By Topic

New solutions to perimeter protection and point access control

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
L. Bennett ; THORN Security & Electron., Feltham, UK

The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity

Published in:

Security Technology, 1992. Crime Countermeasures, Proceedings. Institute of Electrical and Electronics Engineers 1992 International Carnahan Conference on

Date of Conference:

14-16 Oct 1992