Gotowa bibliografia na temat „Car theft”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Car theft”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Car theft"

1

Gupta, Rupesh, Gaurav Jagdev, Gurjant Singh, Gurwinder Bir Singh, and Manjot Singh. "Anti-Theft and Temperature Control of Car Wheel." Applied Mechanics and Materials 710 (January 2015): 77–82. http://dx.doi.org/10.4028/www.scientific.net/amm.710.77.

Pełny tekst źródła
Streszczenie:
Vehicle theft and vandalism is unfortunately an extremely common problem. As our world is modernizing, the ways of thefts are also changing and are becoming more and more sophisticated. Our project features an anti-theft system for wheels and rims. Moreover, the overheating and further bursting of the wheels has also been a major issue which has been worked over in this project.
Style APA, Harvard, Vancouver, ISO itp.
2

Miniappan, P. K., R. Krishnan, Laeth Hussain, Yamuna Bheemanpally, and Gotlur Karuna. "Remote engine shutdown system with theft alert via sms for vehicle owners." E3S Web of Conferences 564 (2024): 07008. http://dx.doi.org/10.1051/e3sconf/202456407008.

Pełny tekst źródła
Streszczenie:
The global auto theft rate is on the rise, which highlights the critical need for effective anti-theft policies. In order to solve this urgent problem, this article suggests a novel solution: the introduction of a theft intimation system that uses SMS technology to notify car owners in real- time and provide them the ability to remotely stop the engine, preventing theft attempts. The suggested solution combines cutting-edge hardware elements and software algorithms to identify illegal vehicle entry and send the owner an SMS notice right away. The system uses microcontrollers and cutting-edge s
Style APA, Harvard, Vancouver, ISO itp.
3

Lockhart, Bill. "CAR THEFT IN BELFAST." Criminal Justice Matters 13, no. 1 (1993): 15–16. http://dx.doi.org/10.1080/09627259308553340.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

J., A. Enokela, and Ibanga E.J. "AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM." Continental J. Engineering Sciences 1 (July 22, 2007): 15–19. https://doi.org/10.5281/zenodo.833559.

Pełny tekst źródła
Streszczenie:
The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system described will effectively defeat intended car thieves.
Style APA, Harvard, Vancouver, ISO itp.
5

MACH, Vlastimil. "PROTECTING OF CAR FROM THEFT." Krízový Manažment 11, no. 2 (2012): 52–58. http://dx.doi.org/10.26552/krm.c.2012.2.52-58.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Patil, Pritam. "Car Theft Detection and Tracking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 639–46. http://dx.doi.org/10.22214/ijraset.2022.45353.

Pełny tekst źródła
Streszczenie:
Abstract: The Anti-theft system is installed in the car, it tracks the location of the car continuously and has user’s mobile number stored in it for alerting purpose. The location of the car is obtained by global positioning system (GPS) and sent to user through global system mobile communication (GSM). There are two modes of operation of the system - Active Mode and Sleep Mode. When the system is turned on by connecting to power supply, it is initially in the Sleep Mode. In the Sleep Mode, the door sensor is inactive and ignition of motor is active, can be used to start the engine of the car
Style APA, Harvard, Vancouver, ISO itp.
7

Gonzalez-Navarro, Marco. "Deterrence and Geographical Externalities in Auto Theft." American Economic Journal: Applied Economics 5, no. 4 (2013): 92–110. http://dx.doi.org/10.1257/app.5.4.92.

Pełny tekst źródła
Streszczenie:
Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. However, 18 percent of the reduction in thefts was displaced toward unprotected Lojack models in non-Loj
Style APA, Harvard, Vancouver, ISO itp.
8

Cao, Enqi, Fanliang Bu, and Zhuxuan Han. "AutoEncoder-Based Data Completion Model for Theft Cases of Items Inside Cars." Frontiers in Computing and Intelligent Systems 9, no. 1 (2024): 1–4. http://dx.doi.org/10.54097/3b7gwn94.

Pełny tekst źródła
Streszczenie:
Accurate and reliable prediction results depend on high-quality data, and missing data is one of the key factors affecting data quality. This paper proposes a data completion model for car interior theft cases based on an AutoEncoder, which adopts an AutoEncoder architecture combining Re-parameterized Convolutional Neural Network and Recurrent Neural Network. Experimental results show that RepConv-RNN-AE can effectively complete the missing values in car interior theft case data and demonstrates superiority in completing missing data in car interior theft cases.
Style APA, Harvard, Vancouver, ISO itp.
9

Ахмяров, Р. Ш. "Специально-криминологическое предупреждение краж и угонов автотранспортных средств органами внутренних дел Российской Федерации". Расследование преступлений: проблемы и пути их решения, № 1(47) (21 квітня 2025): 166–70. https://doi.org/10.54217/2411-1627.2025.47.1.019.

Pełny tekst źródła
Streszczenie:
Предупреждение краж и угонов автотранспортных средств возможно посредством реализации общих и специально-криминологических мер. В статье уделено внимание специально-криминологическим мерам предупреждения краж и угонов автотранспортных средств и раскрыто содержание данных мер, реализуемых органами внутренних дел Российской Федерации. The prevention of theft and car theft is possible through the implementation of general measures and special criminological ones. The article focuses on special criminological measures to prevent theft and car theft and reveals the content of these measures impleme
Style APA, Harvard, Vancouver, ISO itp.
10

Lee, Jaemyoung. "A Driver Identification Method for a Car Through a Wireless Communication." International Journal of Computational and Applied Mathematics & Computer Science 2 (June 4, 2022): 26–28. http://dx.doi.org/10.37394/232028.2022.2.5.

Pełny tekst źródła
Streszczenie:
To prevent car thefts, we propose a driver identification method through a wireless communication using a smart phone and a system equipped with an NFC chip in a car. Driver identifications are carried out by approaching the driver’s NFC device to the NFC system in the car which does not require complicated systems to install the NFC in a car. For a theft case in which driver’s NFC code does not match to the registered, subsequent steps could be taken into action. In the proposed method, we can trace the stolen car by sending GPS information to the owner. The proposed method which does not req
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Car theft"

1

Williams, Clive Kenneth. "Stealing a car to be a man : the importance of cars and driving in the gender identity of adolescent males." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16422/1/Clive_Williams_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Nationally vehicle theft is associated with approximately 40 fatalities per year with an estimated annual cost of one billion dollars. During 2000 - 2001 almost 139,000 motor vehicles (cars, motor cycles, campervans, and trucks) were stolen across Australia. Vehicle theft is an overwhelmingly adolescent male crime yet gender has not been considered in either policy or program initiatives.----- This thesis used Spence's Multifactorial Gender Identity theory to examine the relationships between vehicle theft, offending, and adolescent male gender identity. Four central research quest
Style APA, Harvard, Vancouver, ISO itp.
2

Williams, Clive Kenneth. "Stealing a car to be a man : the importance of cars and driving in the gender identity of adolescent males." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16422/.

Pełny tekst źródła
Streszczenie:
Nationally vehicle theft is associated with approximately 40 fatalities per year with an estimated annual cost of one billion dollars. During 2000 - 2001 almost 139,000 motor vehicles (cars, motor cycles, campervans, and trucks) were stolen across Australia. Vehicle theft is an overwhelmingly adolescent male crime yet gender has not been considered in either policy or program initiatives.----- This thesis used Spence's Multifactorial Gender Identity theory to examine the relationships between vehicle theft, offending, and adolescent male gender identity. Four central research questi
Style APA, Harvard, Vancouver, ISO itp.
3

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Pełny tekst źródła
Streszczenie:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.<br>Title from opening screen, December 28, 1999.
Style APA, Harvard, Vancouver, ISO itp.
4

Downing, Christopher O'Brien Jr. "Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/41968.

Pełny tekst źródła
Streszczenie:
Cashiers' identification-checking behaviors were observed at two grocery stores with the aim to actively involve cashiers in decreasing credit-card fraud. After baseline observations, cashiers at one store received a participative goal-setting and feedback intervention, whereby they collaboratively set a store goal for checking customers' identification. Over 23 days, the cashiers received one-to-one verbal feedback on their store's identification-checking percentages. The percentage of identification-checked purchases at the intervention store increased from 0.2 percent at Baseline to 9.7
Style APA, Harvard, Vancouver, ISO itp.
5

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Pełny tekst źródła
Streszczenie:
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove target
Style APA, Harvard, Vancouver, ISO itp.
6

Holmes, Timothy. "Examination of identity theft and identity fraud and the role of the National Identity Card Scheme." Thesis, Bangor University, 2009. https://research.bangor.ac.uk/portal/en/theses/examination-of-identity-theft-and-identity-fraud-and-the-role-of-the-national-identity-card-scheme(2ea7fafb-d68d-4e1a-9edb-591a1abcf167).html.

Pełny tekst źródła
Streszczenie:
Since the start of the 21st century the terms identity theft and identity fraud have been used to describe a variety of crimes which appear both new and unique to the 21st century. So much so, that the government is in the process of re-introducing a National Identity Card Scheme to tackle the problem. But are identity theft and identity fraud uniquely 21st century problems, and is a new Identity Card Scheme going to prevent these crimes? The study seeks to examine identity theft and identity fraud and determine what these crimes are, and to distinguish between the two. In order to do this, th
Style APA, Harvard, Vancouver, ISO itp.
7

Wilson, Belinda R. "The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3074.

Pełny tekst źródła
Streszczenie:
Identity theft and credit and bank card fraud is increasing in America and worldwide. Given the current statistics of its prevalence and practices around the world, many in government are starting to take critical notice due to its impact on a nation’s economy. Limited amounts of research have been conducted regarding the practices of applying the Routine Activities Theory (Cohen & Felson, 1979) to better equip store managers in understanding the critical need for capable and effective point of sale guardianship for in-store prevention of credit or bank card fraud due to identity theft. This r
Style APA, Harvard, Vancouver, ISO itp.
8

Bundy, Barbara E. "Preventing looting and vandalism of archaeological sites in the Pacific Northwest." view abstract or download file of text, 2005. http://wwwlib.umi.com/cr/uoregon/fullcit?p3181086.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--University of Oregon, 2005.<br>Typescript. Includes vita and abstract. Includes bibliographical references (leaves 264-281). Also available for download via the World Wide Web; free to University of Oregon users.
Style APA, Harvard, Vancouver, ISO itp.
9

ZOU, YU-LIN, and 鄒裕麟. "Car Intelligent Anti-theft System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/d9ewzk.

Pełny tekst źródła
Streszczenie:
碩士<br>聖約翰科技大學<br>資訊與通訊系碩士班<br>107<br>This study uses NB-IoT communication and environment sensors to achieve the function of car anti-theft, and uses the cloud database and message push platform to achieve the function of instant notification. The anti-theft device is the size of the box, can be placed in the car. The system is divided into two parts; a physical device end and a data message end. The physical device end is composed of an environment sensor, a microprocessor, and an NB-IoT communication technology. The device will alert and save all data, when a thief wants to steal the vehicle
Style APA, Harvard, Vancouver, ISO itp.
10

Ting, Tsung-pien, and 丁聰編. "Car Theft in Taiwan--A Case Study on Yunlin County." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/94hy6j.

Pełny tekst źródła
Streszczenie:
碩士<br>南華大學<br>歐洲研究所<br>101<br>The police tasks in accordance with the law are to maintain public order, to protect the social security, to prevent all harm and to promote the welfare of the people. People look forward to being free from fear and grudge, which is also the work of government. Feeling and evaluation of people toward the order of society depends on whether their own life, liberty, property rights were being violated and the most concerned topic of people is vehicles larceny. Because people do not have enough concept of preventing theft and do not have enough facilities, car theft
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Car theft"

1

Tom, Levesley, and Great Britain. Home Office. Research, Development and Statistics Directorate., eds. Emerging methods of car theft - theft of keys. Home Office. Research, Development and Statistics Directorate, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Houghton, George. Car theft in England and Wales: The Home Office car theft index. Home Office, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Nee, Claire. Car theft: The offender's perspective. Home Office, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Claire, Nee, Ingham Helen, and Great Britain. Home Office. Research and Planning Unit., eds. Car theft: The offender's perspective. HMSO, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

G, Maxfield Michael, and Clarke R. V. G, eds. Understanding and preventing car theft. Criminal Justice Press, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

David, Biles, Willing Ray, National Roads and Motorists' Association., and Australian Institute of Criminology, eds. Car theft: Putting on the brakes : proceedings of seminar on car theft, May 21, 1987. Published by the NRMA in association with the Australian Institute of Criminology, 1987.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Webb, Barry. Preventing car crime in car parks. Home Office, Crime Prevention Unit, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Honess, Terry. Vehicle watch and car theft: An evaluation. Home Office Police Research Group, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Illinois Motor Vehicle Theft Prevention Council. How to prevent car theft: Park Smart Program. [Illinois Motor Vehicle Theft Prevention Council], 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Atinuke. The No. 1 car spotter and the car thieves. Walker, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Car theft"

1

Kommaraju, Rajasekhar, Rangachary Kommanduri, S. Rama Lingeswararao, Boyapati Sravanthi, and Cherukumalli Srivalli. "IoT Based Vehicle (Car) Theft Detection." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51859-2_56.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Fujita, Shuryo, and Michael Maxfield. "Security and the Drop in Car Theft in the United States." In The International Crime Drop. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137291462_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Méndez Cam, Joseph Ramses, Félix Melchor Santos López, Víctor Genaro Rosales Urbano, and Eulogio Guillermo Santos de la Cruz. "Prediction Models for Car Theft Detection Using CCTV Cameras and Machine Learning: A Systematic Review of the Literature." In CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI). Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30592-4_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sravani, G., Ganesh B. Regulwar, G. Sairam, M. Nikitha, Ch Sowmya, and Bhaskerreddy Kethireddy. "Detecting Credit Card Theft with Various Machine Learning Methods." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-8031-0_76.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bowles, Kate. "15. Vulnerability and generosity: The good future for Australian higher education." In Higher Education for Good. Open Book Publishers, 2023. http://dx.doi.org/10.11647/obp.0363.15.

Pełny tekst źródła
Streszczenie:
In this chapter, an Australian university tree-planting event to welcome international students is looked at as a scene with multiple possible histories and futures. The chapter asks how Australian universities became structurally dependent on international student fee revenue and were thrown into crisis when Australia’s borders were closed in 2020. During this crisis period, Australian universities continued to acknowledge in ritual ways their position on unceded (stolen) Aboriginal Country. Using ideas about generosity, vulnerability and thinking with care,the authors asks whether the proven
Style APA, Harvard, Vancouver, ISO itp.
6

Bäckström, Tom, Siddharth Ravi, and Francisco Florez-Revuelta. "Privacy Preservation in Audio and Video." In Intelligent Systems Reference Library. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84158-3_3.

Pełny tekst źródła
Streszczenie:
Abstract Audio and video sensors are useful in Active Assisted Living (AAL) systems as they provide a rich source of information in well-known formats and since such sensors are readily available. This, however, also means that audio and video sensors will record a wide range of private information. Misusing this private information can have far-reaching consequences, including extortion, theft, and harassment. This chapter provides an overview of privacy issues in video and audio from the perspective of AAL systems and the most important protections for privacy.
Style APA, Harvard, Vancouver, ISO itp.
7

"Car Theft." In Encyclopedia of Criminology and Criminal Justice. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5690-2_100051.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Fletcher, George P. "The Topology of Theft." In Rethinking Criminal Law. Oxford University PressNew York, NY, 2000. http://dx.doi.org/10.1093/oso/9780195136951.003.0001.

Pełny tekst źródła
Streszczenie:
Abstract The field of theft offenses displays a variety as rich as the imagination of those who seek dishonest gain. There are crimes committed in cashing bad checks, misusing credit cards, eating at a restaurant wit)10ut paying, joyriding in another person’s car, appropriating someone else’s electricity—the list goes on and on. In this book we could not canvass all of these crimes of dishonest acquisition even if we were so inclined. Our objective will be to elicit the basic structure of theft by focussing on three types of crime that have crystallized in all Western legal systems. The tradit
Style APA, Harvard, Vancouver, ISO itp.
9

"‘Cake Uncles’." In Crime and the Chinese Dream, edited by Zhang Xi. Hong Kong University Press, 2018. http://dx.doi.org/10.5790/hongkong/9789888208661.003.0003.

Pełny tekst źródła
Streszczenie:
Zhang Xi explains the formation of “criminal villages” in the Chinese countryside. The type of illegal activities engaged in by the rural population stretches from pilfering, common theft, car theft, burglary, assault, robbery and fraud, and can be seen as a way out for peasants who have no way of getting by through legal means like planting cash crops or engaging in other legal businesses. The chapter discusses a special case of fraud or scam committed by so-called “cake uncles”, emerging when petty fraudsters delivered cakes locally and falsified account books. This illegal economy expanded
Style APA, Harvard, Vancouver, ISO itp.
10

Ormerod, David, and Karl Laird. "21. Making off without payment." In Smith, Hogan, & Ormerod's Criminal Law. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198807094.003.0021.

Pełny tekst źródła
Streszczenie:
This chapter considers the offence of making off without payment. Under s 3 of the Theft Act 1978, a person is guilty of an offence if he dishonestly makes off without making payment as required or expected and with the intent to avoid payment of the amount due. The offence aims to deal in a simple and straightforward way with a person who having consumed a meal in a restaurant, or filled the tank of the car with petrol, or reached their destination in a taxi, leaves without paying. Although factually simple, difficulties arise in prosecuting such cases as theft. The chapter covers various ele
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Car theft"

1

Xu, Jiaxin, Yujie Fan, Jiarong Ying, and Hui Qian. "Design of Car Anti-theft System Based on Face Recognition." In 2025 2nd International Conference on Digital Image Processing and Computer Applications (DIPCA). IEEE, 2025. https://doi.org/10.1109/dipca65051.2025.11042443.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hu, Jingwei, Zengji Liu, Xia Zhou, and Tengfei Zhang. "CNN-DBSCAN Intermittent Electricity Theft Detection Method for High Loss Station Areas Based on Correlation Analysis." In 2024 China Automation Congress (CAC). IEEE, 2024. https://doi.org/10.1109/cac63892.2024.10865767.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Held, Craig. "The Economic Benefits, Applications and Innovations for Battery-Powered Remote Monitoring." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11048.

Pełny tekst źródła
Streszczenie:
Abstract As automated remote monitoring with wireless data-communication radios are increasingly becoming a popular choice for many pipeline, energy and utility operators, additional wireless options have begun to emerge. Battery-powered remote monitoring is a new solution that is available for pipe-to-soil measurement. Unlike a traditional wireless system, this automated remote monitoring system option can be submersed and installed underground. Traditionally, a technician would manually collect pipe-to-soil measurements while walking along the pipeline. Battery-powered remote monitoring elim
Style APA, Harvard, Vancouver, ISO itp.
4

Schroeder, Thaddeus, and John G. Neuman. "The Vehicle Anti-Theft System -VATS." In Passenger Car Meeting & Exposition. SAE International, 1986. http://dx.doi.org/10.4271/861359.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Joo, Kyungho, Wonsuk Choi, and Dong Hoon Lee. "Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23107.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zulkifli, Malina, Noriszura Ismail, Ahmad Mahir Razali, and Maznah Mat Kasim. "Development of car theft crime index in peninsular Malaysia." In PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4882602.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zulkifli, Malina, Agnes Beh Yen Ling, Maznah Mat Kasim, and Noriszura Ismail. "Modeling the number of car theft using Poisson regression." In THE 4TH INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2016). Author(s), 2016. http://dx.doi.org/10.1063/1.4966108.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zhang, Kaisheng, Jinhao Liu, and Lijun Fan. "A car theft deterrent system research based on ARM9." In International Conference on Photonics and Image in Agriculture Engineering (PIAGENG 2009). SPIE, 2009. http://dx.doi.org/10.1117/12.836830.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chen, Chin-Ling, Yong-Yuan Deng, Jia-Qin Zhang, Xin-Wei He, Jing-Xiang Chen, and Cheng-Ze Lu. "A reliable integrated car anti-theft system in VANET." In 2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2019. http://dx.doi.org/10.1109/icce-tw46550.2019.8991896.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bagavathy, P., R. Dhaya, and T. Devakumar. "Real time car theft decline system using ARM processor." In 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011). IET, 2011. http://dx.doi.org/10.1049/ic.2011.0059.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Car theft"

1

Goerg, Sebastian J., Oliver Himmler, and Tobias König. Norm Violations and Behavioral Spillovers: Evidence From the Lab and The Field. Department of Economics and Statistics, Linnaeus University, 2024. http://dx.doi.org/10.15626/ns.wp.2024.08.

Pełny tekst źródła
Streszczenie:
This paper explores the contagion effects of norm-violating behavior across decision situations.Through a series of laboratory and field experiments, we empirically establish the conditions under which norm-breaking behavior in one decision situation leads individuals who observe this to violatennorms in other, distinct decision situations. Our laboratory findings show that these spillover effects are more pronounced when the norms underlying the decision situations are perceived to be similar. However, spillovers can also affect decision situations governed by relatively dissimilar norms if t
Style APA, Harvard, Vancouver, ISO itp.
2

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.

Pełny tekst źródła
Streszczenie:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining
Style APA, Harvard, Vancouver, ISO itp.
3

Etu, Egbe-Etu, Asha Weinstein Agrawal, Imokhai Tenebe, Jordan Larot, and Dang Minh Nhu Nguyen. Misconduct on Public Transit: An Exploratory Analysis Using the Comments Formerly Known as Tweets. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2317.

Pełny tekst źródła
Streszczenie:
This project developed a simple methodology for using Twitter data to explore public perceptions about misconduct on public transit in California. The methodology allows future researchers to analyze tweets to answer questions such as: How frequent are tweets related to assault, abuse, or other misconduct on public transit? What concerns arise most frequently? What are the types of behaviors discussed? We collected and analyzed data from Twitter posts in California about various types of public transit misconduct from January 2020 to March 2023 to identify the nature and frequency of reported
Style APA, Harvard, Vancouver, ISO itp.
4

Rohwerder, Brigitte, and Carolina Szyp. The Risks and Outcomes of Getting Help for Marginalised People: Navigating Access to Social Assistance in Crises. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/basic.2022.007.

Pełny tekst źródła
Streszczenie:
Crises exacerbate existing inequalities and vulnerabilities for marginalised people, including women and girls, children and youth, older people, people with disabilities, ethnic and religious minorities, and sexual and gender minorities. Many of them face multiple and intersecting inequalities, especially people who are forcibly displaced. Social assistance seeks to alleviate crisis impacts by protecting vulnerable people and averting them from deprivation, but the same structures and systems that make some people more exposed (and excluded) generally can exclude them from social assistance i
Style APA, Harvard, Vancouver, ISO itp.
5

Domínguez, Patricio, and Carlos Scartascini. Willingness to pay for crime reduction: evidence from six countries in the Americas. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004531.

Pełny tekst źródła
Streszczenie:
Crime levels are a perennial development problem in Latin America and a renewed concern in the United States. At the same time, trust in the police has been falling, and questions abound about citizens' willingness to support government efforts to fight crime. We conduct a survey experiment to elicit willingness to contribute toward reducing crime across five Latin American countries and the United States. We compare homicide, robbery, and theft estimates and find a higher willingness to contribute for more severe crimes and for higher crime reductions. In addition, we examine the role of info
Style APA, Harvard, Vancouver, ISO itp.
6

Rossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.

Pełny tekst źródła
Streszczenie:
Due to the increased reliance of governments on digital data, it is probably safe to suggest that, without it, there would be no state left to defend. Because, without data, there might not even be a continuity of government, and consequently no state, in a time of crisis. Hence, this paper looks at critical national digital data as a key feature of national security. This paper shows why and how the protection of digitalised critical national data is important for a country’s defence at different levels of conflict, both below and above the threshold of armed conflict. This issue can be studi
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!