Construction and Practice of Enterprise Information Security Management System of Intrusion Detection Technology

S Qiu, Y Tong, X Zhang, C Huang, F Guo - Procedia Computer Science, 2024 - Elsevier
This article focuses on the construction and practice of enterprise information security
management system, and conducts in-depth research and practice on the information …

Co-Existence of LTE Communication with WLAN in Unlicensed Bands: A Review

HK Neelakantam, BP Makala… - … on Electronics and …, 2023 - ieeexplore.ieee.org
Mobile data traffic is increasing exponentially. In order to meet data traffic demand, the idea
is to co-exist LTE with WLAN in 5GHz unlicensed band. Unlicensed spectrum has high …

Face identification surveillance drone

D Manoj Kumar, R Arthi, B Raghu… - AIP Conference …, 2023 - pubs.aip.org
Automaton reconnaissance is the utilization of unmanned aeronautical vehicles (UAV) to
catch pictures and video to assemble data about explicit targets, which may be people …

[PDF][PDF] An Intelligent Quad Level Digital Lock System for Safety Vaults

R Arthi, DM Kumar, C Aravindan… - Indian Journal …, 2023 - sciresol.s3.us-east-2.amazonaws …
Objectives: The current authentication system relates to the wellbeing of safety and security
through individual verification of OTP, face or email. The proposed framework guarantees …

The use of biometric technologies to increase security at sporting events

B Kotkova - 2023 27th International Conference on Circuits …, 2023 - ieeexplore.ieee.org
The topic of the article is consideration of the possibility of using biometric technologies to
increase security during sports events. Security will always be among the most discussed …