Gotowa bibliografia na temat „Car theft”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Car theft”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Car theft"
Gupta, Rupesh, Gaurav Jagdev, Gurjant Singh, Gurwinder Bir Singh, and Manjot Singh. "Anti-Theft and Temperature Control of Car Wheel." Applied Mechanics and Materials 710 (January 2015): 77–82. http://dx.doi.org/10.4028/www.scientific.net/amm.710.77.
Pełny tekst źródłaMiniappan, P. K., R. Krishnan, Laeth Hussain, Yamuna Bheemanpally, and Gotlur Karuna. "Remote engine shutdown system with theft alert via sms for vehicle owners." E3S Web of Conferences 564 (2024): 07008. http://dx.doi.org/10.1051/e3sconf/202456407008.
Pełny tekst źródłaLockhart, Bill. "CAR THEFT IN BELFAST." Criminal Justice Matters 13, no. 1 (1993): 15–16. http://dx.doi.org/10.1080/09627259308553340.
Pełny tekst źródłaJ., A. Enokela, and Ibanga E.J. "AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM." Continental J. Engineering Sciences 1 (July 22, 2007): 15–19. https://doi.org/10.5281/zenodo.833559.
Pełny tekst źródłaMACH, Vlastimil. "PROTECTING OF CAR FROM THEFT." Krízový Manažment 11, no. 2 (2012): 52–58. http://dx.doi.org/10.26552/krm.c.2012.2.52-58.
Pełny tekst źródłaPatil, Pritam. "Car Theft Detection and Tracking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 639–46. http://dx.doi.org/10.22214/ijraset.2022.45353.
Pełny tekst źródłaGonzalez-Navarro, Marco. "Deterrence and Geographical Externalities in Auto Theft." American Economic Journal: Applied Economics 5, no. 4 (2013): 92–110. http://dx.doi.org/10.1257/app.5.4.92.
Pełny tekst źródłaCao, Enqi, Fanliang Bu, and Zhuxuan Han. "AutoEncoder-Based Data Completion Model for Theft Cases of Items Inside Cars." Frontiers in Computing and Intelligent Systems 9, no. 1 (2024): 1–4. http://dx.doi.org/10.54097/3b7gwn94.
Pełny tekst źródłaАхмяров, Р. Ш. "Специально-криминологическое предупреждение краж и угонов автотранспортных средств органами внутренних дел Российской Федерации". Расследование преступлений: проблемы и пути их решения, № 1(47) (21 квітня 2025): 166–70. https://doi.org/10.54217/2411-1627.2025.47.1.019.
Pełny tekst źródłaLee, Jaemyoung. "A Driver Identification Method for a Car Through a Wireless Communication." International Journal of Computational and Applied Mathematics & Computer Science 2 (June 4, 2022): 26–28. http://dx.doi.org/10.37394/232028.2022.2.5.
Pełny tekst źródłaRozprawy doktorskie na temat "Car theft"
Williams, Clive Kenneth. "Stealing a car to be a man : the importance of cars and driving in the gender identity of adolescent males." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16422/1/Clive_Williams_Thesis.pdf.
Pełny tekst źródłaWilliams, Clive Kenneth. "Stealing a car to be a man : the importance of cars and driving in the gender identity of adolescent males." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16422/.
Pełny tekst źródłaFrank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.
Pełny tekst źródłaDowning, Christopher O'Brien Jr. "Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/41968.
Pełny tekst źródłaChavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.
Pełny tekst źródłaHolmes, Timothy. "Examination of identity theft and identity fraud and the role of the National Identity Card Scheme." Thesis, Bangor University, 2009. https://research.bangor.ac.uk/portal/en/theses/examination-of-identity-theft-and-identity-fraud-and-the-role-of-the-national-identity-card-scheme(2ea7fafb-d68d-4e1a-9edb-591a1abcf167).html.
Pełny tekst źródłaWilson, Belinda R. "The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3074.
Pełny tekst źródłaBundy, Barbara E. "Preventing looting and vandalism of archaeological sites in the Pacific Northwest." view abstract or download file of text, 2005. http://wwwlib.umi.com/cr/uoregon/fullcit?p3181086.
Pełny tekst źródłaZOU, YU-LIN, and 鄒裕麟. "Car Intelligent Anti-theft System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/d9ewzk.
Pełny tekst źródłaTing, Tsung-pien, and 丁聰編. "Car Theft in Taiwan--A Case Study on Yunlin County." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/94hy6j.
Pełny tekst źródłaKsiążki na temat "Car theft"
Tom, Levesley, and Great Britain. Home Office. Research, Development and Statistics Directorate., eds. Emerging methods of car theft - theft of keys. Home Office. Research, Development and Statistics Directorate, 2004.
Znajdź pełny tekst źródłaHoughton, George. Car theft in England and Wales: The Home Office car theft index. Home Office, 1992.
Znajdź pełny tekst źródłaClaire, Nee, Ingham Helen, and Great Britain. Home Office. Research and Planning Unit., eds. Car theft: The offender's perspective. HMSO, 1993.
Znajdź pełny tekst źródłaG, Maxfield Michael, and Clarke R. V. G, eds. Understanding and preventing car theft. Criminal Justice Press, 2004.
Znajdź pełny tekst źródłaDavid, Biles, Willing Ray, National Roads and Motorists' Association., and Australian Institute of Criminology, eds. Car theft: Putting on the brakes : proceedings of seminar on car theft, May 21, 1987. Published by the NRMA in association with the Australian Institute of Criminology, 1987.
Znajdź pełny tekst źródłaWebb, Barry. Preventing car crime in car parks. Home Office, Crime Prevention Unit, 1992.
Znajdź pełny tekst źródłaHoness, Terry. Vehicle watch and car theft: An evaluation. Home Office Police Research Group, 1993.
Znajdź pełny tekst źródłaIllinois Motor Vehicle Theft Prevention Council. How to prevent car theft: Park Smart Program. [Illinois Motor Vehicle Theft Prevention Council], 1995.
Znajdź pełny tekst źródłaCzęści książek na temat "Car theft"
Kommaraju, Rajasekhar, Rangachary Kommanduri, S. Rama Lingeswararao, Boyapati Sravanthi, and Cherukumalli Srivalli. "IoT Based Vehicle (Car) Theft Detection." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51859-2_56.
Pełny tekst źródłaFujita, Shuryo, and Michael Maxfield. "Security and the Drop in Car Theft in the United States." In The International Crime Drop. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137291462_10.
Pełny tekst źródłaMéndez Cam, Joseph Ramses, Félix Melchor Santos López, Víctor Genaro Rosales Urbano, and Eulogio Guillermo Santos de la Cruz. "Prediction Models for Car Theft Detection Using CCTV Cameras and Machine Learning: A Systematic Review of the Literature." In CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI). Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30592-4_14.
Pełny tekst źródłaSravani, G., Ganesh B. Regulwar, G. Sairam, M. Nikitha, Ch Sowmya, and Bhaskerreddy Kethireddy. "Detecting Credit Card Theft with Various Machine Learning Methods." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-8031-0_76.
Pełny tekst źródłaBowles, Kate. "15. Vulnerability and generosity: The good future for Australian higher education." In Higher Education for Good. Open Book Publishers, 2023. http://dx.doi.org/10.11647/obp.0363.15.
Pełny tekst źródłaBäckström, Tom, Siddharth Ravi, and Francisco Florez-Revuelta. "Privacy Preservation in Audio and Video." In Intelligent Systems Reference Library. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84158-3_3.
Pełny tekst źródła"Car Theft." In Encyclopedia of Criminology and Criminal Justice. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5690-2_100051.
Pełny tekst źródłaFletcher, George P. "The Topology of Theft." In Rethinking Criminal Law. Oxford University PressNew York, NY, 2000. http://dx.doi.org/10.1093/oso/9780195136951.003.0001.
Pełny tekst źródła"‘Cake Uncles’." In Crime and the Chinese Dream, edited by Zhang Xi. Hong Kong University Press, 2018. http://dx.doi.org/10.5790/hongkong/9789888208661.003.0003.
Pełny tekst źródłaOrmerod, David, and Karl Laird. "21. Making off without payment." In Smith, Hogan, & Ormerod's Criminal Law. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198807094.003.0021.
Pełny tekst źródłaStreszczenia konferencji na temat "Car theft"
Xu, Jiaxin, Yujie Fan, Jiarong Ying, and Hui Qian. "Design of Car Anti-theft System Based on Face Recognition." In 2025 2nd International Conference on Digital Image Processing and Computer Applications (DIPCA). IEEE, 2025. https://doi.org/10.1109/dipca65051.2025.11042443.
Pełny tekst źródłaHu, Jingwei, Zengji Liu, Xia Zhou, and Tengfei Zhang. "CNN-DBSCAN Intermittent Electricity Theft Detection Method for High Loss Station Areas Based on Correlation Analysis." In 2024 China Automation Congress (CAC). IEEE, 2024. https://doi.org/10.1109/cac63892.2024.10865767.
Pełny tekst źródłaHeld, Craig. "The Economic Benefits, Applications and Innovations for Battery-Powered Remote Monitoring." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11048.
Pełny tekst źródłaSchroeder, Thaddeus, and John G. Neuman. "The Vehicle Anti-Theft System -VATS." In Passenger Car Meeting & Exposition. SAE International, 1986. http://dx.doi.org/10.4271/861359.
Pełny tekst źródłaJoo, Kyungho, Wonsuk Choi, and Dong Hoon Lee. "Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23107.
Pełny tekst źródłaZulkifli, Malina, Noriszura Ismail, Ahmad Mahir Razali, and Maznah Mat Kasim. "Development of car theft crime index in peninsular Malaysia." In PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4882602.
Pełny tekst źródłaZulkifli, Malina, Agnes Beh Yen Ling, Maznah Mat Kasim, and Noriszura Ismail. "Modeling the number of car theft using Poisson regression." In THE 4TH INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2016). Author(s), 2016. http://dx.doi.org/10.1063/1.4966108.
Pełny tekst źródłaZhang, Kaisheng, Jinhao Liu, and Lijun Fan. "A car theft deterrent system research based on ARM9." In International Conference on Photonics and Image in Agriculture Engineering (PIAGENG 2009). SPIE, 2009. http://dx.doi.org/10.1117/12.836830.
Pełny tekst źródłaChen, Chin-Ling, Yong-Yuan Deng, Jia-Qin Zhang, Xin-Wei He, Jing-Xiang Chen, and Cheng-Ze Lu. "A reliable integrated car anti-theft system in VANET." In 2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2019. http://dx.doi.org/10.1109/icce-tw46550.2019.8991896.
Pełny tekst źródłaBagavathy, P., R. Dhaya, and T. Devakumar. "Real time car theft decline system using ARM processor." In 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011). IET, 2011. http://dx.doi.org/10.1049/ic.2011.0059.
Pełny tekst źródłaRaporty organizacyjne na temat "Car theft"
Goerg, Sebastian J., Oliver Himmler, and Tobias König. Norm Violations and Behavioral Spillovers: Evidence From the Lab and The Field. Department of Economics and Statistics, Linnaeus University, 2024. http://dx.doi.org/10.15626/ns.wp.2024.08.
Pełny tekst źródłaEastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.
Pełny tekst źródłaEtu, Egbe-Etu, Asha Weinstein Agrawal, Imokhai Tenebe, Jordan Larot, and Dang Minh Nhu Nguyen. Misconduct on Public Transit: An Exploratory Analysis Using the Comments Formerly Known as Tweets. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2317.
Pełny tekst źródłaRohwerder, Brigitte, and Carolina Szyp. The Risks and Outcomes of Getting Help for Marginalised People: Navigating Access to Social Assistance in Crises. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/basic.2022.007.
Pełny tekst źródłaDomínguez, Patricio, and Carlos Scartascini. Willingness to pay for crime reduction: evidence from six countries in the Americas. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004531.
Pełny tekst źródłaRossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.
Pełny tekst źródła