نتایج جستجو برای: security personnel

تعداد نتایج: 213695  

2007
Lauro Ojeda

This paper introduces a “Personal Dead-reckoning” (PDR) navigation system for walking persons. The system is useful for monitoring the position of emergency responders inside buildings, where GPS is unavailable. The PDR system uses a six-axes Inertial Measurement Unit attached to the user’s boot. The system’s strength lies in the use of a technique known as “Zero Velocity Update” (ZUPT) that vi...

حسنی, سید عباس, حسینی, سید محمد, سعیدی, حسین, ظاهری, محمد مهدی, عباسی, محسن, فتحی, مرضیه,

  Background & Aim: The stressful environment of the emergency department exposes the staff to the hazards posed by physical and verbal violence.This can affect not only the job security and satisfaction among the personnel but also the service and care offered to the patients. This study has been designed to determine the incidence rate of physical and verbal violence inflicted by patients and...

2005
Jaime A. Pavlich-Mariscal Steven A. Demurjian Laurent D. Michel

The objective of this research is to develop techniques that integrate alternative security concerns (e.g., mandatory access control, delegation, authentication, etc.) into the software process. The resulting model-driven framework preserves separation of security concerns from modeling through implementation, and allows security personnel to pick and choose security concerns to concerns promot...

2013
K. Gautham G. Raghav V. Krishnamurthy N. R. Raajan

One of the primary aspects of Personal security is through various user authentication techniques like biometrics, password, Smart Card, etc. We propose to design a personal security authentication system using the commonly available Bluetooth technology. The authentication is done on a fixed device, connected to the web and the identity is provided by a mobile device commonly carried by the pe...

2011
Robert Hubal Matthew S. Cain Stephen R. Mitroff

Airport and border security personnel are working to improve security practices and preparedness to prevent acts of terrorism. While they must guard against false positives that result in needless delays for travelers, they must also balance those against the grave costs of missing a threat. In support of a study investigating individual differences in vigilance tasks, the authors have develope...

2012
Bongani Ngwenya

The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The research...

2017

How Cylance® Uses Math To Defeat Malware The problem, although few want to admit it, is that enterprise security personnel are defending a castle riddled with holes, filled with secret passageways, and protected by ineffective barriers. These weak points are a consequence of poor quality security software, inferior hardware, and in some cases, backdoors planted by malicious insiders. The end re...

2010
Ľuboš OVSENÍK Anna KAŽIMÍROVÁ KOLESÁROVÁ Ján TURÁN

This paper is review of many existing video surveillance systems. With the growing quantity of security video, it becomes vital that video surveillance system be able to support security personnel in monitoring and tracking activities. The aim of the surveillance applications is to detect, track and classify targets. In this paper is described object modelling, activity analysis and change dete...

2012
Deborah Brewer Robert Gorski

"The Social Security Administration's (SSA) Office of Disability, responsible for develloping and implementing medical criteria and other disability-related policies for determining an individual's eligibility for disability benefits under Social Security, is concerned about the new functional problems some polio survivors are experiencing. "SSA wants to ensure that all medical and other profes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید