<p>Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trus
Recent Trends In Peripheral Security Systems
β Scribed by Abhishek Rawat, Dipankar Deb, Jatin Upadhyay
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 123
- Series
- Services and Business Process Reengineering
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
β¦ Table of Contents
Preface
Contents
About theΒ Authors
Acronyms
List ofΒ Figures
1 Introduction
1.1 Brief Review of Different Systems of Peripheral Security
1.1.1 CCTV Camera
1.1.2 Facial and Object Detection, and Recognition
1.1.3 Radio Frequency-Based Security System
1.1.4 Fingerprint-Based Controlled Access
1.2 Current Studies in Computer Vision and Radio Signal-Based Indoor Navigation Techniques for Tracking
1.2.1 Indoor Navigation Technologies
1.2.2 Challenges in Indoor Navigation and Object Tracking
1.3 Scope of Mitigation in Security Systems
References
2 Design of a Peripheral Security Module Based on Exchange of Specific Data Rates
2.1 Peripheral Security Design as per Data Rate
2.2 Operational System Module
2.3 Simulation Setup of Peripheral Security Using GNU Radio
2.4 Results and Discussions
References
3 System Design for the Detection of Humans Trapped in Snow
3.1 Proposed System Design
3.2 Detailed Description of the System
3.3 Results and Discussions
References
4 WLAN-Based Smart Door Closer Design with Image Classification
4.1 Background and Motivation
4.2 Face Recognition and Detection
4.3 Individual Identity Verification Using Key-Point Matching Algorithm Technique
4.4 Smart Door Closer System
4.5 Working Principle of the Smart Closer System and Robotic Platform
4.6 Data Acquisition (DAQ) of Smart Door Closer over WLAN
4.7 Analysis of Images Received from CCTV Units
References
5 Robotic System Configuration with Localization, Path Planning, and Computer Vision
5.1 Methodology
5.2 Mapping of Collected SamplesβData Distribution and Behavioral Investigation
5.3 Classification Analysis and Results of Image Processing Models
References
6 Secured System Design for Failure Mitigation of Railway Tracks
6.1 Design of Predefined Strain Gauge Module-Based Network
6.2 Operational Procedure
6.3 Experimental Setup and Result Discussion
References
Appendix Epilogue
π SIMILAR VOLUMES
<p>It is a compilation of research works related to intelligent and emerging system design using a range of tools including soft-computation. The book includes reviews, actual designs, research works, discussion and experimental results related to works in the areas of communication, computation, vi
<p><p>This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security β IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romani
<p>This book presents recent research advances on achieving seamless interoperability across all layers of communication channels in the context of emergency management and crisis response. It includes the outcomes of intensive discussions during the Workshop βCommand, Control and Sensor Systems in
<span>This volume comprises papers from the 18th Conference on Systems Engineering Research (CSER). The theme of this volume, βRecent Trends and Advances in Model-Based Systems Engineering,β reflects the fact that systems engineering is undergoing a transformation motivated by mission and system com