Design and Implementation of Access Door Control with Mo-bile Alert

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

A Door Access Control System with Mobile Phones

This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is introduced, and then the delegation is formalized as a copy of a door-key. On the previous model, secure copy by off-line is realized using the essential idea of the proxy signature. Moreover, the proposed system is implemented ...

متن کامل

Design and Implementation of an Intelligent Photogrammetric System for Control and Guidance of Reconstructive Surgery

The digital image contains efficient and useful information which enables measurement and data acquisition. One of the methods that facilitate measuring and interpreting objects, using the image solely, is close-range photogrammetry. Among the various fields of science, whenever a precise measurement is required, this approach can be applied. One of these fields is Medical Sciences that due to ...

متن کامل

Door-access-control System Based on Finger-vein Authentication

OVERVIEW: Door-access control is a physical security system that assures the security of a room or building by means of limiting the access to that room or building to specific people and by keeping records of such accesses. It utilizes an individual-authentication method in order to limit access to specific people. The most widespread authentication method for such systems is based on smart ca...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering & Technology

سال: 2020

ISSN: 2227-524X

DOI: 10.14419/ijet.v9i2.30382