2021
DOI: 10.1007/978-3-030-82616-1_19
|View full text |Cite
|
Sign up to set email alerts
|

JomNFCSignIN: Seamlessly Register Your Class Attendance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
1
0
Order By: Relevance
“…This empowers the recommended framework to be affirmed in view of the downsides of the contending innovation in Table 1. The cycle is begun by bringing one gadget near another gadget's NFC collector (Mazumdar, 2021). Upon discovery, a magnetic induction cycle will happen, and a radio frequency of 13.56 MHz will be sent in that field to drive the other gadget for record move.…”
Section: Literature Reviews 21 Study Contextmentioning
confidence: 99%
“…This empowers the recommended framework to be affirmed in view of the downsides of the contending innovation in Table 1. The cycle is begun by bringing one gadget near another gadget's NFC collector (Mazumdar, 2021). Upon discovery, a magnetic induction cycle will happen, and a radio frequency of 13.56 MHz will be sent in that field to drive the other gadget for record move.…”
Section: Literature Reviews 21 Study Contextmentioning
confidence: 99%
“…The use of passive card NFC based implementation and applications has been in use throughout the years [2][3][4] which represents door traditional techniques that use an external system for databases and registry that requires extra energy consumption as it needs to be operated in a different device that by default results in a complicated databases system, besides being prone to high privacy and security attacks that violates the main purpose of a secure door system. Moreover, based on a 2020 SWIFT LANE study analysis card access systems [2] are vulnerable to a security concern of losing or misplacing the access card which leads to major risks to the building security.…”
Section: Background Studymentioning
confidence: 99%
“…Therefore, maintaining the hotel, and providing the best experience is a top priority for both the guests and employees in the location. It is known that most hotel operators or guests believe that there is a concerning amount of technology limitations and shortcomings in hotels around the globe [4], which is considered quite abnormal especially in this economy and the revolution future of Information Technology. One of the major important aspects in hotels that is responsible for security as well as management convenience is the hotel access points and their management [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed app was validated through a questionnaire from students and faculty. A similar work in [21] based on NFC technology with an android app recommend it as cheaper. The work, was also validated through questionnaire from public and private institutes.…”
Section: Introductionmentioning
confidence: 99%