Recent Trends In Peripheral Security Systems

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.

Author(s): Abhishek Rawat, Dipankar Deb, Jatin Upadhyay
Series: Services and Business Process Reengineering
Publisher: Springer
Year: 2021

Language: English
Pages: 126
City: Singapore

Preface
Contents
About the Authors
Acronyms
List of Figures
1 Introduction
1.1 Brief Review of Different Systems of Peripheral Security
1.1.1 CCTV Camera
1.1.2 Facial and Object Detection, and Recognition
1.1.3 Radio Frequency-Based Security System
1.1.4 Fingerprint-Based Controlled Access
1.2 Current Studies in Computer Vision and Radio Signal-Based Indoor Navigation Techniques for Tracking
1.2.1 Indoor Navigation Technologies
1.2.2 Challenges in Indoor Navigation and Object Tracking
1.3 Scope of Mitigation in Security Systems
References
2 Design of a Peripheral Security Module Based on Exchange of Specific Data Rates
2.1 Peripheral Security Design as per Data Rate
2.2 Operational System Module
2.3 Simulation Setup of Peripheral Security Using GNU Radio
2.4 Results and Discussions
References
3 System Design for the Detection of Humans Trapped in Snow
3.1 Proposed System Design
3.2 Detailed Description of the System
3.3 Results and Discussions
References
4 WLAN-Based Smart Door Closer Design with Image Classification
4.1 Background and Motivation
4.2 Face Recognition and Detection
4.3 Individual Identity Verification Using Key-Point Matching Algorithm Technique
4.4 Smart Door Closer System
4.5 Working Principle of the Smart Closer System and Robotic Platform
4.6 Data Acquisition (DAQ) of Smart Door Closer over WLAN
4.7 Analysis of Images Received from CCTV Units
References
5 Robotic System Configuration with Localization, Path Planning, and Computer Vision
5.1 Methodology
5.2 Mapping of Collected Samples—Data Distribution and Behavioral Investigation
5.3 Classification Analysis and Results of Image Processing Models
References
6 Secured System Design for Failure Mitigation of Railway Tracks
6.1 Design of Predefined Strain Gauge Module-Based Network
6.2 Operational Procedure
6.3 Experimental Setup and Result Discussion
References
Appendix Epilogue