Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Wireless Personal Communications"
DOI: 10.1007/s11277-018-5305-5
Abstract: AbstractThis paper proposes a method for data rate and specific signal format based peripheral security system which can also be used for authorization and recognition functions. This arrangement can be used for security management and…
read more here.
Keywords:
peripheral security;
security;
approach;
data rates ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "International Journal of Technology Assessment in Health Care"
DOI: 10.1017/s0266462318002738
Abstract: Introduction: The purpose of the study is to estimate both the number of beneficiaries and the burden of the Disability Insurance (DI) benefits provided for neoplastic diseases (ND) and for five cancer types, focusing on…
read more here.
Keywords:
percent;
security;
cancer;
social security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2023 at "Journal of Mathematics"
DOI: 10.1155/2023/3214866
Abstract: In this paper, the mathematical model of a kind of two-robot security system with an early warning function is studied. By using strongly continuous operator semigroup theory and Volterra integral equation theory, the properties of…
read more here.
Keywords:
system;
robot security;
reliability;
system early ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "International Journal of Electrical and Computer Engineering"
DOI: 10.11591/ijece.v10i1.pp346-352
Abstract: Electronic Integrated Antenatal Care (e-iANC) was built as a web-based application to assist midwives in recording Antenatal Care (ANC) data including Patient Registration; Anamnesis; Physical Examination; Laboratory Test, Screening of Risk Pregnancy; Communication, Information and…
read more here.
Keywords:
security system;
ianc;
security;
antenatal care ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "International Journal of Electrical and Computer Engineering"
DOI: 10.11591/ijece.v10i6.pp5932-5939
Abstract: The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IOTs increased…
read more here.
Keywords:
security system;
system;
smart system;
design implement ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v10.i2.pp490-497
Abstract: It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to…
read more here.
Keywords:
computer security;
security;
data exfiltration;
computer ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Communications"
DOI: 10.11648/j.com.20190702.13
Abstract: With the advancement of technology things are becoming Simpler and easier in every aspect of life. Automation is the use of control systems and information technologies to reduce the need for human work. Security is…
read more here.
Keywords:
security system;
system;
arduino;
system using ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Research on Aging"
DOI: 10.1177/0164027520949117
Abstract: In response to the increasing care demand of older adults and their families, the construction of the long-term care (LTC) security system has been widely recognized by the government, society and families. This article discusses…
read more here.
Keywords:
system;
long term;
care;
older adults ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "PLOS ONE"
DOI: 10.1371/journal.pone.0282567
Abstract: Recently, the number of drones has increased, and drones’ illegal and malicious use has become prevalent. The dangerous and wasteful effects are substantial, and the probability of attacks is very high. Therefore, an anomaly detection…
read more here.
Keywords:
system;
technology;
hybrid security;
icmetric technology ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Electrical And Electronics Engineering"
DOI: 10.33021/jeee.v3i2.1487
Abstract: A door, as a barrier to limit an access between two spaces, requires a security measure to ensure that only privileged people may pass. In this paper, a door security system using Radio Frequency Identification…
read more here.
Keywords:
security system;
rfid;
system;
door security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Sustainability"
DOI: 10.3390/su10041186
Abstract: Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which,…
read more here.
Keywords:
state;
state social;
security system;
technological changes ... See more keywords