Search
Search Results
-
Intruder Detection and Tracking Using Computer Vision and IoT
According to FBI Uniform Crime Reporting (UCR) statistics per year, there are roughly 2.5 million property-related burglaries, and out of which, the... -
EL-ID-BID: Ensemble Stacking-Based Intruder Detection in BoT-IoT Data
The Internet of Things continues to grow in size, connection, and applicability. Just like other new technologies, this ecosystem affects every area... -
Proposing Host-Based Intruder Detector and Alert System (HIDAS) for Cloud Computing
The use of online applications is increasing regularly, and during this COVID-19 pandemic, its usefulness is envisaged to all of us. Data sharing... -
Accuracy Performance Analysis of Safety Sensors Based NETPIE-Intruder Detection System on Internet of Things Platform
The Internet of Things (IoT) has become an addition of humans. IoT assists in the security work to increase the quality of people life. This paper...
-
Multi-layered Object Identification and Detection Using Deep CNN Detector
There are many people today engaged in several activities spread over numerous locations. For a safe environment and safety, it may be necessary to... -
A Parallel Signal Detector Approach for Detection of Human Activities Using Multiple Seismic Sensors
Intrusion detection systems play an important role in the protection of vital installations and automated monitoring of unmanned areas. Seismic... -
Intruder Detection on Mobile Phones Using Keystroke Dynamic and Application Usage Patterns
Security through biometric keystroke and user action analysis on mobile phones is a new approach. Most of the existing solutions track only GPS... -
Surveillance System for Intruder Detection Using Facial Recognition
Facial recognition system is used widely to identify and verify the person’s face from image or video source. With the continuous expansion of the... -
Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection
In this paper we investigate five traditional techniques to extract features within a face image, and we evaluate them by applying the Kernel-based... -
Security System Using PIR Sensor
The “PIR”-based infrared sensor security system is unveiled. With the help of this sensor, we can conserve energy and manage resources efficiently... -
Smart Physical Intruder Detection System for Highly Sensitive Area
In this ever-growing world of automation and digitization, where data is a pivotal element for the growth of every individual, institution, and... -
Intruder Insinuation and Smart Surveillance Using Face Detection and Mask Detection
A surveillance system uses Raspberry Pi, PIR sensor and mobile devices to provide security at nighttimes against any intrusion and theft in shop**... -
Detection and Tracking of Mobile Intruder in Harsh Geographical Terrains Using Surveillance Wireless Sensor Networks
The physical threat is a critical issue for the security of the sensitive regions. The sensitive regions are very much prone to unauthorized access.... -
Implementation of Women’s Self-Security System Using IoT-Based Device
In the recent days, one of the significant problems for women is personal safety. According to one of the World Health Organization (WHO) polls,... -
A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications
The significance of wireless networks is expanding very rapidly, and their increasing pervasiveness makes them a vital component of the activities...
-
LEWRY Your Smart Home Security Robot
Thefts, robberies and accidents inside homes have become a very huge issue these days. The thing is that it's uncommon from a people's perspective.... -
Home Security System Using Wireless Sensors Network
In this paper, we propose a smart and robust home security system. This is for intrusion detection along with a proprietary Android application....
-
Affordable Smart Kit for Coconut Farm Management Using IoT
The field of agriculture has been the principal source of income for many rural farmers in India, accounting for almost 53.6% of the population. With... -
A Survey of Learning Techniques for Detecting DDOS Assaults
The distributed denial-of-service (DDOS) exploit is one of the most catastrophic assaults on the Internet, disrupting the performance of critical... -
Container monitoring with infrared catadioptric imaging and automatic intruder detection
We describe a framework for global ship** container monitoring using machine learning with low-power sensor hubs and infrared catadioptric imaging....