Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2010, Computer Science and …
…
1 page
1 file
This paper is about the client/server model of security with Bar-coded Identity Cards. Client and server are not just two words put together but it includes a vast range of softwares by having a backbone of client/server database. By making a client/server database we have implemented our project with a new perspective. We have developed a compact and reliable software package for the management information system of any University or institute. This package also includes the security system for the detection of the students on the basis of encrypted Bar-codes. Detection of student is done using bar-code reader with the client/server database running at the back end.
At the moment, the amount of Library system approach made in most of the colleges and universities remains with the manual Operations. For the matter of Standard manual operation is long & inconvenience, this paper proposes a bar code based library Control Authentication with intended and enforced support of net service & Desktop application. In this system, the three-layer architectural design is utilized, applying model building language that UML carries on analysis and style, exploitation MySQL technology to create backend information i.e. Database maintenance. In order to get the information of Particular book-the barcode reader is implemented in this system. Finally to boost the operative potency of the system, we tend to use the stored procedures and trigger the technology to optimize the database performance and manage the members, Book Transactions in daily basis etc. By actual look, we tend to correct the system bug and improve the system performance along with the GU interface.
2017
Student in out system play significant role in order to justify in out entry of a student in a college as overall. Unfortunately, there is no automated entry exit record keeping application available in colleges.There is a need for a tool to systematically keep the students entry exit record due to increasing number of college students. The project that we are going to make is to help the Gatekeepers in our college to avoid maintaining the registry book. This project uses a barcode scanner. B.B.S.I.O.S uses Barcode scanner to take the entry exit record of students entering the college campus. Each student's ID card will have a barcode at the back side of it. This barcode contains unique data of the student such as student id. Student will scan their barcode at the gate so that the student cannot cheat. The display screen will show the entry exit record of the particular student after scanning his/her barcode. Gatekeeper and administrator will only have access to the system with their respective login ID's and passwords.
All academic institutions have certain criteria for students regarding their attendance in class and examinations. The importance of student attendance in class cannot be over emphasized, as a result of this, administrators and lecturers of various academic institutions are concerned with the attendance irregularities. In the process of admitting students into an examination hall in most Nigerian institutions, 70% of attendance must be met and also considered for grade computation, therefore there is a huge need for monitoring and recording students' attendance. This brings about the need to have a tool to control students' attendance. The existing model of manual attendance monitoring (using paper sheets and an old file system) is not efficient and it is also time consuming. These aforementioned shortcomings among others serve as justification for migrating from manual based to the proposed system. The system is based on barcode reader technology and the details of this system are presented in this paper. The system can be easily accessed by the lecturers and most importantly, the reports can be generated in real-time processing, thus, providing valuable information about the students.
Advances in Soft Computing, 2009
In the paper, design concept, architecture and functionality of the "Students' Electronic Card" computer system are presented. The system was developed in 1998-2007 and deployed at the
International Journal of Advanced Computer Science and Applications, 2011
With the vast introduction of the wireless world, the exchanged information now is more prone to security attacks than ever. Barcodes are the information careers in the form of an image. Their various applications have been discussed in brief and also the structure, symbology and properties of barcodes. This paper aims to provide an approach which can share high security information over the network using QR barcodes. QR barcodes are explained in detail to get the rigged understanding on quick response technology. The design of data security model to share the data over the network is explained. This model aims to enable secure data share over the network. This model is a layered architecture and protects the data by transforming the structure of content. So barcodes are used to put tricks over the information rather than directly using it for its noble functionality.
IEEE IT Pro, 2019
The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code every time to use secure servers. The mobile device generates a secret to encrypt his/her credentials and saves it so that the browser can be accessed, thus enabling him/her to log onto secure servers. & QR CODES ARE 2-D bar codes storing certain information. Users normally use QR codes based authentication schemes to defeat phishing, spy-ware, key loggers, and other attacks. Most of the existing QR authentication schemes use various techniques such as trusting third-party online password storage servers, using embedded challenge nonce, deploying tamper-resistant IC chips, and modification of web servers. This paper proposes a QR codes based secure web server authentication technique without a trusted third party. A user logs in to a website by scanning a QR code to verify the server without entering a user ID and password. The protocol uses a shared secret between the user's device and the server. A hardware-based authentication approach uses a USB and NFC dual-interface token with embedded tamper-resistant IC chips to facilitate users to log in to web servers. 1 A browser app is required to communicate with the IC-chips using a USB or NFC channel. This approach has been extended to indirect NFC authentications by using QR codes to simulate the USB or NFC interface. 2,3 There are also recommendations to use QR codes for password storage. For example, TiQR 4 and MyDigiPass 5 market their password storage servers. In their products, a user registers an account within the marketed servers and stores it in the registered account his/her user-name and passwords for different web services. Each time a user wants to log in to a web server, the user retrieves the password from the servers
Student attendance play significant role in order to justify academic outcome of a student and college as overall. Unfortunately, there is no automated attendance record keeping application available in colleges. There is a need for a tool to systematically keep the students attendance record due to increasing number of college students The project that we are going to make is to help the teachers in our college to avoid maintaining the registry book. This project uses a barcode scanner. B.B.S.A.S uses Barcode scanner to take the attendance of students entering the lab. Each student's ID card will have a barcode at the back side of it. This barcode contains unique data of the student such as roll number, branch and year. Etc. Student will scan their barcode at the end so that the student can't cheat. The display screen will show the attendance of the particular student after scanning his/her barcode. Teachers and administrator will only have access to the system with their respective login ID's and passwords.
Invitation for the interesting Lecture by Dr Ilaria CRISTOFARO on the archaeoastronomical orientations of ancient Hellenic Temples, co-organized by the Institute, the Italian Archaeological School in Athens and the ISPC-CNR. At the premises of SAIA (14, Parthenonos Str., GR-11742, Athens), on Friday 11th October 2024, at 19:00'. The public is kindly requested to arrive not before 18:55' Athens Time (= GMT + 3).
Bachelor's thesis, 2015
This bachelor's thesis examines infantry combat tactics in the Austro-Hungarian Army at the outset of World War I. In particular, it focuses on Austro-Hungarian infantry assault doctrine, and attempts to uncover the "system" designed by Austro-Hungarian tacticians for offensive use. In contrast with popular depictions of World War I tactics and doctrine, this thesis argues that prewar planners and tacticians were very aware of the destructive capabilities of new weapons, especially when deployed in defensive positions. Aware of this massive killing power, prewar tacticians expected and accepted high casualties. The success of prewar assault doctrine was therefore predicated on high casualties. The second half of this thesis examines Austro-Hungarian assault doctrine "in action" through a case study of one infantry battalion's "baptism of fire" in August 1914. The case study illustrates that prewar Austrian planners' understood the probable outcomes of their tactical system.
Correspondencias & Análisis, 2024
Un enfoque multidimensional en la psicoterapia psicoanalítica, 2023
Österreichische Zeitschrift für Geschichtswissenschaften, 2023
Financial Assets and Investing, 2016
Good practice in delivering and evaluating interventions for young people with harmful sexual behaviours. ANROWS Research Report. Issue 18, June 2020, 2020
From leaders to rulers, 2001
Bollettino della Societa Paleontologica Italiana
Journal of Environmental Biology, 2021
The journal of intersectionality, 2022
Eastern Mediterranean Health Journal, 1998
Terrestrial, Atmospheric and Oceanic Sciences, 2019
Revista Mexicana de Sociología, 2023
National Journal of Community Medicine, 2020