Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 60 tok/s
Gemini 2.5 Pro 50 tok/s Pro
GPT-5 Medium 22 tok/s Pro
GPT-5 High 18 tok/s Pro
GPT-4o 82 tok/s Pro
Kimi K2 197 tok/s Pro
GPT OSS 120B 458 tok/s Pro
Claude Sonnet 4.5 30 tok/s Pro
2000 character limit reached

Implementation of a Sustainable Security Architecture using Radio Frequency Identification (RFID) Technology for Access Control (2304.04628v1)

Published 10 Apr 2023 in eess.SY, cs.DB, cs.IR, and cs.SY

Abstract: Implementation of a sustainable security architecture has been quite a challenging task with several technology deployed to achieve the feat. Automatic IDentification (Auto-ID) procedures exist to provide information about people, animals, goods and products in transit and found several applications in purchasing and distribution logistics, industries, manufacturing companies and material flow systems. This work focuses on the development and implementation of an access control system using Radio Frequency Identification (RFID) technology to enhance a sustainable security architecture. The system controls access into a restricted area by granting access only to authorized persons, which incorporates the RFID hardware (RFID tags and readers and their antennas) and the software. The antenna are to be configured for a read range of about 1.5 m and TMBE kit reader module was used to test the RFID tags. The encoding and decoding process for the reading and writing to the tag as well as interfacing of the hardware and software was achieved through the use of a FissaiD RFID Reader Writer. The software that controls the whole system was designed using in Java Language. The database required for saving the necessary information, staff/guest was designed using appropriate DataBase Management System (DBMS). The system designed and implemented provide records of all accesses (check-in and check-out) made into the restricted area with time records. Other than this system, Model based modeling through the MATLAB/Simulink, Arduino platform, etc. can be used for similar implementation.

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube