The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The UHF Radiofrequency Identification technology offers nowadays a viable technological solution for the implementation of low-level environmental monitoring of connected critical infrastructures to be protected from both physical threats and cyber attacks. An RFID sensor network was developed within the H2020 SCISSOR project, by addressing the design of both hardware components, that is a new family...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
In order to solve the problems of complex experiment management, complicated teaching task arrangement, limited student experiment conditions, and to provide a high efficiency of experiment teaching and security experiment environment for the majority of teachers and students, this paper investigates and analyzes the present situation of experiment management in colleges and universities. Based on...
The goal of this project is to perceive and detect gas leakage, gas cylinder drop level, food count and library book history of the student by using gas sensor, weight sensor and RFID (Radio Frequency Identification) approach and to provide complete information and usefulness needed. This proposed system defines the design of RASPBERRY PI based on a security system for use in industries or hostel...
Today, the world is influenced by new emerging technologies. As a result we are surrounded by a number of smart devices. These smart devices make our life easy and convenient. On the contrary, we are exposed to a number of threats and cyber attacks. There is always a threat to our privacy. In this paper, we discuss the different applications of IOT and the security threats involved.
According The paper puts forward a novel coal mine management system to solve the real-time monitoring and highly efficient rescue problems of underground work platforms. The scheme of ZigBee wireless sensor network combined with Controller Area Net-work (CAN) bus is adopted in this system. ZigBee substation is set at proper intervals in mine laneways to acquire Radio Frequency Identification (RFID)...
With the increasing volume of container transport, the international community pay more and more attention to container security. This paper investigates the new concept, key function and key technologies available of the secure and smart container. Especially on the base of application and survey, this paper carries on the research of standard system. Under the current standard system frame, it works...
Among the Organized crime, Human trafficking hold third place where as the first and second or drug and weapon trade across the globe. Human trafficking is a shame on Humanity. As per the report of Human Rights commission of India over 40,000 children are reported missing every year of which 11000 are untraced [1][2]. Another statics report saying 80% of human trafficking is done for sexual exploitation...
Nuclear facilities need very strict security mechanism to prevent unauthorized persons from gaining access to critical facility or approaching close enough to harm the facility. Physical Access Control System plays an important role in ensuring the entry of authorized personnel into the premises. There are so many ways by which this system can be designed and implemented, wherein the authenticity...
Car parking has become a serious problem of everyday occurrence for educational institutions with the decreasing parking supply, increasing enrollments and high percentage of vehicle ownership, in result causing congestion, time and money wastage. This problem is getting worse and more frustrating in Jazan University due to the fact that majority of students, faculty and staff members own cars and...
This paper introduces a low-power wireless climate monitoring system with an RFID security access feature for mosquito and pathogen research. Mosquito-borne diseases, which are critical threats to human health, include malaria, yellow fever, dengue fever, and West Nile Virus. The wireless monitoring system provides environmental data such as temperature, humidity, wind speed, and wind direction. The...
Radio Frequency Identification (RFID) is a kind of the automatic identification technology which identifies an object by radio frequency mode for non-contact bidirectional data communication. It has been applied in many industries such as supply chain management, retail management, logistics management, security supervising, traffic supervising, and so on. This paper firstly introduces the principle...
Aiming at the current problems in the confidential meetings, RFID technology, combined with communication technology, the system integration technology, database technology and lifecycle management technology is applied. In this paper, we design a set of multi-functional Monitoring System of Confidential Meetings to solve the problem. The system contains Basic Information Management, Confidential...
Radio frequency identification (RFID) and wireless sensor networks (WSNs) have been popular in the industrial field, and both have undergone dramatic development. RFID and WSNs are well known for their abilities in identity identification and data transmission, respectively, and hence widely used in applications for environmental and health monitoring. Though the integration of a sensor and an RFID...
Since last few years, security systems are getting more awareness and importance. A Multi Layer Bank Security System is a system for validating, monitoring and controlling the security at bank locker rooms. Today, there are many banks using authorize access control approach to prevent the locker room from unauthorized access. In this paper highly reliable, multi level and most efficient locker room...
In this paper, we propose a new RFID tag monitoring approach, based on adding an infrastructure circuit to simultaneously monitor and save faulty tag behaviour, in order to enable the implementation of advanced RFID diagnosis functions and mainly to reinforce tag security against fault attacks. The added infrastructure circuit is essentially composed of hardware assertions exclusively devoted to on-line...
A RFID-based Kindergarten Intelligence Security System is proposed in this paper. The RF-KISS helps to achieve better children security control, as well as to improve security of school environment. To this purpose, it automates the children security supervision and provides integration with current security management system for Kindergarten. In this system, RFID tags are embedded in the children...
With the increasing development of the sports in China, the application of network technology, which is a crucial link in sports events, is required more. This article will introduce the success and features of some typical technologies such as WAPI, TelePresence, Optical Network, etc. The implementation of network system control will also be discussed. It has been found out that sports events may...
According to the software engineering life cycle and software development process theory, this paper analysis and design mechanical production management system based on Internet of Things, based on the research on actual business process. The paper combining the characteristics of production line analyses the system's functional requirements. Namely, through RFID technology, it manages and controls...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.