• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 5
  • 1
  • Tagged with
  • 19
  • 19
  • 10
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Domovní alarm / Home security system

Friml, Lubomír January 2012 (has links)
The thesis deals with the design and realization of electronic security system (ESS) for the house. ESS evaluates signals from radar move-detection sensors also allows connection of other types of move-detection, magnetic contacts, laser gates and smoke detector. The interruption is signaled via SMS sent to the owner of the building and via acoustic warning. The security system also allows the connection temperature sensors, as well as monitoring electricity consumption or central control home appliances and other devices. These features are optional, they can be used to remotely monitor the status of the object respectively its management even via SMS.
12

Elektronický zabezpečovací systém s prvky IoT / Security alarm with IoT features

Kubů, Jiří January 2018 (has links)
The diploma thesis deals with the implementation of own design of an electronic security system with the possibility of extension with the elements of home automation. The control panel is built using the Raspberry Pi3 B+ with a touch screen that communicates with the sensors using Bluetooth Low Energy technology.
13

Domovní alarm / Home security system

Friml, Lubomír January 2012 (has links)
The thesis deals with the design and realization of electronic security system (ESS) for the house. ESS evaluates signals from radar move-detection sensors also allows connection of other types of move-detection, magnetic contacts, laser gates and smoke detector. The interruption is signaled via SMS sent to the owner of the building and via acoustic warning. The security system also allows the connection temperature sensors, as well as monitoring electricity consumption or central control home appliances and other devices. These features are optional, they can be used to remotely monitor the status of the object respectively its management even via SMS.
14

Detecting Unauthorized Activity in Lightweight IoT Devices

January 2020 (has links)
abstract: The manufacturing process for electronic systems involves many players, from chip/board design and fabrication to firmware design and installation. In today's global supply chain, any of these steps are prone to interference from rogue players, creating a security risk. Manufactured devices need to be verified to perform only their intended operations since it is not economically feasible to control the supply chain and use only trusted facilities. It is becoming increasingly necessary to trust but verify the received devices both at production and in the field. Unauthorized hardware or firmware modifications, known as Trojans, can steal information, drain the battery, or damage battery-driven embedded systems and lightweight Internet of Things (IoT) devices. Since Trojans may be triggered in the field at an unknown instance, it is essential to detect their presence at run-time. However, it isn't easy to run sophisticated detection algorithms on these devices due to limited computational power and energy, and in some cases, lack of accessibility. Since finding a trusted sample is infeasible in general, the proposed technique is based on self-referencing to remove any effect of environmental or device-to-device variations in the frequency domain. In particular, the self-referencing is achieved by exploiting the band-limited nature of Trojan activity using signal detection theory. When the device enters the test mode, a predefined test application is run on the device repetitively for a known period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operating bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicate the presence of unknown (unauthorized) activity. Hence, the malicious activity can differentiate without using a golden reference or any knowledge of the Trojan activity attributes. The proposed technique's effectiveness is demonstrated through experiments with collecting and processing side-channel signals, such as involuntarily electromagnetic emissions and power consumption, of a wearable electronics prototype and commercial system-on-chip under a variety of practical scenarios. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2020
15

Coding techniques for information-theoretic strong secrecy on wiretap channels

Subramanian, Arunkumar 29 August 2011 (has links)
Traditional solutions to information security in communication systems act in the application layer and are oblivious to the effects in the physical layer. Physical-layer security methods, of which information-theoretic security is a special case, try to extract security from the random effects in the physical layer. In information-theoretic security, there are two asymptotic notions of secrecy---weak and strong secrecy This dissertation investigates the problem of information-theoretic strong secrecy on the binary erasure wiretap channel (BEWC) with a specific focus on designing practical codes. The codes designed in this work are based on analysis and techniques from error-correcting codes. In particular, the dual codes of certain low-density parity-check (LDPC) codes are shown to achieve strong secrecy in a coset coding scheme. First, we analyze the asymptotic block-error rate of short-cycle-free LDPC codes when they are transmitted over a binary erasure channel (BEC) and decoded using the belief propagation (BP) decoder. Under certain conditions, we show that the asymptotic block-error rate falls according to an inverse square law in block length, which is shown to be a sufficient condition for the dual codes to achieve strong secrecy. Next, we construct large-girth LDPC codes using algorithms from graph theory and show that the asymptotic bit-error rate of these codes follow a sub-exponential decay as the block length increases, which is a sufficient condition for strong secrecy. The secrecy rates achieved by the duals of large-girth LDPC codes are shown to be an improvement over that of the duals of short-cycle-free LDPC codes.
16

Zabezpečovací systém s komunikací přes mobilní telefon / Security system with mobile phone communication

Ulbrich, Jakub January 2009 (has links)
This thesis deals with the question of electronic security systems. In the forepart are described electronic security system components such as keyboards, detectors, alarm devices etc. Various methods of security or de-security of properties, trespassing and other events detection methods, and ways of alarm calling are described there too. The next part of the master’s thesis focuses on the construction of an alarm system which is designed for security of a common-size flat with one entry. The system manages to control up to four movement detectors. The operation of the system is handled by a 16 button keyboard, and easy orientation is provided thanks to a liquid crystal display. The alarm is signaled by an indoor alert siren, however, other alarm announcing devices with an input matched for the log. 0 or log. 1 reception can be connected too. The system contains communication equipment (mobile phone) which signals alarm at a distance to the three telephone numbers. User can use a distance control by text message to unlock system or to determine its status. The system is controlled by the microcontroller AVR ATmega16, the product of Atmel company. A brief description of all components of the electronic alarm system is included in this work.
17

Regulation of the private security industry

Siebrits, Louis Lourens 11 1900 (has links)
The regulation of the private security industry has been an issue of debate for a number of years in South Africa, as well as in the rest of the world. The debate mainly centers around issues such as the need for regulation in this Industry and the objectives of regulation. This thesis argues that regulation is of utmost importance in this Industry and furthermore, that the objective ofregulation should be to set standards in the Industry. If this is the case, the protection of the public interest will be a natural result of regulating the standards. In addition, this thesis argues for the inclusion of the private investigator into the scope of regulation and suggests that this sector should ultimately be regulated through the means of separate legislation. This thesis furthermore provides two models for the regulation of the private security industry in South Africa. These models are described as the Semi-Integrated Wide Model (SIWM) and the Fully Integrated Wide Model (FIWM). These two models provide Government with the option of regulating the Industry without alienating the latter. Government will still have the ultimate responsibility for regulation, but will allow the Industry to be central in setting standards and requirements. In this way, the Industry will not regulate itself and Government will have the ultimate responsibility of protecting the interests of the public and the State / Police Practice / D. litt. et. Phil. (Police Science)
18

Regulation of the private security industry

Siebrits, Louis Lourens 11 1900 (has links)
The regulation of the private security industry has been an issue of debate for a number of years in South Africa, as well as in the rest of the world. The debate mainly centers around issues such as the need for regulation in this Industry and the objectives of regulation. This thesis argues that regulation is of utmost importance in this Industry and furthermore, that the objective ofregulation should be to set standards in the Industry. If this is the case, the protection of the public interest will be a natural result of regulating the standards. In addition, this thesis argues for the inclusion of the private investigator into the scope of regulation and suggests that this sector should ultimately be regulated through the means of separate legislation. This thesis furthermore provides two models for the regulation of the private security industry in South Africa. These models are described as the Semi-Integrated Wide Model (SIWM) and the Fully Integrated Wide Model (FIWM). These two models provide Government with the option of regulating the Industry without alienating the latter. Government will still have the ultimate responsibility for regulation, but will allow the Industry to be central in setting standards and requirements. In this way, the Industry will not regulate itself and Government will have the ultimate responsibility of protecting the interests of the public and the State / Police Practice / D. litt. et. Phil. (Police Science)
19

Komplexní zabezpečení objektů / Project of comprehensive security objects

Michálek, Libor January 2011 (has links)
In my thesis I go about principles and methods of security systems, then I go about analysis of avalaible types of security systems (EPS, EZS and CCTV). I have written about their possibile use in design security building. I have described levels of project documentation and its different parts including process service of production a project documentation for security system. I used all knowledges in the end of my thesis, when I designed and integrated security system for a special building.

Page generated in 0.1498 seconds