharing and robustness. All systems are centered around a six-axis industrial robotic arm coupled with a force torque sensor and in-house end effectors (grippers). They have the same software architecture
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Yan Hui, and Dan Tong Zhang. "Research on One Kind of Intellectualization High Accuracy Digital Adjustment Direct Source." Applied Mechanics and Materials 599-601 (August 2014): 608–11. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.608.

Full text
Abstract:
The power source uses the digital adjustment, the closed loop real-time monitoring.The output precision is vary high. It also has both the dual over-load protection and alarm, which is suitable especially in each kind situation of the high accuracy request.This design intellectualization direct-current power supply uses the self-restraint keyboard entry. The system of intellectualization high accuracy digital adjustmen direct source contains D/A module and A/D module . D/A module adopts low-priced 8 bits DA chip. DAC0832 is a electric current exports type 8 bits D/A converter , adopting to rev
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Intruder and hold-up alarm system"

1

Černý, Jan. "Návrh zabezpečovacího systému areálu společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224586.

Full text
Abstract:
The content of this thesis is the complex security system proposal, specifically of PZTS system and CCTV system. The thesis is divided into three parts. The first part is analysis of the current state, the second is theoretical part and the third part is a practical part. The first part deals with the analysis of the current state of physical security and technical protection of the premises. The theoretical part deals with theoretical solutions for security system proposal. The practical part is focused on separate PZTS and CCTV systems proposal, that will meet all the requirements and standa
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Intruder and hold-up alarm system"

1

Kayacik, H. Gunes. "Current Challenges in Intrusion Detection Systems." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch042.

Full text
Abstract:
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 1995, 171 vulnerabilities were reported to CERT/CC © while in 2003, there were 3,784 reported vulnerabilities, increasing to 8,064 in 2006 (CERT/CC©, 2006). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks. Defensive operations can be categorized in two groups: static and dynamic. Static defense mechanisms are analogous to the fences around the premises of a building. In other words, static defensive operations are intended to provide barriers to attacks. Keeping operating systems and other software up-to-date and deploying firewalls at entry points are examples of static defense solutions. Frequent software updates can remove the software vulnerabilities, which are susceptible to exploits. Firewalls provide access control at the entry point; they therefore function in much the same way as a physical gate on a house. In other words, the objective of a firewall is to keep intruders out rather than catching them. Static defense mechanisms are the first line of defense, they are relatively easy to deploy and provide significant defense improvement compared to the initial unguarded state of the computer network. Moreover, they act as the foundation for more sophisticated defense mechanisms. No system is totally foolproof. It is safe to assume that intruders are always one step ahead in finding security holes in current systems. This calls attention to the need for dynamic defenses. Dynamic defense mechanisms are analogous to burglar alarms, which monitor the premises to find evidence of break-ins. Built upon static defense mechanisms, dynamic defense operations aim to catch the attacks and log information about the incidents such as source and nature of the attack. Therefore, dynamic defense operations accompany the static defense operations to provide comprehensive information about the state of the computer networks and connected systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intruder and hold-up alarm system"

1

Kaderabek, Jan. "Integration of Fibaro system to intruder and hold-up alarm systems." In 16th International Scientific Conference Engineering for Rural Development. Latvia University of Agriculture, 2017. http://dx.doi.org/10.22616/erdev2017.16.n228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!