Journal articles on the topic 'Manhole Cover Security System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Manhole Cover Security System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
HORSFALL, O. M., and I. E. ESSENOWO. "MANHOLE COVER SECURITY AND MONITORING SYSTEM." International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 11, no. 1 (2024): 31–48. https://doi.org/10.5281/zenodo.10784897.
Full textWei, Zhanying, Mengmeng Yang, Liuzhao Wang, Hao Ma, Xuexia Chen, and Ruofei Zhong. "Customized Mobile LiDAR System for Manhole Cover Detection and Identification." Sensors 19, no. 10 (2019): 2422. http://dx.doi.org/10.3390/s19102422.
Full textSu, Zhonghua, Xiang Yu, Zhangcheng Yang, Heng Kang, and Jian Ou. "Design, Detection and Management of Mechanical Security Code Manhole Cover." MATEC Web of Conferences 228 (2018): 03007. http://dx.doi.org/10.1051/matecconf/201822803007.
Full textBokshi, Md Abid Hasan Roni, Aslam Mahmud Siam, Jannatul Ferdouse, Mohammad Shamsul Islam, and Md Suman Reza. "IoT-based Manhole Management System for Open Manhole Covers." International Journal of Information technology and Computer Engineering, no. 36 (September 4, 2023): 1–7. http://dx.doi.org/10.55529/ijitc.36.1.7.
Full textR, Dr Rashmi, and Sashwitha K. "Manhole Monitoring System." International Research Journal of Computer Science 12, no. 04 (2025): 183–88. https://doi.org/10.26562/irjcs.2025.v1204.12.
Full textLiu, Jiajia, Yu Zeng, and Jiahao Wu. "Intelligent Monitoring and Safety Management System Construction of Manhole Cover Hidden Danger Based on YoSwin-Former Model." Applied and Computational Engineering 133, no. 1 (2025): 211–16. https://doi.org/10.54254/2755-2721/2025.20799.
Full textMo, Fu, Liang Yu, Zhengkuan Zhang, and Yang Zhao. "Design and Implementation of Manhole Cover Safety Monitoring System based on Smart Light Pole." Mathematical Problems in Engineering 2022 (August 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/3081649.
Full textPradhan, Soumya Priyadarsini, Manoj Kumar Rath, and Rakesh Kumar Jena. "Strengthening of Precast Concrete Manhole Cover using GFRP Wrapping System." Circulation in Computer Science MCSP2017, no. 01 (2017): 1–3. http://dx.doi.org/10.22632/ccs-2017-mcsp024.
Full textSunitha, M., K. Amarender, Dr Purushotham Nayak, and S. Ayesha. "MANHOLE MANAGEMENT SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2662–67. http://dx.doi.org/10.61841/turcomat.v11i3.14468.
Full textWang, Zhan Bin, Jing Cheng Wang, and Hai Bo Zhang. "A Manhole Covers Intelligent Monitoring Terminal Based on Dual Frequency RFID and Acceleration Sensor." Advanced Materials Research 945-949 (June 2014): 1942–47. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.1942.
Full textR, Srinivasulu, Hariprathap Reddy B, Husseini T, and Narasimhulu V. "MANHOLE MANAGEMENT SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 270–2729. http://dx.doi.org/10.61841/turcomat.v11i3.14515.
Full textSingh, Ashutosh, Kartikeya Mishra, Sourav Kumar, and Chandra Shankar. "A Smart Manhole Monitoring and Detection System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6472–79. http://dx.doi.org/10.22214/ijraset.2023.53012.
Full textGuo, Jiahu, Kai Wang, Jianquan Sun, and Youcheng Jia. "Research and Implementation of Low-Power Anomaly Recognition Method for Intelligent Manhole Covers." Electronics 12, no. 8 (2023): 1926. http://dx.doi.org/10.3390/electronics12081926.
Full textYu, Liang, Zhengkuan Zhang, Yangbing Lai, Yang Zhao, and Fu Mo. "Edge computing-based intelligent monitoring system for manhole cover." Mathematical Biosciences and Engineering 20, no. 10 (2023): 18792–819. http://dx.doi.org/10.3934/mbe.2023833.
Full textDing, Yanqiong, Baojiang Han, Hua Jiang, et al. "Application of Improved YOLOv8 Image Model in Urban Manhole Cover Defect Management and Detection: Case Study." Sensors 25, no. 13 (2025): 4144. https://doi.org/10.3390/s25134144.
Full textUtepov, Yelbek, Alexandr Neftissov, Timoth Mkilima, et al. "Prototyping an integrated IoT-based real-time sewer monitoring system using low-power sensors." Eastern-European Journal of Enterprise Technologies 3, no. 5 (123) (2023): 6–23. http://dx.doi.org/10.15587/1729-4061.2023.283393.
Full textKim, Eun-Hee, Hae-Won Son, Hoyong Kang, and In-hwan Lee. "Manhole-cover Shaped Antenna Design for Underground Facilities Monitoring System." Procedia Computer Science 110 (2017): 40–45. http://dx.doi.org/10.1016/j.procs.2017.06.112.
Full textHimanshu, S. "IOT based Manhole Detection and Monitoring System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1608–13. http://dx.doi.org/10.22214/ijraset.2022.43862.
Full textKim, Jikyum, Sumin Lee, and Joo-Hyun Moon. "A Two-Stage, Self-Pressure-Controlled Smart Manhole System with Motor-Driven and Lifting Mechanisms for Enhanced Flood Disaster Preparedness." Water 17, no. 7 (2025): 978. https://doi.org/10.3390/w17070978.
Full textJia, Gangyong, Guangjie Han, Huanle Rao, and Lei Shu. "Edge Computing-Based Intelligent Manhole Cover Management System for Smart Cities." IEEE Internet of Things Journal 5, no. 3 (2018): 1648–56. http://dx.doi.org/10.1109/jiot.2017.2786349.
Full textIshitsuka, Kei, Makoto Kawakami, Yuki Kuwahara, and Nobuhiro Kai. "Performance of manhole under severe condition in Japan." ce/papers 6, no. 6 (2023): 1534–40. http://dx.doi.org/10.1002/cepa.2959.
Full textGuo, Huijuan. "Research on Ecological Design of Intelligent Manhole Covers Based on Fuzzy Analytic Hierarchy Process." Sustainability 16, no. 13 (2024): 5310. http://dx.doi.org/10.3390/su16135310.
Full textLin, Junran, Cuimei Yang, Yi Lu, Yuxing Cai, Hanjie Zhan, and Zhen Zhang. "An Improved Soft-YOLOX for Garbage Quantity Identification." Mathematics 10, no. 15 (2022): 2650. http://dx.doi.org/10.3390/math10152650.
Full textMatos, Rita Ventura, Filipa Ferreira, and José Saldanha Matos. "Influence of ventilation in H2S exposure and emissions from a gravity sewer." Water Science and Technology 81, no. 10 (2020): 2043–56. http://dx.doi.org/10.2166/wst.2020.253.
Full text石, 林鑫. "Design of an Intelligent Manhole Cover with Automatic Alarm System Based on STM32." Modeling and Simulation 14, no. 05 (2025): 946–54. https://doi.org/10.12677/mos.2025.145447.
Full textLuo, Ping, Huajun Wang, Changcheng Xiang, and Chengbing Huang. "A WSN system for high-precision cable manhole cover movement detection uses TDOA ranging method." Journal of Physics: Conference Series 1971, no. 1 (2021): 012024. http://dx.doi.org/10.1088/1742-6596/1971/1/012024.
Full textZhang, Kaiyu, Baohua Wang, Hongyan Chen, et al. "Inspection Cover Damage Warning System Using Deep Learning Based on Data Fusion and Channel Attention." Electronics 14, no. 12 (2025): 2383. https://doi.org/10.3390/electronics14122383.
Full textAung, Myint Aye. "LSB Based Image Steganography for Information Security System." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 394–400. https://doi.org/10.31142/ijtsrd18995.
Full textPratik, R. Dhende, S. Mohitkar Karan, A. Mohitkar Hrishikesh, S. Gorwade Shubham, and Bavachkar Seema. "Laser Security System." Research and Applications: Emerging Technologies 3, no. 2 (2020): 1–6. https://doi.org/10.5281/zenodo.3899672.
Full textAbdulJabbar, Israa, and Wala’a Abdul Ghafoor. "Proposed Watermarking System Using Genetic Algorithm and Security Measures." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 6, 2021): 279–303. http://dx.doi.org/10.55562/jrucs.v43i2.154.
Full textHubaut, Rémy, Romain Guichard, Julia Greenfield, and Mathias Blandeau. "Validation of an Embedded Motion-Capture and EMG Setup for the Analysis of Musculoskeletal Disorder Risks during Manhole Cover Handling." Sensors 22, no. 2 (2022): 436. http://dx.doi.org/10.3390/s22020436.
Full textHtet, May, and Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets." Journal of Computer Science 2, no. 1 (2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.
Full textAlshami, Ahmad, Moustafa Elsayed, Saeed Reza Mohandes, et al. "Performance Assessment of Sewer Networks under Different Blockage Situations Using Internet-of-Things-Based Technologies." Sustainability 14, no. 21 (2022): 14036. http://dx.doi.org/10.3390/su142114036.
Full textOgrizović, Mihajlo, Pavle Vuletić, and Žarko Stanisavljević. "Advanced Network and System Security Teaching." Electronics 14, no. 1 (2024): 3. https://doi.org/10.3390/electronics14010003.
Full textShejole, Prof Sakshi, Priya Sawant, Rohini Jadhav, Jyoti Rajput, and Pratiksha Netke. "Secret Communication Using Multi-Image Steganography with Face Recognition and OTP System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3476–81. http://dx.doi.org/10.22214/ijraset.2023.52407.
Full textChalapko, Vladimir Viktorovitch. "INFORMATION SECURITY: TO THE PROBLEM OF PLACE AND ROLE IN THE NATIONAL SECURITY SYSTEM." Bulletin of Yaroslav Mudryi National Law University. Series:Philosophy, philosophies of law, political science, sociology 51, no. 4 (2021): 83–95. https://doi.org/10.21564/2663-5704.51.242004.
Full textSchoell, Kyle, Aryan Haratian, Amir Fathi, et al. "Anatomic Repair of a Lateral Collateral Ligament and Anterolateral Capsular Complex Injury With Internal Brace Augmentation." Video Journal of Sports Medicine 2, no. 4 (2022): 263502542210930. http://dx.doi.org/10.1177/26350254221093082.
Full textDjordjević, S., D. Prodanović, Č. Maksimović, M. Ivetić, and D. Savić. "SIPSON – Simulation of Interaction between Pipe flow and Surface Overland flow in Networks." Water Science and Technology 52, no. 5 (2005): 275–83. http://dx.doi.org/10.2166/wst.2005.0143.
Full textJarmakiewicz, Jacek, Krzysztof Maślank, and Krzysztof Parobczak. "Evaluation of the Cyber Security Provision System for Critical Infrastructure." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 22–29. http://dx.doi.org/10.26636/jtit.2015.4.980.
Full textShintania, Mira, Wiyanto Wiyanto, and Sanudin Sanudin. "Integrasi Sistem Monitoring Pengemasan Document Security dengan Barcode Berbasis Web." Journal of Information System Research (JOSH) 5, no. 4 (2024): 1371–80. https://doi.org/10.47065/josh.v5i4.5687.
Full textJasim Halboos, Estabraq Hussein, and Abbas M. Albakry. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. http://dx.doi.org/10.11591/eei.v12i3.4540.
Full textEstabraq, Hussein Jasim Halboos, and M. Albakry Abbas. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. https://doi.org/10.11591/eei.v12i3.4540.
Full textWails, Ryan, Andrew Stange, Eliana Troper, et al. "Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 179–99. http://dx.doi.org/10.56553/popets-2022-0068.
Full textErawan, Elfrin, and Muhammad Salman. "Image based Ubuntu operating system using packer solutions." Gema Wiralodra 14, no. 2 (2023): 961–68. http://dx.doi.org/10.31943/gw.v14i2.475.
Full textAbu-Almash, Fadheela Sabri. "New Steganography System Based on Huffman Coding and Fibonacci Decomposition." Ibn AL- Haitham Journal For Pure and Applied Science 31, no. 1 (2018): 231. http://dx.doi.org/10.30526/31.1.1831.
Full textSheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.
Full textHummady, Muna M., and Ameer Hussein Morad. "Enhancement of System Security by Using LSB and RSA Algorithms." Al-Khwarizmi Engineering Journal 18, no. 1 (2022): 26–37. http://dx.doi.org/10.22153/kej.2022.03.001.
Full textKadu,, Shrutika. "Weather Forecasting System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41776.
Full textGadzhigaibova, Aliya. "GLOBALIZATION PROCESS AND ECONOMIC SECURITY." Labor and social relations 20, no. 2 (2023): 120–26. http://dx.doi.org/10.61764/lasr.2.2023.120-126.
Full textOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Full text