4 research outputs found

    Automatic RADAR Target Recognition System at THz Frequency Band. A Review

    Get PDF
    The development of technology for communication in the THz frequency band has seen rapid progress recently. Due to the wider bandwidth a THz frequency RADAR provides the possibility of higher precision imaging compared to conventional RADARs. A high resolution RADAR operating at THz frequency can be used for automatically detecting and segmenting concealed objects. Recent advancements in THz circuit integration have opened up a wide range of possibilities for on chip applications, like of security and surveillance. The development of various sources and detectors for generation and detection of THz frequency has been driven by other techniques such as spectroscopy, imaging and impulse ranging. One of the central vision of this type of security system aims at ambient intelligence: the computation and communication carried out intelligently. The need for higher mobility with limited size and power consumption has led to development of nanotechnology based THz generators. In addition to this some of the soft computing tools are used for detection of radar target automatically based on some algorithms named as ANN, RNN, Neuro-Fuzzy and Genetic algorithms. This review article includes UWB radar for THz signal, its characteristics and application, Nanotechnology for THz generation and issues related to ATR

    Practice of Security Systems in University Libraries of Assam: A Study

    Get PDF
    Objective: The study aimed to find out the implementation and adoption of different security systems in the selected University libraries of Assam. It highlighted the various physical, environmental security systems as well as digital data security systems that were adopted for library security purpose. The study also examined how far these libraries had implemented various electronic security systems like CCTV, RFID, air-conditioner for humidity control, smart card, biometrics, flood detector, fire or smoke sensor etc. Methods: For the study, total six University libraries had been purposively selected by considering the possible availability of various security measures. A structured questionnaire was prepared for collecting relevant information. To collect more information, personal interview including telephonic conversation and direct observation had also been done. Results: Finding showed that the academic libraries efficiently adopted and implemented both traditional or manual and technological or digital data security systems even though they had suffered from some technological or financial constraints. Adoption of an effective security plan was the primary key to secure the library resources from theft. Majority of the libraries had its institutional security plan so that these libraries could follow them accordingly. Conclusion: As time changed, the procedures for securing library resources very much difficult and with technological advancement, the libraries should opt for electronic or digital data security systems. Though the initial investment in such electronic security systems would be high, but in long run, it would provide better results as well as cost-effective for the libraries
    corecore