identification number
Recently Published Documents


TOTAL DOCUMENTS

222
(FIVE YEARS 66)

H-INDEX

9
(FIVE YEARS 2)

Author(s):  
Waly Fall ◽  
Djamal Abdoul Nasser Seck ◽  
Fabé Idrissa Barro

This article focuses on the realization of an access control system based on RFID (Radio Frequency by Identification) technology. It is an authentication system for controlling access to a sensitive place. This system is composed of RFID cards which are badges that act as electronic keys, an RFID reader, an electronic lock, a microcontroller, a wifi module and a database installed on a computer. The identification number of an RFID card detected by the RFID reader is transferred, via the serial interface, to the microcontroller that communicates with the computer through the wifi module for verification in the database. If the information is valid, the microcontroller triggers the opening of the electronic lock.


Author(s):  
Yuya Kono ◽  
Ping Zhang

A red-white coloring of a nontrivial connected graph [Formula: see text] of diameter [Formula: see text] is an assignment of red and white colors to the vertices of [Formula: see text] where at least one vertex is colored red. Associated with each vertex [Formula: see text] of [Formula: see text] is a [Formula: see text]-vector, called the code of [Formula: see text], whose [Formula: see text]th coordinate is the number of red vertices at distance [Formula: see text] from [Formula: see text]. A red-white coloring of [Formula: see text] for which distinct vertices have distinct codes is called an identification coloring or ID-coloring of [Formula: see text]. A graph [Formula: see text] possessing an ID-coloring is an ID-graph. The minimum number of red vertices among all ID-colorings of an ID-graph [Formula: see text] is the identification number or ID-number of [Formula: see text]. It is shown that the grid [Formula: see text] is an ID-graph if and only [Formula: see text] and the prism [Formula: see text] is an ID-graph if and only if [Formula: see text].


2021 ◽  
Vol 3 (2) ◽  
pp. 71-77
Author(s):  
Sussanti Sussanti

Based on the results of initial observations that researchers did, there were still liars committed by service officers at the North Tatura Village Office. And also the administrative service time is quite long, which is above 30 minutes. Whereas based on the Standard Operating Procedure (SOP) for administrative services in North Tatura Village, it states the requirements to make or improve population administration, then the community must complete it with a photocopy of family card, photocopy of proof of payment of PBB, old ID card for additions and transfer letter for those who move. no fees are charged with a service time of 10 to 15 minutes. The type of research used in this research is descriptive. The establishment of the Palu City Regional Regulation Number 8 of 2004 concerning the administration of the population of Palu City, the content in this Regional Regulation is also specifically concerning the National Population Identification Number (NIK) instead of the Resident Number for regional visits. The type of research used in this research is descriptive. In this study, the researcher was involved in the situation and setting of the phenomenon under study. In this study, interviews were conducted with informants consisting of the New Village Head, Secretary of the Village Head, Head of the Government Section, and the Community. The results of interviews with researchers and informants obtained are then presented in the form of discussions then explanations and explanations.


2021 ◽  
pp. 1866802X2110526
Author(s):  
Andrew Janusz ◽  
Cameron Sells

Party elites may hinder racial and ethnic minorities from winning public office by withholding resources. Prior studies have explored the distribution of money, media access, and party-list positions. In Brazil, party elites provide each candidate with a unique identification number. Voters must enter their preferred candidate’s identification number into an electronic voting machine to register their support. In this article, we replicate and extend Bueno and Dunning’s (2017) analysis of candidate identification numbers. They conclude that party elites do not provide white candidates with superior identification numbers than non-whites. We contend that assessing intraparty variation is theoretically and methodologically warranted. Using party fixed effects, we find that party elites provide non-white candidates with worse identification numbers than whites. We demonstrate that our findings are generalisable using data from other elections. Moreover, we show that party elites also withhold advantageous numbers from women and political novices.


Author(s):  
Dr. L. Srinivasan

With covid-19 being on the Rise we needed an efficient way to take care of the growing coronavirus cases. Various Tools and techniques are used to curb the spread of the virus this project aims to develop an application that helps in detecting and identifying the individuals that are not wearing a proper face mask when out in public. The photograph is taken and uploaded there is a huge data base of individual's information for example their name, semester, identification number, university seat number, branch etc. the photographs are run through the database to identify the persons without wearing a mask using facial recognition in this application can be very effectively used to curb the cases of Corona since it identifies the mask defaulters and thus we can help in controlling the infection and the spread of the virus and save many lives.


Author(s):  
Miss. Jayashri Rajendra Mahale ◽  
Prof. E. M. Chirchi

Blockchain is very emerging trend in recent years; it is basically decentralized approach which provides transparency to transactional data. Various researchers already introduces blockchain and its state of art, it is too much effective in a large data processing as well as global transactional systems. In this paper we introduce blockchain base E-certificate generation using cloud environment. Basically in real time environment it is hard to carry educational or other important documentaries. Some confidential information should be leak from various centralized systems when any resource has compromised with attackers. In this system we provide drastic supervision base blockchain technique to generate e certificate according to submitted documentary by respective student as well as user. The system illustrates into four different sections. First we defines user can upload his documentary or educational certificates, similarly the middleware authority known as Third Party Auditor (TPA) will verify such documents from authenticated organization. If the entire documents have authorized then it dynamically generate e-certificate with QR code and unique serial identification number. Once this process has done whole information has stored into various data nodes and it returns QR code as well as UID to student. Moreover when any organization wants to verification documentary of respect to student he can submit the QR code or are given Unique Identification number to respective organization. When such organizations will verify the student’s data the blockchain will provide consistent information after the secure authentication. In entire execution we have written open Smart contract, had generation approach using SHA family algorithm, mining algorithm to generator valid hash, in consensus algorithm to evaluate the proof of work.


Author(s):  
J. Balakrishna

Manual monitoring consumes more time, man power and shows inaccurate results. So, automation is the solution to cover the problems stated. Barcode and RFID are two different forms of automated technology that are used for reading and collecting data. The RFID (Radio Frequency Identification) technology is a well-known wireless application for traceability, logistics and access control. The RFID controller is constructed in to demonstrate access control through the use of low-frequency RFID tags. These tags contain identification number which is read by the reader, sent to a database where it is compared with stored values. It works on the principle that If the tag’s identification number is in the system database, it gives access. If the data is not in the system database, it doesn’t give access. To implement these various blocks, include RFID transmitter, RFID receiver, Baud clock generator, Database are designed. The RFID Controller is designed using Verilog HDL in Xilinx ISE tool.


Author(s):  
D Kurniasih ◽  
A Feryandi ◽  
L Nurmayanti ◽  
P D Usmany

This research aims to analyze the efficiency of the Single Identification Number on the identity card (e-KTP). The method used in this study was descriptive with the survey method, and to determine the efficiency of this study, we conducted questionnaires. This research results in several factors that determine the success of the Single Identification Number's success on e-KTP, including technical and economic aspects. From some of these factors, technological factors are obtained. Meanwhile, economic factors can help people to simplify administration anywhere without having to carry a different card. Moreover, it also anticipates the scarcity of blanks. Therefore, the Single Identification Number of e-KTP can be efficient in carrying out its function as a multi-purpose single identification number in a digital card (e-KTP) that makes it easier for the public. E-KTP becomes a solution for the community problem that can use as a multifunctional card, which will make it easier for the community to carry out administrative activities. Not only that, but the community is also facilitated by only doing one organizational activity


2021 ◽  
Author(s):  
Ian Wilson ◽  
Martin Hooton ◽  
Joan Valls Mestre ◽  
Ben Addy ◽  
Ezra Groskin

<p>The Somers Town Bridge crosses the Regents Canal in central London and was opened in 2017. It is a bridge of extreme simplicity - almost impossibly slender – but meeting the structural demands with the very minimum of materials.</p><p>Designed for cyclists and pedestrians to cross from Camley Street into the King’s Cross development; a landmark redevelopment project by the developer client, Argent (on behalf of King’s Cross Central Partnership Ltd); the bridge spans 38m and is only 1100mm deep at mid-span and 400mm deep at the ends. In keeping with the Victorian heritage of the area, the bridge is unadorned and streamlined, focusing attention on extremely detailed and precise craftsmanship and high-quality materials.</p><p>With such a slender deck form this bridge would normally be sensitive to pedestrian induced vibrations, but for the inclusion of 3 sets of tuned mass dampers at mid-span that are hidden by a cover plate that provides the bridge identification number – 34B.</p><p>This paper presents the story of the bridge development and its response to several challanges.</p>


2021 ◽  
Vol 16 (3) ◽  
pp. 176-183
Author(s):  
Kazhenova Gulnar T. ◽  
◽  
Dobrovolskiy Lubomir S. ◽  

The localization of the Scythian Gerros is still completely uncertain. The problems associated with it cover a wide range of currently unresolved topical issues due to both the state of preservation of rich burials and the lack of clear criteria for their definition, in particular, social ranking, i. e. issues related to the identification, number and location of the royal mounds. The study is based on the logic of the general scientific inductive and deductive method as the conceptual core of obtaining the initial and inferred knowledge about the object of our research – the localization of the mounds of the Scythian kings, the subject of which is the general cultural and archaeological signs of the Scythian kings’ mounds. We have come to the conclusion that the use of craniological studies of anthropological material from burial monuments located within the Scythian “square” of Herodotus, for their proximity to the Tuvan Okunevians will firstly allow us to identify and select the royal Scythians from the entire massif of Scythian material, then subsequent mapping of the data will make it possible to determine the area of their settlement. Secondly, with the help of craniological analysis, it will be possible to determine the burials of the Scythian kings, which should contain homogeneous anthropological material within the same burial room. Thirdly, in the process of searching for Scythian burials outside the steppe, we will also be helped by craniological studies of material that was not initially classified as “Scythian” due to the lack of clear criteria for its selection. Fourthly, the mapping of the burials of the royal Scythians and the systematization of all the signs of groups located in the same vector of their closest ties will bring us closer to solving an even more extensive problem – the definition of the concepts of “Scythian”, “Scythian culture” and “Scythian archaeological culture”. Keywords: Gerros, mound, localization, Scythian kings’ mounds, royal Scythians


Sign in / Sign up

Export Citation Format

Share Document