We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 2,128 results
  1. Intruder Vehicle Detection During a Platoon Joining Maneuver

    To perform the different platoon maneuvers such as joining, merging, splitting, etc., platoon communication requires considerable cooperation among...
    Haifa Gharbi, Imen Jemili, Sabra Mabrouk in Distributed Computing for Emerging Smart Networks
    Conference paper 2024
  2. Intruder Detection and Tracking Using Computer Vision and IoT

    According to FBI Uniform Crime Reporting (UCR) statistics per year, there are roughly 2.5 million property-related burglaries, and out of which, the...
    Devarakonda Abhinay, Krishna Chaitanya, Prakki Sathwik Ram in Advances in Signal Processing and Communication Engineering
    Conference paper 2022
  3. EL-ID-BID: Ensemble Stacking-Based Intruder Detection in BoT-IoT Data

    The Internet of Things continues to grow in size, connection, and applicability. Just like other new technologies, this ecosystem affects every area...
    Cheruku Poorna Venkata Srinivasa Rao, Rudrarapu Bhavani, ... Gedela Raviteja in International Conference on Innovative Computing and Communications
    Conference paper 2024
  4. Exploring Transformers for Intruder Detection in Complex Maritime Environment

    The vast expanse of the coastline makes it difficult and expensive to deploy resources for monitoring it for safety from intruders or illegal...
    Mrunalini Nalamati, Muhammad Saqib, ... Michael Blumenstein in AI 2021: Advances in Artificial Intelligence
    Conference paper 2022
  5. Proposing Host-Based Intruder Detector and Alert System (HIDAS) for Cloud Computing

    The use of online applications is increasing regularly, and during this COVID-19 pandemic, its usefulness is envisaged to all of us. Data sharing...
    Amit Kumar Chaturvedi, Punit Kumar, Kalpana Sharma in Proceedings of International Conference on Communication and Artificial Intelligence
    Conference paper 2021
  6. Accuracy Performance Analysis of Safety Sensors Based NETPIE-Intruder Detection System on Internet of Things Platform

    The Internet of Things (IoT) has become an addition of humans. IoT assists in the security work to increase the quality of people life. This paper...

    Wasana Boonsong, Oluseye Adeleke, Widad Ismail in Wireless Personal Communications
    Article 01 April 2021
  7. Multi-layered Object Identification and Detection Using Deep CNN Detector

    There are many people today engaged in several activities spread over numerous locations. For a safe environment and safety, it may be necessary to...
    I. Vasudevan, N. S. Nithya in Soft Computing and Signal Processing
    Conference paper 2024
  8. Staked deep ensemble model for intruder behaviour detection and classification in cloud

    Computer systems, cloud networks, and information systems can all be attacked, but intrusion detection systems can find them. It is challenging to...

    M. Mohan, V. Tamizhazhagan, S. Balaji in Multimedia Tools and Applications
    Article 14 December 2023
  9. A Parallel Signal Detector Approach for Detection of Human Activities Using Multiple Seismic Sensors

    Intrusion detection systems play an important role in the protection of vital installations and automated monitoring of unmanned areas. Seismic...
    Rahul Walia, Manjeet Singh, ... Ripul Ghosh in Emerging Electronics and Automation
    Conference paper 2024
  10. Intruder Detection on Mobile Phones Using Keystroke Dynamic and Application Usage Patterns

    Security through biometric keystroke and user action analysis on mobile phones is a new approach. Most of the existing solutions track only GPS...
    Michał Szczepanik, Ireneusz Jóźwiak in Advances in Diagnostics of Processes and Systems
    Chapter 2021
  11. Surveillance System for Intruder Detection Using Facial Recognition

    Facial recognition system is used widely to identify and verify the person’s face from image or video source. With the continuous expansion of the...
    Mohammed Umraan Shaikh, Deepali Vora, Abhishek Anurag in Intelligent Computing and Networking
    Conference paper 2021
  12. Induced turbulence in the quantum channel of high dimensional QKD system using structured light

    In the last two decades, structured light patterns with orbital angular momentum (OAM) have been extensively utilized in quantum cryptography or...

    Muhammad Kamran, Muhammad Mubashir Khan, Tahir Malik in Applied Physics B
    Article 17 March 2024
  13. Enhancement of receptive field using dilated convolution for camouflaged human segmentation in RGB images

    Detection of camouflaged human intruder in RGB images is a challenging problem and is of much interest to defence forces and security agencies....

    Vikash Kumar, Raghuraj Singh in Multimedia Tools and Applications
    Article 03 May 2024
  14. Experimental study of intruder components in light neutron-rich nuclei via single-nucleon transfer reaction

    With the development of radioactive beam facilities, studies concerning the shell evolution of unstable nuclei have recently gained prominence....

    Wei Liu, Jian-Ling Lou, ... Dan-Yang Pang in Nuclear Science and Techniques
    Article 06 February 2020
  15. Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection

    In this paper we investigate five traditional techniques to extract features within a face image, and we evaluate them by applying the Kernel-based...
    Anik Alvi, Tarem Ahmed, Mohammad Faisal Uddin in Advanced Information Networking and Applications
    Conference paper 2021
  16. Detector blinding attacks on counterfactual quantum key distribution

    Counterfactual quantum key distribution protocols allow two sides to establish a common secret key using an insecure channel and authenticated public...

    Carlos Navas-Merlo, Juan Carlos Garcia-Escartin in Quantum Information Processing
    Article 02 June 2021
  17. High-j Proton h11/2 and g7/2 Intruder Bands in 113In

    Excited states of 113 In have been populated through the heavy-ion fusion evaporation reaction 110 Pd( 7 Li, 4n) 113 In. A new band with the configuration...

    Ke Yan Ma, **g Bin Lu, ... Cong Bo Li in Journal of the Korean Physical Society
    Article 01 June 2020
  18. Security System Using PIR Sensor

    The “PIR”-based infrared sensor security system is unveiled. With the help of this sensor, we can conserve energy and manage resources efficiently...
    K. Ashwitha, B. R. Puneeth, ... Mohammed Taiyab in Advances in Communication and Applications
    Conference paper 2024
  19. Smart Physical Intruder Detection System for Highly Sensitive Area

    In this ever-growing world of automation and digitization, where data is a pivotal element for the growth of every individual, institution, and...
    Smita Kasar, Vivek Kshirsagar, ... Ninad Rathod in Smart Trends in Computing and Communications
    Conference paper 2020
  20. Intruder Insinuation and Smart Surveillance Using Face Detection and Mask Detection

    A surveillance system uses Raspberry Pi, PIR sensor and mobile devices to provide security at nighttimes against any intrusion and theft in shop**...
    M. Rajesh Khanna, G. Prakash Raj, ... N. S. Vignesh Raaj in ICT Systems and Sustainability
    Conference paper 2021
Did you find what you were looking for? Share feedback.