Spelling suggestions: "subject:"[een] SECURITY SYSTEMS"" "subject:"[enn] SECURITY SYSTEMS""
1 |
CuWITH a curiosity driven robot for office environmental security : a thesis submitted in partial fufilment for the degree of Master of Computer and Information Sciences at Auckland University of Technology, September 20, 2009 /Gordon, Sean William. January 2009 (has links)
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2009. / Includes bibliographical references. Also held in print (96 leaves ; 30 cm.) in the Archive at the City Campus (T 621.38928 GOR)
|
2 |
PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”Ferruz Gracia, Pedro Pablo January 2015 (has links)
Every single one of us have heard ones or know someone who have had a badexperience with a motorbike, maybe it was his or her fault, perhaps it was originateddue to the mistake of other vehicle or just was a simple distraction that caused as aresult that small fright or that horrible accident.All the people who ride motorcycles assume that when an impact comes, our body isthe chassis, our own body is in jeopardy to the unexpected just protected with a helmetand some protection clothes.The main goal of this project will be to try to reduce the possibilities of motorcycleusers of having a fatality accident or at least reduce the gravity of them.I will talk further on about why I decided to do this study and which kind of accidentsI am trying to prevent however I will like to say that my personal objective developingthis thesis has been to save lives, maybe sound quite hard to archive but I would bereally proud of myself if I could safe at least one life on the road the day of tomorrow.
|
3 |
Linear discriminant analysis and its application to face identificationLi, Yongping January 2000 (has links)
No description available.
|
4 |
An architectural approach to achieving higher-level security for component (service) based software systemsVorobiev, Artem. January 2008 (has links)
Thesis (Ph.D) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2008. / Submitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)
|
5 |
In defence of the welfare state? : social policy restructuring in Finland and Sweden in the 1990sTimonen, Virpi January 2001 (has links)
No description available.
|
6 |
Mapping the elements of physical security towards the creation of a holistic physical security modelAlach, Zachary James. January 2007 (has links)
Thesis (M.Sc.)--Edith Cowan University, 2007. / Submitted to the Faculty of Computing, Health and Science. Includes bibliographical references.
|
7 |
Design and development of a targeting system using MATLABMurphree, Stephen Kyle, Overfelt, Ruel A., January 2008 (has links) (PDF)
Thesis (M.S.)--Auburn University, 2008. / Abstract. Vita. Includes program code. Includes bibliographical references (p. 94-96).
|
8 |
Least Privilege Separation Kernel storage hierarchy prototype for the trusted computing exemplar projectGuillen, Jonathan Michael. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Irvine, Cynthia E. ; Clark, Paul C. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: Trustworthy systems, separation kernels, secondary storage, storage hierarchy Includes bibliographical references (p. 143-144). Also available in print.
|
9 |
Surveilling roads and protecting artKrohn, Erik Allyn. Varadarajan, Kasturi. January 2009 (has links)
Thesis supervisor: Kasturi Varadarajan. Includes bibliographic references (p. 111-114).
|
10 |
Evaluation of two host-based intrusion prevention systems /Labbe, Keith G. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Neil Rowe, J.D. Fulp. Includes bibliographical references (p. 53-54). Also available online.
|
Page generated in 0.0274 seconds