We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 537 results
  1. Intruder Detection and Tracking Using Computer Vision and IoT

    According to FBI Uniform Crime Reporting (UCR) statistics per year, there are roughly 2.5 million property-related burglaries, and out of which, the...
    Devarakonda Abhinay, Krishna Chaitanya, Prakki Sathwik Ram in Advances in Signal Processing and Communication Engineering
    Conference paper 2022
  2. EL-ID-BID: Ensemble Stacking-Based Intruder Detection in BoT-IoT Data

    The Internet of Things continues to grow in size, connection, and applicability. Just like other new technologies, this ecosystem affects every area...
    Cheruku Poorna Venkata Srinivasa Rao, Rudrarapu Bhavani, ... Gedela Raviteja in International Conference on Innovative Computing and Communications
    Conference paper 2024
  3. Proposing Host-Based Intruder Detector and Alert System (HIDAS) for Cloud Computing

    The use of online applications is increasing regularly, and during this COVID-19 pandemic, its usefulness is envisaged to all of us. Data sharing...
    Amit Kumar Chaturvedi, Punit Kumar, Kalpana Sharma in Proceedings of International Conference on Communication and Artificial Intelligence
    Conference paper 2021
  4. Accuracy Performance Analysis of Safety Sensors Based NETPIE-Intruder Detection System on Internet of Things Platform

    The Internet of Things (IoT) has become an addition of humans. IoT assists in the security work to increase the quality of people life. This paper...

    Wasana Boonsong, Oluseye Adeleke, Widad Ismail in Wireless Personal Communications
    Article 01 April 2021
  5. Multi-layered Object Identification and Detection Using Deep CNN Detector

    There are many people today engaged in several activities spread over numerous locations. For a safe environment and safety, it may be necessary to...
    I. Vasudevan, N. S. Nithya in Soft Computing and Signal Processing
    Conference paper 2024
  6. A Parallel Signal Detector Approach for Detection of Human Activities Using Multiple Seismic Sensors

    Intrusion detection systems play an important role in the protection of vital installations and automated monitoring of unmanned areas. Seismic...
    Rahul Walia, Manjeet Singh, ... Ripul Ghosh in Emerging Electronics and Automation
    Conference paper 2024
  7. Intruder Detection on Mobile Phones Using Keystroke Dynamic and Application Usage Patterns

    Security through biometric keystroke and user action analysis on mobile phones is a new approach. Most of the existing solutions track only GPS...
    Michał Szczepanik, Ireneusz Jóźwiak in Advances in Diagnostics of Processes and Systems
    Chapter 2021
  8. Surveillance System for Intruder Detection Using Facial Recognition

    Facial recognition system is used widely to identify and verify the person’s face from image or video source. With the continuous expansion of the...
    Mohammed Umraan Shaikh, Deepali Vora, Abhishek Anurag in Intelligent Computing and Networking
    Conference paper 2021
  9. Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection

    In this paper we investigate five traditional techniques to extract features within a face image, and we evaluate them by applying the Kernel-based...
    Anik Alvi, Tarem Ahmed, Mohammad Faisal Uddin in Advanced Information Networking and Applications
    Conference paper 2021
  10. Security System Using PIR Sensor

    The “PIR”-based infrared sensor security system is unveiled. With the help of this sensor, we can conserve energy and manage resources efficiently...
    K. Ashwitha, B. R. Puneeth, ... Mohammed Taiyab in Advances in Communication and Applications
    Conference paper 2024
  11. Smart Physical Intruder Detection System for Highly Sensitive Area

    In this ever-growing world of automation and digitization, where data is a pivotal element for the growth of every individual, institution, and...
    Smita Kasar, Vivek Kshirsagar, ... Ninad Rathod in Smart Trends in Computing and Communications
    Conference paper 2020
  12. Intruder Insinuation and Smart Surveillance Using Face Detection and Mask Detection

    A surveillance system uses Raspberry Pi, PIR sensor and mobile devices to provide security at nighttimes against any intrusion and theft in shop**...
    M. Rajesh Khanna, G. Prakash Raj, ... N. S. Vignesh Raaj in ICT Systems and Sustainability
    Conference paper 2021
  13. Detection and Tracking of Mobile Intruder in Harsh Geographical Terrains Using Surveillance Wireless Sensor Networks

    The physical threat is a critical issue for the security of the sensitive regions. The sensitive regions are very much prone to unauthorized access....
    Chapter 2020
  14. Implementation of Women’s Self-Security System Using IoT-Based Device

    In the recent days, one of the significant problems for women is personal safety. According to one of the World Health Organization (WHO) polls,...
    Sonia Das, M. R. Pooja, K. S. Anusha in Sustainable Computing
    Chapter 2023
  15. A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

    The significance of wireless networks is expanding very rapidly, and their increasing pervasiveness makes them a vital component of the activities...

    Yogendra Kumar, Vijay Kumar in Wireless Personal Communications
    Article 01 November 2023
  16. LEWRY Your Smart Home Security Robot

    Thefts, robberies and accidents inside homes have become a very huge issue these days. The thing is that it's uncommon from a people's perspective....
    Conference paper 2024
  17. Home Security System Using Wireless Sensors Network

    In this paper, we propose a smart and robust home security system. This is for intrusion detection along with a proprietary Android application....

    Siddhant Sanjay Satam, Hosam El-Ocla in Wireless Personal Communications
    Article 11 March 2022
  18. Affordable Smart Kit for Coconut Farm Management Using IoT

    The field of agriculture has been the principal source of income for many rural farmers in India, accounting for almost 53.6% of the population. With...
    S. Sri Sankar, S. Viswesh, ... G. Balasubramanian in Internet of Things (IoT): Key Digital Trends Sha** the Future
    Conference paper 2023
  19. A Survey of Learning Techniques for Detecting DDOS Assaults

    The distributed denial-of-service (DDOS) exploit is one of the most catastrophic assaults on the Internet, disrupting the performance of critical...
    K. Jeevan Pradeep, Pragnyaban Mishra in ICT Analysis and Applications
    Conference paper 2023
  20. Container monitoring with infrared catadioptric imaging and automatic intruder detection

    We describe a framework for global ship** container monitoring using machine learning with low-power sensor hubs and infrared catadioptric imaging....

    Victor E. Trujillo II, Mark K. Hinders in SN Applied Sciences
    Article 25 November 2019
Did you find what you were looking for? Share feedback.