image processing supposed to provide an authentication for the user. Authentication is granted if the password was entered correctly
标签: Authentication authentication processing supposed
上传时间: 2017-09-24
上传用户:thinode
Use the on-board potentiometer to simulate an analog input,this input converted into a meaningful digital value in a microcontroller register, and use a group of LED to display this value.
标签: input potentiometer meaningful converted
上传时间: 2017-09-25
上传用户:iswlkje
An applicaion that utilize a fingerprint scanner to turn off the PC
标签: fingerprint applicaion scanner utilize
上传时间: 2017-09-25
上传用户:小儒尼尼奥
Functions to transmit RFID
标签: Functions transmit RFID to
上传时间: 2013-12-31
上传用户:拔丝土豆
an example for java not to good but i am a beginer
上传时间: 2017-09-26
上传用户:zhangyi99104144
It is an expert system using clips language to diagnose the eyes problem
标签: diagnose language problem expert
上传时间: 2017-09-28
上传用户:王庆才
Many times I have been asked to explain “ briefl y ” how SDH, SONET, and the OTN “ exactly ” work. The questions came mainly from new colleagues, stu- dents, and users of these technologies, personally or via the usenet newsgroup comp.dcom.sdh - sonet. I could have referred them to the standards documents, but to provide a more consistent and clear answer I decided to write this pocket guide. The objective of this book is that it can be used both as an introduction as well as a reference guide to these technologies and their spe- cifi c standards documents.
标签: Generation Transport Optical ComSoc Guide
上传时间: 2020-05-27
上传用户:shancjb
The next avatar of the Internet will revolutionize our world. In time, it will provide us a universal remote control, enabling us to monitor and control physical objects located anywhere on the planet, using a smart phone. It will make the universe around us programmable, allowing us to script the behav- ior of physical objects with electronic commands. This book is about such an emerging new version of the Internet.
标签: Infrastructure Construction Design RFID and an of
上传时间: 2020-06-08
上传用户:shancjb
Identification is pervasive nowadays in daily life due to many complicated activities such as bank and library card reading, asset tracking, toll collecting, restricted access to sensitive data and procedures and target identification. This kind of task can be realized by passwords, bio- metric data such as fingerprints, barcode, optical character recognition, smart cards and radar. Radiofrequencyidentification(RFID)isatechniquetoidentifyobjectsbyusingradiosystems. It is a contactless, usually short distance, wireless data transmission and reception technique for identification of objects. An RFID system consists of two components: the tag (also called transponder) and the reader (also called interrogator).
标签: Processing Digital Signal RFID for
上传时间: 2020-06-08
上传用户:shancjb
Radio frequency identification (RFID) technology is witnessing a recent explosion of development in both industry and academia. A number of applications include supply chain management, electronic payments, RFID passports, environmental monitoring and control, office access control, intelligent labels, target detection and tracking, port management, food production control, animal identification, and so on. RFID is also an indispensable foundation to realize the pervasive computing paradigm—“Internet of things.” It is strongly believed that many more scenarios will be identified when the principles of RFID are thoroughly understood, cheap components available, and when RFID security is guaranteed.
标签: Architectures NETWORKS SENSOR RFID AND
上传时间: 2020-06-08
上传用户:shancjb