Automated Security Systems
In: International Journal of Electrical Engineering & Technology, Volume 11(2), p. 121-128
22751 results
Sort by:
In: International Journal of Electrical Engineering & Technology, Volume 11(2), p. 121-128
SSRN
In: The military engineer: TME, Volume 95, Issue 623, p. 31-32
ISSN: 0026-3982, 0462-4890
In: Bulletin of peace proposals: to motivate research, to inspire future oriented thinking, to promote activities for peace, Volume 14, Issue 2, p. 191-194
ISSN: 0007-5035
PEACE RESEARCH INDICATES THAT ARMAMENTS, INSECURITY, AND UNDERDEVELOPMENT ARE LINKED. TO GET A HANDLE ON HOW TO REVERSE DIRECTION ON THESE THREE GEARS SIMULTANEOUSLY IS NO SMALL TASK. PEACE RESEARCH ALSO INDICATES THAT THERE ARE FIVE ELEMENTS IN ALTERNATE SECURITY, AND A LITTLE ABOUT HOW TO PROCEED IN IMPLEMENTING EACH ELEMENT IS GIVEN.
In: ASEAN economic bulletin, 3,1
In: Proceedings of the ... Conference of the Federation of ASEAN Economic Associations, 10
World Affairs Online
In: Bulletin of peace proposals: to motivate research, to inspire future oriented thinking, to promote activities for peace, Volume 14, Issue 2, p. 191-194
ISSN: 2516-9181
In: Bulletin of peace proposals: to motivate research, to inspire future oriented thinking, to promote activities for peace, Volume 11, Issue 3, p. 256-262
ISSN: 2516-9181
In: Security of e-Systems and Computer Networks, p. 99-118
In: Journal of social development in Africa, Volume 17, Issue 2
ISSN: 1726-3700
In: Services and Business Process Reengineering
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
In: The military engineer: TME, Volume 95, Issue 623, p. 35-36
ISSN: 0026-3982, 0462-4890
Publication years: 1997-2008 (electronic)
In: STATE AND MUNICIPAL MANAGEMENT SCHOLAR NOTES, p. 115-127
The authors considered the issues and problems of digitalization of security systems in various areas: public, transport, information. Research has been carried out of projects for the digital transformation of the security systems of the constituent entities of the Russian Federation with an emphasis on grouping regions according to the level of activity in the development and implementation of these projects. This report provides an overview of regional practices of management systems and ensuring the safety of the population, information systems, transport systems, and the urban environment. The example of Krasnoyarsk Krai shows the processes of digital transformation of the security sphere, its problems and prospects. The factors that hinder achievement of goals of projects of digital transformation of industry «Security» of subjects of the Russian Federation have been determined. It reveals competitive advantages and socio-economic effects of digital transformation.
In: The military engineer: TME, Volume 95, Issue 623, p. 27-28
ISSN: 0026-3982, 0462-4890