Automatic check-in system using SICI. LIRACS-II.
نویسندگان
چکیده
منابع مشابه
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولAutomatic SOM Compatibility Check & FOM Developments
The High Level Architecture (HLA) is widely used in defense applications as a common framework for modeling and simulation. The Federation Development and Execution Process (FEDEP) is a generalized process to build HLA federations from scratch. However, simulation model design, implementation, testing and execution defined in the FEDEP are time consuming and expensive. The Model Construction En...
متن کاملAutomatic Firefighting System Using Plc
A Fire-fighting system, as the name suggests is a system concerned with extinguishing fire using sensors. Such an automated Programmable Logical Controller (PLC) system uses a Jockey Pump, a Main Pump and a Diesel engine. The PLC also monitors the operation of the Diesel engine. In advent of a fire, there should be a continuous flow of water through the hydrant line, pressure of which is regula...
متن کاملAgents Network for Automatic Safety Check in Constructing Sites
Compliance with safety standards in constructing sites is a mandatory activity that helps prevent a high number of fatalities during working activities. Unfortunately, because of negligence or limited resources, safety checks are not performed with regularity and this causes a high number of accidents. This paper proposes a distributed solution for automated checking of safety rules, secure log...
متن کاملAn Electronic Bearer Check System
In this paper, we propose a novel electronic bearer check system (EBC). This system allows the consumer to pay any amount of money below an upper-boundary on the Internet within an expiration period. During each transaction, the consumer does not need to contact the bank’s server. Furthermore, this electronic bearer check can be transferred to any third party. The off-line characteristic of our...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing and Management
سال: 1998
ISSN: 0021-7298,1347-1597
DOI: 10.1241/johokanri.41.265