Construction and Practice of Enterprise Information Security Management System of Intrusion Detection Technology
S Qiu, Y Tong, X Zhang, C Huang, F Guo - Procedia Computer Science, 2024 - Elsevier
This article focuses on the construction and practice of enterprise information security
management system, and conducts in-depth research and practice on the information …
management system, and conducts in-depth research and practice on the information …
Co-Existence of LTE Communication with WLAN in Unlicensed Bands: A Review
HK Neelakantam, BP Makala… - … on Electronics and …, 2023 - ieeexplore.ieee.org
Mobile data traffic is increasing exponentially. In order to meet data traffic demand, the idea
is to co-exist LTE with WLAN in 5GHz unlicensed band. Unlicensed spectrum has high …
is to co-exist LTE with WLAN in 5GHz unlicensed band. Unlicensed spectrum has high …
Face identification surveillance drone
D Manoj Kumar, R Arthi, B Raghu… - AIP Conference …, 2023 - pubs.aip.org
Automaton reconnaissance is the utilization of unmanned aeronautical vehicles (UAV) to
catch pictures and video to assemble data about explicit targets, which may be people …
catch pictures and video to assemble data about explicit targets, which may be people …
[PDF][PDF] An Intelligent Quad Level Digital Lock System for Safety Vaults
Objectives: The current authentication system relates to the wellbeing of safety and security
through individual verification of OTP, face or email. The proposed framework guarantees …
through individual verification of OTP, face or email. The proposed framework guarantees …
The use of biometric technologies to increase security at sporting events
B Kotkova - 2023 27th International Conference on Circuits …, 2023 - ieeexplore.ieee.org
The topic of the article is consideration of the possibility of using biometric technologies to
increase security during sports events. Security will always be among the most discussed …
increase security during sports events. Security will always be among the most discussed …