LEADER 01353nam 2200385 450 001 9910713884703321 005 20201201072000.0 035 $a(CKB)5470000002504844 035 $a(OCoLC)1190651907 035 $a(EXLCZ)995470000002504844 100 $a20200824d2019 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData center optimization strategies /$fOtto Van Geet 210 1$aGolden, CO :$cNational Renewable Energy Laboratory,$d2019. 215 $a1 online resource (19 pages) $ccolor illustrations 225 1 $aNREL/PR ;$v7A40-74841 300 $aPresented at the 7X24 Exchange International Fall 2019 Conference, 27-30 October 2019, Phoenix, Arizona. 606 $aData centers$xDesign and construction 606 $aData centers$xEnergy consumption 606 $aData centers$xEnvironmental aspects 615 0$aData centers$xDesign and construction. 615 0$aData centers$xEnergy consumption. 615 0$aData centers$xEnvironmental aspects. 700 $aGeet$b Otto van$01393726 712 02$aNational Renewable Energy Laboratory (U.S.), 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910713884703321 996 $aData center optimization strategies$93476075 997 $aUNINA LEADER 03415nam 2200469 450 001 9910484094303321 005 20231110233048.0 010 $a981-16-1205-6 035 $a(CKB)4100000011918868 035 $a(MiAaPQ)EBC6607160 035 $a(Au-PeEL)EBL6607160 035 $a(OCoLC)1250308712 035 $a(PPN)255885482 035 $a(EXLCZ)994100000011918868 100 $a20220118d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecent trends In peripheral security systems /$fby Abhishek Rawat, Dipankar Deb, Jatin Upadhyay 210 1$aGateway East, Singapore :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (123 pages) 225 1 $aServices and Business Process Reengineering 311 $a981-16-1204-8 327 $aIntro -- Preface -- Contents -- About the Authors -- Acronyms -- List of Figures -- 1 Introduction -- 1.1 Brief Review of Different Systems of Peripheral Security -- 1.1.1 CCTV Camera -- 1.1.2 Facial and Object Detection, and Recognition -- 1.1.3 Radio Frequency-Based Security System -- 1.1.4 Fingerprint-Based Controlled Access -- 1.2 Current Studies in Computer Vision and Radio Signal-Based Indoor Navigation Techniques for Tracking -- 1.2.1 Indoor Navigation Technologies -- 1.2.2 Challenges in Indoor Navigation and Object Tracking -- 1.3 Scope of Mitigation in Security Systems -- References -- 2 Design of a Peripheral Security Module Based on Exchange of Specific Data Rates -- 2.1 Peripheral Security Design as per Data Rate -- 2.2 Operational System Module -- 2.3 Simulation Setup of Peripheral Security Using GNU Radio -- 2.4 Results and Discussions -- References -- 3 System Design for the Detection of Humans Trapped in Snow -- 3.1 Proposed System Design -- 3.2 Detailed Description of the System -- 3.3 Results and Discussions -- References -- 4 WLAN-Based Smart Door Closer Design with Image Classification -- 4.1 Background and Motivation -- 4.2 Face Recognition and Detection -- 4.3 Individual Identity Verification Using Key-Point Matching Algorithm Technique -- 4.4 Smart Door Closer System -- 4.5 Working Principle of the Smart Closer System and Robotic Platform -- 4.6 Data Acquisition (DAQ) of Smart Door Closer over WLAN -- 4.7 Analysis of Images Received from CCTV Units -- References -- 5 Robotic System Configuration with Localization, Path Planning, and Computer Vision -- 5.1 Methodology -- 5.2 Mapping of Collected Samples-Data Distribution and Behavioral Investigation -- 5.3 Classification Analysis and Results of Image Processing Models -- References -- 6 Secured System Design for Failure Mitigation of Railway Tracks. 327 $a6.1 Design of Predefined Strain Gauge Module-Based Network -- 6.2 Operational Procedure -- 6.3 Experimental Setup and Result Discussion -- References -- Appendix Epilogue. 410 0$aServices and Business Process Reengineering 606 $aEngineering$xData processing 615 0$aEngineering$xData processing. 676 $a620.00285 700 $aRawat$b Abhishek$0926036 702 $aDeb$b Dipankar 702 $aUpadhyay$b Jatin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484094303321 996 $aRecent trends In peripheral security systems$92585987 997 $aUNINA