Zobrazeno 1 - 10
of 113
pro vyhledávání: '"D.G. Adams"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bradley Norman, D.G. Adams
Publikováno v:
IEEE Aerospace and Electronic Systems Magazine. 22:30-33
There is a need to provide response force personnel with advanced warning of intruder activity in rough terrain outside the traditional facility perimeter. Often the land surrounding a high consequence facility is remote and difficult to sensor with
Autor:
D.G Adams, C.D. Knight
Publikováno v:
Physiological and Molecular Plant Pathology. 49:73-77
A modified version of the Pfeffer technique has been developed to demonstrate a strong chemotactic response of hormogonia from the filamentous nitrogen fixing cyanobacterium Nostoc sp. towards exudates of one of its symbiotic partners, the liverwort
Publikováno v:
Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response
Autor:
D.G. Adams, D.A. Pritchard
Publikováno v:
Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
This paper describes the current effort to analyze historical alarm data and discusses applications and methods for secure, near-realtime communications of data. The objective of analyzing historical alarm data is to determine if trends in system or
Autor:
D.G. Adams
Publikováno v:
Proceedings of IEEE International Carnahan Conference on Security Technology.
The installation of a new intrusion detection system (IDS) is, of course, expected to improve site security. However, depending upon the way the system is used, it can, over time, actually degrade security. Proper use, control, and maintenance of the
Publikováno v:
Proceedings of IEEE International Carnahan Conference on Security Technology.
Exciting new safeguards and security technologies are on the horizon, and some are even on the shelves today. Self-testing sensors, smart sensors, and intelligent alarm analyzers are all designed to provide useful information to the operator. However
Autor:
E. Krasue, M.D. Ladd, R.E. Heintzleman, R.L. White, P.C. Sprauer, J.J. MacEachin, D.G. Adams, D.A. Pritchard, E.T. Fox
Publikováno v:
Proceedings IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology (Cat. No.98CH36209).
This paper describes the design and preliminary test results of a 360-degree scanning, multispectral intrusion detection sensor. This moderate-resolution, panoramic imaging sensor is intended for exterior use at ranges from 50 to 1500 meters. This Ad