Emergency Fuel Rationing system using RFID Smart Cards
نویسندگان
چکیده
منابع مشابه
Smart Playing Cards – Enhancing the Gaming Experience with RFID
The idea of pervasive gaming, where traditional, tabletop games are enhanced with wireless computing devices, has recently received increased attention. In this paper, we present a card game that is augmented with information technology to advise novice players and to relieve the players of mundane tasks, such as score keeping. The paper outlines in particular our efforts to build a system that...
متن کامل8 Fingerprint Authentication System For Smart Cards
Among the several methods that enable fingerprint authentication of card holders, the one that executes the matehing process on the smart card chip is the most important. The Pattern matehing method, such as [1] , is of no use for smart cards, because it takes too much time to adjust the position between the input image and template image. So we have developed an algorithm (FTA: Free Turning Al...
متن کاملComputerized Toll Collection System Using Smart Card with Rfid
This research paper describes the automated toll collection system for tollgate based on SMART card technology. Most of the toll collection system is in manual transaction. Nowadays, there is a huge rush in toll plaza in order to pay the toll tax. It results in traffic jam, fuel waste and time waste. The objective of this paper is to transform manual transaction to automated toll collection sys...
متن کاملFermentation Food Monitoring System using the Smart RFID Sensor Tag
People in the world made a unique fermented food for a long time. These fermented foods have been increased interest to people health in recent years. These fermented foods can be caused a disease in the event of misunderstood difference between fermentation and putrefaction. In addition consumers can’t know degree of different between fermentation and putrefaction. Therefore, the monitoring sy...
متن کاملAuthenticating Passwords Remotely Using Smart Cards
In 2000, Sun proposed a user authentication scheme without using a password table but the user’s password is assigned by the server. Due to this reason, Wu and Chieu proposed an improved scheme to overcome the drawback in 2003. Their scheme provides users to choose and change passwords freely. However, Yang and Wang has presented the possible attacks on Wu-Chieu scheme in 2004. In this article,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Al-Khwarizmi Engineering Journal
سال: 2017
ISSN: 2312-0789,1818-1171
DOI: 10.22153/kej.2017.09.004