LEADER 00937cam0-22003131i-450- 001 990007365490403321 005 20070725122200.0 010 $a0520215907 035 $a000736549 035 $aFED01000736549 035 $a(Aleph)000736549FED01 035 $a000736549 100 $a20021106d2001----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $ay-------001yy 200 1 $aSame bed, different dreams$emanaging U.S. - China Relations, 1989-2000$fDavid M. Lampton 210 $aBerkeley$cUniversity of California Press$dİ2001 215 $aXIII, 497 p.$cill.$d24 cm 610 0 $aStati Uniti$aRelazioni internazionali$aCina 676 $a327.73051$v21$zita 700 1$aLampton,$bDavid M.$0266054 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007365490403321 952 $aXIII A 227$b39034$fFSPBC 959 $aFSPBC 996 $aSame bed, different dreams$9693607 997 $aUNINA LEADER 00929nam0-2200313 --450 001 9910273758703321 005 20180621124822.0 010 $a978-88-6728-291-3 020 $aIT$b2015-2925 100 $a20180621d2014----kmuy0itay5050 ba 101 0 $aita 102 $aIT 105 $a 001yy 200 1 $aCinema e storia$einterferenze/confluenze$fTiziana Maria Di Blasio$gprefazione di Jacques Le Goff 210 $aRoma$cViella$d2014 215 $a315 p.$d23 cm 225 1 $a<>storia. Temi$v42 610 0 $aFilm storici 610 0 $aCinema$aRapporti [con la] Storia 676 $a791.43658$v23$zita 700 1$aDi Blasio,$bTiziana Maria$0750378 702 1$aLe Goff,$bJacques$f<1924-2014> 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910273758703321 952 $aCOLLEZ. 2223 (42)$b993/2018$fFSPBC 959 $aFSPBC 996 $aCinema e storia$91509774 997 $aUNINA LEADER 03415nam 2200469 450 001 9910484094303321 005 20231110233048.0 010 $a981-16-1205-6 035 $a(CKB)4100000011918868 035 $a(MiAaPQ)EBC6607160 035 $a(Au-PeEL)EBL6607160 035 $a(OCoLC)1250308712 035 $a(PPN)255885482 035 $a(EXLCZ)994100000011918868 100 $a20220118d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecent trends In peripheral security systems /$fby Abhishek Rawat, Dipankar Deb, Jatin Upadhyay 210 1$aGateway East, Singapore :$cSpringer,$d[2021] 210 4$dİ2021 215 $a1 online resource (123 pages) 225 1 $aServices and Business Process Reengineering 311 $a981-16-1204-8 327 $aIntro -- Preface -- Contents -- About the Authors -- Acronyms -- List of Figures -- 1 Introduction -- 1.1 Brief Review of Different Systems of Peripheral Security -- 1.1.1 CCTV Camera -- 1.1.2 Facial and Object Detection, and Recognition -- 1.1.3 Radio Frequency-Based Security System -- 1.1.4 Fingerprint-Based Controlled Access -- 1.2 Current Studies in Computer Vision and Radio Signal-Based Indoor Navigation Techniques for Tracking -- 1.2.1 Indoor Navigation Technologies -- 1.2.2 Challenges in Indoor Navigation and Object Tracking -- 1.3 Scope of Mitigation in Security Systems -- References -- 2 Design of a Peripheral Security Module Based on Exchange of Specific Data Rates -- 2.1 Peripheral Security Design as per Data Rate -- 2.2 Operational System Module -- 2.3 Simulation Setup of Peripheral Security Using GNU Radio -- 2.4 Results and Discussions -- References -- 3 System Design for the Detection of Humans Trapped in Snow -- 3.1 Proposed System Design -- 3.2 Detailed Description of the System -- 3.3 Results and Discussions -- References -- 4 WLAN-Based Smart Door Closer Design with Image Classification -- 4.1 Background and Motivation -- 4.2 Face Recognition and Detection -- 4.3 Individual Identity Verification Using Key-Point Matching Algorithm Technique -- 4.4 Smart Door Closer System -- 4.5 Working Principle of the Smart Closer System and Robotic Platform -- 4.6 Data Acquisition (DAQ) of Smart Door Closer over WLAN -- 4.7 Analysis of Images Received from CCTV Units -- References -- 5 Robotic System Configuration with Localization, Path Planning, and Computer Vision -- 5.1 Methodology -- 5.2 Mapping of Collected Samples-Data Distribution and Behavioral Investigation -- 5.3 Classification Analysis and Results of Image Processing Models -- References -- 6 Secured System Design for Failure Mitigation of Railway Tracks. 327 $a6.1 Design of Predefined Strain Gauge Module-Based Network -- 6.2 Operational Procedure -- 6.3 Experimental Setup and Result Discussion -- References -- Appendix Epilogue. 410 0$aServices and Business Process Reengineering 606 $aEngineering$xData processing 615 0$aEngineering$xData processing. 676 $a620.00285 700 $aRawat$b Abhishek$0926036 702 $aDeb$b Dipankar 702 $aUpadhyay$b Jatin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484094303321 996 $aRecent trends In peripheral security systems$92585987 997 $aUNINA