Results 1 to 10 of about 394,183 (170)

An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification

open access: yesIEEE Access, 2018
With regard to the privacy of client-server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone ...
Wanjun Xiong, Fan Zhou, Ruomei Wang
exaly   +3 more sources

Research on calibration method of UWB card reader antenna in coal mine

open access: yesMeikuang Anquan, 2022
In order to solve the problem that it is difficult to calibrate the field antenna delay parameters of UWB card reader in coal mine due to the large antenna difference and the different installation length of feeders, a field antenna calibration method ...
WEN Xianpei
doaj   +1 more source

Research on positioning and re-measurement mechanism of underground precise personnel positioning system

open access: yesGong-kuang zidonghua, 2022
During the underground transmission of wireless signal, the measurement between card reader and marker card fails due to signal strength attenuation and interference.
TANG Lijun, WU Wei, LIU Shisen
doaj   +1 more source

Design of mine portable card reader based on UWB

open access: yesMeikuang Anquan, 2021
Ultra wide band (UWB) accurate positioning system for underground personnel has been gradually popularized and used in coal mines. However, there is a lack of portable card reader, which can be used to search and rescue personnel in case of mining ...
ZHANG Liqun
doaj   +1 more source

SMART DOOR LOCK SYSTEM DEVELOPMENT PROTOTYPE USING RFID TECHNOLOGY ID-12

open access: yesJurnal Riset Informatika, 2022
This innovative door lock system is designed to make it easier to control security in certain homes or rooms. This system can also be used in government offices and factories to restrict someone from entering a room that just anyone can not enter.
Siti Aisyah   +4 more
doaj   +1 more source

Implementation of the Afya conditional cash transfer intervention to retain women in the continuum of care: a mixed-methods process evaluation

open access: yesBMJ Open, 2022
Objectives We report the results of a mixed-methods process evaluation that aimed to provide insight on the Afya conditional cash transfer (CCT) intervention fidelity and acceptability.Intervention, setting and participants The Afya CCT intervention ...
Hassan Haghparast-Bidgoli   +10 more
doaj   +1 more source

Design of parking management system for shared stroller based on RFID [PDF]

open access: yesMATEC Web of Conferences, 2020
The development of information technology has led to the rapid development of sharing economy. Shared bike, Shared car and Shared stroller came into being. It not only brings convenience to citizens, but also has difficult management problems. This paper
Yu Lina
doaj   +1 more source

Improvement of urban passenger transport ticketing systems by deploying intelligent transport systems [PDF]

open access: yesTransport, 2006
The main advantages and disadvantages of conventional and intelligent ticketing systems and possible positive outcomes when introducing intelligent transport solutions ‐ namely smart cards or e‐ticketing instead of conventional ones (paper tickets and ...
Gražvydas Jakubauskas
doaj   +2 more sources

Design of a GSM-Based Skimming Reporting System for Automated Teller Machines

open access: yesJurnal Nasional Teknik Elektro, 2020
In recent years, there has been the unpleasant advent of a new type of credit card fraud called Automated Teller Machine (ATM) skimming. This type of fraud poses a substantial threat to the banking sector because its modus operandi is quite subtler than
Robert Agyare Ofosu   +2 more
doaj   +1 more source

Precise personnel positioning method in underground mine based on grey prediction model

open access: yesGong-kuang zidonghua, 2021
The positioning accuracy of the precise personnel positioning system in underground mine is affected by the non-line-of-sight error and clock error. At present, the system mostly uses Kalman filter-based positioning method to reduce the error, but the ...
TANG Lijun1, WU Wei2, LIU Shisen3
doaj   +1 more source

Home - About - Disclaimer - Privacy