262 research outputs found

    Towards Creating a Model of IoT to be used in Library Activities for Saudi Arabia\u27s Taibah University

    Get PDF
    The library must create a replacement organisation system in instruction to swap the existing system with the new one. There are several details why library operates need to adopt a new scheme, including the following: I have lost a lot of info on library books. The lack of familiarity with the literature Difficulty deciphering the fine print of library operations because of a sluggish system Difficulty in maintaining current information. Apart from orientation, the user interfaces are pleasant, and retraining was required. The researcher suggests that this approach be used on an ongoing basis to ensure the continued provision of library services. Other management responsibilities include serials and magazines, as well as reservations book, e-mail notice, and automated reminder, as well as the use of bar codes, scanners, and labels, as well as the custom of regularity identification tags to reduce book theft. Additionally, it is suggested that the library system engage in online surfing to enable users to access books and courses through the internet. The proposed research project would contribute to the development of a model IoT application for library operations at TIBA University in Saudi Arabia. The new system will manage and regulate all library information, resolving the aforementioned issues while also providing numerous advantages to staff and students

    Com decidir-se per un sistema RFID: l'experiència de la Biblioteca Campus Gandia, UPV

    Full text link
    La tecnologia RFID (Radio Freqüència i Identificació) està en aquests moments en plena expansió en l'àmbit bibliotecari a Espanya com a eina per a la gestió de la col·lecció i els serveis. En aquesta comunicació es presenta tot el procés desenvolupat per la Biblioteca Campus Gandia (UPV) en la presa de decisió per a la implantació d'aquesta tecnologia RFID, des de la fase inicial d'estudi d'aquesta fins a la posada en marxa del sistema. Es descriuen les accions relacionades amb l'anàlisi de la Biblioteca (característiques, tipus de fons, compatibilitats...), l'avaluació de proveïdors i costos, la conversió i etiquetatge, i la posada en marxa de la tecnologia. Finalment es valoren els avantatges per a la Biblioteca, sobretot en l'escenari quotidià, els beneficis i les primeres impressions generals.Sastre Miralles, N.; Llodrá Sendra, MA.; López González, A.; Dos Santos Pérez, CM. (2010). Com decidir-se per un sistema RFID: l'experiència de la Biblioteca Campus Gandia, UPV. COBDC. http://hdl.handle.net/10251/833

    Secured e-payment system based on automated authentication data and iterated salted hash algorithm

    Get PDF
    Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used VB.Net C# environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption

    PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing

    Get PDF
    An ultra-lightweight, a very compact block cipher ‘PICO’ is proposed. PICO is a substitution and permutation based network, which operates on a 64 bit plain text and supports a key length of 128 bits. It has a compact structure and requires 1877 GEs. Its innovative design helps to generate a large number of active S - boxes in fewer rounds which can thwart the linear and differential attacks on the cipher. PICO shows good performance on both the hardware and the software platforms. PICO consumes only 2504 bytes of Flash memory which is less than the ultra-lightweight cipher PRESENT. PICO has a very strong substitution layer (S-box) which not only makes the design robust but also introduces a great avalanche effect. PICO has a strong and compact key scheduling which is motivated by the latest cipher SPECK designed by NSA. PICO consumes 28 mW of dynamic power which is less than the PRESENT cipher (38 mW). The security analysis of PICO and its performance as an ultra-lightweight cipher are presented.

    Development Of Fingerprint Biometric Attendance Management System Using Wireless Connectivity

    Get PDF
    In this paper, we propose an integrated biometric access system for attendance management based on fingerprint identification and authentication for restricted area using wireless connectivity. Maintaining the attendance record in institutions, companies and organisations is an imperative factor, maintaining so manually is herculean task. Along with it, institutions with single machine and more crowd makes this work more complicated to make this easier, an efficient Biometric Fingerprint Attendance Management system is proposed. This system registers the user and accepts biometric input through use of mobile network, and all records will be saved for subsequent operations. Since input image is accepted through mobile, it provides greater portability and reduces need for any specific biometric hardware, which in turn reduces the hardware cost. It further provides and facilities to calculate and generate monthly report of attendance in order to reduce any human errors during calculations. Thus, the proposed system will help to improve the productivity of any organization if properly implemented. DOI: 10.17762/ijritcc2321-8169.150315

    A Framework for the Implementation of RFID Systems

    Get PDF
    There are an increasing number of organizations planning to implement Radio Frequency Identification (RFID) systems to enhance their competitiveness. Due to the novelty of the technology, many managerial challenges exist in determining and planning for the implementation of such systems. These challenges often lead to wasted efforts and resources, as well as to failed implementations. This paper presents a systematic and holistic RFID implementation framework which has been validated by both users and experts. The framework outlines the important tasks to be performed in each step of the implementation process. To enable practitioners to make informed go/no‐go decisions, essential considerations of implementation are also discussed in this paper. Furthermore, the critical success factors for the deployment of such systems are also elaborated

    A case study into the implementation of RFID at the Pilkington Library Loughborough University

    Get PDF
    The aim of the study was to examine the implementation of RFID at the Pilkington Library. This was the first time the entire process had been examined, pulling together both qualitative and quantitative data. The study examined internal Library statistics on issue figures, sick leave, staffing costs and enquiries. It also used pre-existing Library user survey data and an internal training survey. These were combined with interviews with Library staff to gain their impressions of the implementation process. All these data streams combined to create a longitudinal case study over a period of two years, so that an impression was gathered of RFID both in its infancy and as it matured. The study concluded that implementation was an undoubted success: issue targets were exceeded within three months, staffing costs were reduced ahead of schedule and enquiries increased. The user survey proved popularity amongst users and staff interviews provided proof of positivity towards RFID. It is important that major initiatives are assessed to evaluate success. Having done so, other libraries could use the success of Loughborough to support their own arguments for investment. It also makes it more likely that the Pilkington Library will gain further investment from the University as they can be seen to provide excellent value for money. The study's main limitation is that it is based at one library. It would be worth examining the processes involved at other libraries to establish common themes or to assess whether the Pilkington Library's experience with RFID is an anomaly

    Library Automation in lndia

    Get PDF
    This paper discusses about the Library automation movement in India. It discusses the growth of computers in the country when it came in to the libraries, development of library automation software in India. It also gives a list of library software packages available in India and its features also. It tells about what all are the advantages of the library Automation
    corecore