Works matching DE "ELECTRONIC alarm systems"
Results: 80
A Facile Liquid Alloy Wetting Enhancing Strategy on Super‐Hydrophobic Lotus Leaves for Plant‐Hybrid System Implementation.
- Published in:
- Advanced Materials Interfaces, 2022, v. 9, n. 17, p. 1, doi. 10.1002/admi.202200516
- By:
- Publication type:
- Article
Por qué el "Carpfishing" o "Grandes Peces" es diferente.
- Published in:
- Montes, 2021, n. 144, p. 54
- By:
- Publication type:
- Article
An Autonomous Alarm System for Personal Safety Assurance of Intimate Partner Violence Survivors Based on Passive Continuous Monitoring through Biosensors.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 3, p. 460, doi. 10.3390/sym12030460
- By:
- Publication type:
- Article
An Intelligent Intrusion Detection System Using Genetic Algorithms and Features Selection.
- Published in:
- Majlesi Journal of Electrical Engineering, 2010, v. 4, n. 1, p. 33
- By:
- Publication type:
- Article
Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches.
- Published in:
- INFORMS Journal on Computing, 2008, v. 20, n. 3, p. 356, doi. 10.1287/ijoc.1070.0249
- By:
- Publication type:
- Article
An Adaptive Approach to Granular Real-Time Anomaly Detection.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2009, p. 1, doi. 10.1155/2009/589413
- By:
- Publication type:
- Article
An Expert System-based Site Security Officer.
- Published in:
- Journal of Computing & Information Technology, 2007, v. 15, n. 3, p. 227, doi. 10.2498/cit.1000961
- By:
- Publication type:
- Article
Multi-level and Secured Agent-based Intrusion Detection System.
- Published in:
- Journal of Computing & Information Technology, 2006, v. 14, n. 3, p. 217, doi. 10.2498/cit.2006.03.05
- By:
- Publication type:
- Article
Development of an Enhanced Obstacle Detection System Using Arduino Mega 2560.
- Published in:
- African Journal of Computing & ICT, 2021, v. 14, n. 2, p. 1
- By:
- Publication type:
- Article
Intrusion Prevention in Information Systems: Reactive and Proactive Responses.
- Published in:
- Journal of Management Information Systems, 2007, v. 24, n. 1, p. 329, doi. 10.2753/MIS0742-1222240110
- By:
- Publication type:
- Article
A Digest and Pattern Matching-Based Intrusion Detection Engine.
- Published in:
- Computer Journal, 2009, v. 52, n. 6, p. 699, doi. 10.1093/comjnl/bxp026
- By:
- Publication type:
- Article
SEMI-SUPERVISED DYNAMIC CLASSIFICATION FOR INTRUSION DETECTION.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 2, p. 139, doi. 10.1142/S0218194010004669
- By:
- Publication type:
- Article
Mobile alarms aid pill compliance.
- Published in:
- 2004
- Publication type:
- Journal Article
Personal alarm will track staff whereabouts.
- Published in:
- 2004
- Publication type:
- Journal Article
ONLINE INTRUSION BEHAVIORS: SEQUENCES AND TIME INTERVALS.
- Published in:
- Social Behavior & Personality: an international journal, 2010, v. 38, n. 10, p. 1307, doi. 10.2224/sbp.2010.38.10.1307
- By:
- Publication type:
- Article
SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM.
- Published in:
- Estudios de Economía Aplicada, 2008, v. 26, n. 2, p. 795
- By:
- Publication type:
- Article
Palladogermanide PdGe<sub>2</sub> from Sulfidized Anorthosite of the Yoko-Dovyren Intrusion: First Finding in Russia.
- Published in:
- Doklady Earth Sciences, 2019, v. 485, n. 2, p. 458, doi. 10.1134/S1028334X19040251
- By:
- Publication type:
- Article
Disaster Preparedness Plan and Response Strategy as a Panacea for Effective Information Resources Preservation in University Libraries in North East, Nigeria.
- Published in:
- Library Philosophy & Practice, 2023, p. 1
- By:
- Publication type:
- Article
Do Not Ignore Them.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
An alarming look at process plants.
- Published in:
- TCE: The Chemical Engineer, 2011, n. 844, p. 68
- By:
- Publication type:
- Article
Universal input display has transmitter and alarm features.
- Published in:
- Chemical Engineering, 2020, v. 127, n. 6, p. 21
- By:
- Publication type:
- Article
New security elements in biometric systems and systems I&HAS.
- Published in:
- Agronomy Research, 2016, v. 14, n. 2, p. 372
- By:
- Publication type:
- Article
Security methods for livestock buildings including assessment aspects.
- Published in:
- Agronomy Research, 2015, v. 13, n. 1, p. 231
- By:
- Publication type:
- Article
Co-opting the Body of the Identified Other: The Hysterization of Otherness in Relation to Self.
- Published in:
- Psychoanalytic Review, 2019, v. 106, n. 1, p. 49, doi. 10.1521/prev.2019.106.1.49
- By:
- Publication type:
- Article
A supervised clustering algorithm for computer intrusion detection.
- Published in:
- Knowledge & Information Systems, 2005, v. 8, n. 4, p. 498, doi. 10.1007/s10115-005-0195-8
- By:
- Publication type:
- Article
Using artificial anomalies to detect unknown and known network intrusions.
- Published in:
- Knowledge & Information Systems, 2004, v. 6, n. 5, p. 507, doi. 10.1007/s10115-003-0132-7
- By:
- Publication type:
- Article
Security Data Supply, LLC v. Nortek Security & Control LLC.
- Published in:
- Franchise Law Journal, 2020, v. 39, n. 3, p. 446
- By:
- Publication type:
- Article
Method for Evaluating the Effectiveness of Electrical Circuit Protection with Miniature Fuse-Links.
- Published in:
- Energies (19961073), 2023, v. 16, n. 2, p. 960, doi. 10.3390/en16020960
- By:
- Publication type:
- Article
Selected Issues Associated with the Operational and Power Supply Reliability of Fire Alarm Systems.
- Published in:
- Energies (19961073), 2022, v. 15, n. 22, p. 8409, doi. 10.3390/en15228409
- By:
- Publication type:
- Article
The Issue of Evaluating the Effectiveness of Miniature Safety Fuses as Anti-Damage Systems.
- Published in:
- Energies (19961073), 2022, v. 15, n. 11, p. 4013, doi. 10.3390/en15114013
- By:
- Publication type:
- Article
SOME ACHIEVEMENTS CONCERNING SECURITY SYSTEMS OF PREMISES.
- Published in:
- Annals of the University of Petrosani Electrical Engineering, 2023, v. 25, p. 75
- By:
- Publication type:
- Article
Product News.
- Published in:
- Nursing & Residential Care, 2006, v. 8, n. 4, p. 188
- Publication type:
- Article
Security shopping.
- Published in:
- Journal of Property Management, 2007, v. 72, n. 4, p. 14
- By:
- Publication type:
- Article
Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection.
- Published in:
- Quality & Reliability Engineering International, 2002, v. 18, n. 3, p. 231, doi. 10.1002/qre.477
- By:
- Publication type:
- Article
First-order versus high-order stochastic models for computer intrusion detection.
- Published in:
- Quality & Reliability Engineering International, 2002, v. 18, n. 3, p. 243, doi. 10.1002/qre.478
- By:
- Publication type:
- Article
The information furnace: consolidated home control.
- Published in:
- Personal & Ubiquitous Computing, 2003, v. 7, n. 1, p. 53, doi. 10.1007/s00779-002-0213-8
- By:
- Publication type:
- Article
异常值检测方法在民航告警中的应用.
- Published in:
- Journal of Nanjing University of Aeronautics & Astronautics / Nanjing Hangkong Hangtian Daxue Xuebao, 2017, v. 49, n. 4, p. 524, doi. 10.16356/j.1005-2615.2017.04.011
- By:
- Publication type:
- Article
A Novel Approach to Building Intrusion Tolerant Systems.
- Published in:
- International Journal of Performability Engineering, 2014, v. 10, n. 2, p. 123
- By:
- Publication type:
- Article
Functional Safety Analysis including Human Factors.
- Published in:
- International Journal of Performability Engineering, 2011, v. 7, n. 1, p. 61
- By:
- Publication type:
- Article
Iot Network Intrusion Alarming System Using Bat Algorithm & Neural Network.
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 4845
- By:
- Publication type:
- Article
Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2302, doi. 10.1002/sec.1176
- By:
- Publication type:
- Article
E2S Warning Signals launches hazardous location warning signals.
- Published in:
- 2016
- Publication type:
- Product Review
Landmark Based Shortest Path Detection in Alarm System.
- Published in:
- Al-Mustansiriyah Journal of Science, 2018, v. 29, n. 2, p. 135, doi. 10.23851/mjs.v29i2.276
- By:
- Publication type:
- Article
AVERAGED BINARY SPARSOGRAM FOR WILDLIFE INTRUDER DETECTION.
- Published in:
- Acta Technica Napocensis. Electronica-Telecomunicatii, 2015, v. 56, n. 3, p. 42
- By:
- Publication type:
- Article
A new intrusion detection and alarm correlation technology based on neural network.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1419-z
- By:
- Publication type:
- Article
Can you hear me now?
- Published in:
- Science Scope, 2013, v. 36, n. 9, p. 84, doi. 10.2505/4/ss13_036_09_84
- By:
- Publication type:
- Article
Real-Time Autonomous System for Structural and Environmental Monitoring of Dynamic Events.
- Published in:
- Electronics (2079-9292), 2018, v. 7, n. 12, p. 420, doi. 10.3390/electronics7120420
- By:
- Publication type:
- Article
IDENTIFYING FALSE ALARM FOR NETWORK INTRUSION DETECTION SYSTEM USING HYBRID DATA MINING AND DECISION TREE.
- Published in:
- Malaysian Journal of Computer Science, 2008, v. 21, n. 2, p. 101, doi. 10.22452/mjcs.vol21no2.3
- By:
- Publication type:
- Article
IDSIC: an intrusion detection system with identification capability.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 3, p. 185, doi. 10.1007/s10207-007-0024-z
- By:
- Publication type:
- Article
A WSN-Based Intrusion Alarm System to Improve Safety in Road Work Zones.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/7048141
- By:
- Publication type:
- Article