T
E
L
KO
M
N
I
KA
T
e
lec
om
m
u
n
icat
ion
,
Com
p
u
t
i
n
g,
E
lec
t
r
on
ics
an
d
Cont
r
ol
Vol.
18
,
No.
1
,
F
e
br
ua
r
y
2020
,
pp.
538
~
544
I
S
S
N:
1693
-
6930,
a
c
c
r
e
dit
e
d
F
ir
s
t
G
r
a
de
by
Ke
me
nr
is
tekdikti
,
De
c
r
e
e
No:
21/E
/KP
T
/2018
DO
I
:
10.
12928/
T
E
L
KO
M
NI
KA
.
v18i1.
15623
538
Jou
r
n
al
h
omepage
:
ht
tp:
//
jour
nal.
uad
.
ac
.
id/
index
.
php/T
E
L
K
OM
N
I
K
A
S
e
c
u
r
e
d
e
-
p
aym
e
n
t
syste
m
b
a
se
d
on
a
u
t
o
m
at
e
d
au
t
h
e
n
t
ic
at
io
n
d
at
a an
d
i
t
e
r
at
e
d
sal
t
e
d
h
ash
al
gor
ith
m
Ali
Al
F
ar
awn
1
,
Has
an
e
in
D.
Rj
e
ib
2
,
Nabee
l
S
ali
h
Ali
1
*
,
B
as
h
e
e
r
Al
-
S
ad
awi
1
1
In
fo
rma
t
i
o
n
T
ec
h
n
o
l
o
g
y
Res
earc
h
an
d
D
ev
e
l
o
p
men
t
Ce
n
t
re,
U
n
i
v
ers
i
t
y
o
f
K
u
fa,
Iraq
2
E
CE
D
e
p
art
me
n
t
,
Facu
l
t
y
o
f
E
n
g
i
n
eer
i
n
g
,
U
n
i
v
e
rs
i
t
y
o
f
K
u
fa,
Iraq
Ar
t
icle
I
n
f
o
AB
S
T
RA
CT
A
r
ti
c
le
h
is
tor
y
:
R
e
c
e
ived
M
a
y
1
,
2019
R
e
vis
e
d
J
ul
8
,
20
19
Ac
c
e
pted
J
u
l
20
,
20
19
E
l
ec
t
ro
n
i
c
p
a
y
men
t
h
as
b
ee
n
co
n
s
i
d
ered
as
o
n
e
o
f
t
h
e
mo
s
t
s
i
g
n
i
f
i
can
t
an
d
co
n
v
en
i
en
t
ap
p
l
i
cat
i
o
n
s
o
f
m
o
d
er
n
el
ec
t
ro
n
i
c
s
erv
i
ces
e
-
U
n
i
v
er
s
i
t
y
co
m
p
are
d
t
o
t
rad
i
t
i
o
n
al
met
h
o
d
s
t
h
at
i
m
p
o
s
e
t
i
me
-
c
o
n
s
u
m
i
n
g
,
h
u
man
res
o
u
rce
s
,
an
d
i
n
eff
i
ci
e
n
cy
.
D
i
fferen
t
au
t
o
ma
t
i
c
i
d
en
t
i
f
i
cat
i
o
n
t
ec
h
n
o
l
o
g
i
e
s
h
av
e
b
een
w
i
d
el
y
u
s
ed
,
s
u
c
h
as
rad
i
o
freq
u
e
n
cy
i
d
e
n
t
i
fi
cat
i
o
n
(RFID
).
E
x
t
en
s
i
v
e
res
earch
a
n
d
s
ev
era
l
ap
p
l
i
cat
i
o
n
s
are
f
o
cu
s
i
n
g
o
n
t
ak
i
n
g
t
h
e
max
i
mu
m
ad
v
a
n
t
a
g
e
o
f
RFI
D
t
ec
h
n
o
l
o
g
y
.
D
a
t
a
an
d
i
n
fo
r
mat
i
o
n
s
ecu
r
i
t
y
h
a
d
co
n
s
i
d
ered
a
cru
ci
a
l
ro
l
e
w
h
en
i
n
fo
rma
t
i
o
n
co
n
c
ern
i
n
g
e
-
co
mmerce,
e
-
b
an
k
i
n
g
,
o
r
e
-
p
ay
men
t
s
,
es
p
eci
a
l
l
y
d
u
e
t
o
i
t
req
u
i
re
d
real
d
at
a
t
o
es
t
a
b
l
i
s
h
acces
s
e
d
i
l
l
e
g
al
l
y
.
H
e
n
ce,
d
at
a
o
ri
g
i
n
al
i
t
y
an
d
s
ecu
r
i
t
y
fal
l
a
v
ery
s
i
g
n
i
f
i
ca
n
t
an
d
cr
i
t
i
cal
i
s
s
u
e
i
n
d
at
a
c
o
mmu
n
i
ca
t
i
o
n
s
erv
i
ce
s
i
n
re
cen
t
y
ear
s
.
A
p
p
l
i
cat
i
o
n
s
s
u
c
h
as
e
-
b
an
k
i
n
g
o
r
e
-
co
mmerce
reg
u
l
a
rl
y
co
n
t
ai
n
s
en
s
i
t
i
v
e
an
d
p
ers
o
n
a
l
i
n
f
o
rmat
i
o
n
t
h
a
t
s
h
o
u
l
d
b
e
man
a
g
ed
an
d
co
n
t
r
o
l
l
ed
b
y
au
t
h
o
r
i
zed
p
ers
o
n
s
.
T
h
u
s
,
k
eep
i
n
g
a
s
ecu
re
p
as
s
w
o
r
d
i
s
i
mp
o
rt
a
n
t
t
o
p
rev
e
n
t
u
n
a
u
t
h
o
r
i
zed
u
s
ers
fr
o
m
i
l
l
eg
a
l
acces
s
.
T
h
e
p
a
s
s
w
o
r
d
h
as
h
i
n
g
i
s
o
n
e
o
f
t
h
e
s
afe
t
y
me
t
h
o
d
s
an
d
mean
s
o
f
p
rev
e
n
t
i
n
g
at
t
ack
s
.
In
t
h
i
s
ar
t
i
c
l
e,
fo
c
u
s
e
s
o
n
p
r
o
p
o
s
i
n
g
an
RFID
b
as
e
d
el
ec
t
ro
n
i
c
p
ay
me
n
t
an
d
al
s
o
p
ro
v
i
d
e
mu
l
t
i
-
l
e
v
el
s
ecu
r
i
t
y
p
r
i
v
i
l
e
g
es
f
o
r
an
aca
d
emi
c
d
o
ma
i
n
b
y
u
s
i
n
g
RFID
t
ec
h
n
o
l
o
g
y
b
es
i
d
e
s
t
h
e
p
r
o
g
ramm
ab
l
e
l
o
g
i
c
ci
r
cu
i
t
a
s
w
e
l
l
t
h
e
s
y
s
t
em
u
s
e
d
C#
l
a
n
g
u
ag
e
i
n
v
i
s
u
a
l
s
t
u
d
i
o
en
v
i
r
o
n
me
n
t
al
s
o
d
es
k
t
o
p
a
n
d
w
e
b
-
b
as
ed
a
p
p
l
i
ca
t
i
o
n
f
o
r
s
y
s
t
em
w
o
r
k
i
n
g
p
u
rp
o
s
e
s
.
T
h
e
p
r
o
p
o
s
e
d
s
y
s
t
em
ai
m
s
t
o
man
ag
e
s
t
u
d
en
t
p
ay
me
n
t
s
i
n
a
s
ecu
re
ma
n
n
er
an
d
p
ro
v
i
d
es
t
h
e
cap
a
b
i
l
i
t
i
es
o
f
g
e
t
t
i
n
g
a
b
u
s
t
i
c
k
et
,
co
p
y
i
n
g
b
o
o
k
s
,
b
u
y
i
n
g
f
o
o
d
,
p
a
y
i
n
g
re
g
i
s
t
ra
t
i
o
n
fee
s
,
an
d
o
t
h
er
s
erv
i
ces
.
T
h
e
res
u
l
t
s
h
av
e
s
h
o
w
n
t
h
e
s
y
s
t
em
i
s
s
e
cu
red
b
y
u
s
i
n
g
t
h
e
co
n
f
i
rmat
i
o
n
co
d
e
i
n
ad
d
i
t
i
o
n
t
o
p
a
s
s
w
o
r
d
en
cr
y
p
t
i
o
n
.
K
e
y
w
o
r
d
s
:
Da
ta
s
e
c
ur
it
y
E
nc
r
ypti
on
E
nc
r
ypti
on
pa
s
s
wor
d
Ha
s
h
I
nf
or
mation
s
e
c
ur
it
y
R
F
I
D
S
HA
Th
i
s
i
s
a
n
o
p
en
a
c
ces
s
a
r
t
i
c
l
e
u
n
d
e
r
t
h
e
CC
B
Y
-
SA
l
i
ce
n
s
e
.
C
or
r
e
s
pon
din
g
A
u
th
or
:
Na
be
e
l
S
a
li
h
Ali,
I
nf
or
mation
T
e
c
hnology
R
e
s
e
a
r
c
h
a
nd
De
ve
lopm
e
nt
C
e
nter
(
I
T
R
DC
)
,
Unive
r
s
it
y
of
Ku
f
a
,
Kuf
a
,
P
.
O.
B
ox
(
21)
,
Na
jaf
Gove
r
nor
a
te
,
I
r
a
q.
E
mail:
Na
be
e
l@uokuf
a
.
e
du
.
iq
1.
I
NT
RODU
C
T
I
ON
Unive
r
s
it
ies
a
r
e
s
e
e
king
to
ke
e
p
pa
c
e
with
the
r
a
pid
tec
hnologi
c
a
l
de
ve
lopm
e
nt
a
nd
the
us
e
of
moder
n
tec
hnology
in
dif
f
e
r
e
nt
s
e
ve
r
a
l
va
r
ious
f
ie
lds
s
uc
h
a
s
e
lec
tr
onic
pa
yment
whic
h
a
ll
ows
the
s
t
ude
nt
to
make
a
ll
pa
yments
withi
n
the
Unive
r
s
it
y
e
lec
tr
onica
ll
y
[
1]
.
S
ince
s
uc
h
tec
hnology
c
a
n
he
lp
to
mana
ge
s
tu
de
nt
pa
yments
a
nd
pr
ovides
the
c
a
pa
bil
it
ies
o
f
ge
tt
ing
diver
s
e
s
e
r
vice
s
li
ke
a
bus
ti
c
ke
t,
c
opyin
g
books
,
buying
f
ood,
r
e
gis
tr
a
ti
on
f
e
e
s
,
a
nd
other
r
e
late
d
s
e
r
vice
s
.
T
he
r
e
f
or
e
,
pr
ovides
f
a
c
il
it
ies
f
or
mana
ging
s
tudent
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Se
c
ur
e
d
e
-
pay
me
nt
s
y
s
te
m
bas
e
d
on
automated
aut
he
nti
c
ati
on
data
…
(
A
li
A
l
F
ar
aw
n
)
539
budge
t
without
the
ne
e
d
to
c
a
r
r
y
a
ny
a
ddit
ional
e
xpe
ns
e
s
in
s
ide
the
c
a
mpus
wh
e
r
e
a
ll
the
a
ddit
ional
would
be
e
lec
tr
onica
ll
y,
s
o
ther
e
is
a
ne
e
d
to
us
e
a
utom
a
ti
c
i
de
nti
f
ica
ti
on
f
or
a
s
tudent
by
us
ing
a
utom
a
ti
c
ident
if
ica
ti
on
tec
hnology
[
2,
3
]
.
S
o
we
a
r
e
p
r
opos
ing
a
n
R
F
I
D
tec
hnology
to
a
dopt
s
uc
h
a
s
ys
tem.
R
e
c
e
ntl
y,
r
a
dio
f
r
e
que
nc
y
identif
ica
ti
on
tec
hnology
(
R
F
I
D
)
ha
s
be
e
n
wide
ly
a
dopted
by
s
e
ve
r
a
l
or
ga
niza
ti
ons
,
a
c
a
de
mi
c
ins
ti
tut
ions
,
hos
pit
a
ls
,
mar
ke
ts
,
e
tc.
[
4
,
5
]
.
M
a
ny
or
ga
niza
ti
ons
,
hos
pit
a
l
s
,
a
nd
univer
s
it
ies
ha
ve
a
dopted
the
R
F
I
D
tec
hnology
ove
r
other
identif
ica
ti
on
tec
hnologi
e
s
s
uc
h
a
s
ba
r
c
oding,
biom
e
tr
ic
,
a
nd
other
identif
ica
ti
on
tec
hnologi
e
s
due
to
it
s
low
c
os
t,
s
ma
ll
s
ize
,
e
a
s
y
maintena
nc
e
,
a
nd
the
a
bil
it
y
to
identi
f
y
objec
ts
without
r
e
qui
r
ing
l
ight
o
f
s
ight
[
6
,
7
]
.
I
n
a
ddit
ion
,
R
F
I
D
c
a
n
be
i
mpl
e
mente
d
in
ha
r
s
h
e
nvi
r
onments
s
uc
h
a
s
dir
t
a
nd
da
mage
,
pr
ovidi
ng
the
a
bil
it
y
of
a
uto
-
tr
a
c
king
[
8
]
.
R
F
I
D
c
a
n
identif
y
tags
wi
thout
the
ne
e
d
f
or
di
r
e
c
t
c
ontac
t
whe
r
e
it
c
a
n
identi
f
y
tags
f
or
a
s
pe
c
if
ic
o
bjec
t
withi
n
c
ouple
f
e
e
t,
tag
r
e
us
a
bil
it
y
,
a
nd
the
a
bil
it
y
to
r
e
a
d
mul
ti
ple
tags
s
im
ult
a
ne
ous
ly
[
9,
10
]
.
T
he
s
e
f
unc
ti
ons
make
R
F
I
D
tec
hnology
mor
e
pr
e
f
e
r
a
ble
ove
r
other
tec
hnologi
e
s
li
ke
ba
r
c
oding
in
the
f
ield
o
f
s
mar
t
e
nvir
onments
li
ke
a
s
mar
t
li
br
a
r
y,
s
mar
t
Unive
r
s
it
y
,
s
e
c
ur
it
y
s
ys
tem
–
c
ons
ider
ing
c
os
t,
e
tc.
[
11
,
12
].
R
F
I
D
tec
hnology
invol
ve
s
a
n
R
F
I
D
tag
a
nd
a
n
R
F
I
D
r
e
a
de
r
.
T
he
tag
(
t
r
a
ns
ponde
r
)
c
ons
is
ts
of
a
ti
ny
c
hip
with
a
n
e
mbedde
d
a
ntenna
whic
h
s
tor
e
s
a
unique
I
D
number
.
T
a
gs
c
a
n
be
e
it
he
r
a
c
ti
ve
or
pa
s
s
ive,
de
pe
nding
o
n
whe
ther
it
c
omes
with
a
powe
r
ba
tt
e
r
y
s
our
c
e
(
a
c
ti
ve
)
or
not
(
pa
s
s
ive)
;
the
pa
s
s
ive
tag
is
us
u
a
ll
y
powe
r
e
d
by
the
r
e
a
de
r
.
T
he
R
F
I
D
r
e
a
de
r
is
us
e
d
to
c
omm
uni
c
a
te
a
nd
r
e
tr
ieve
da
ta
s
tor
e
d
in
the
R
F
I
D
tags
.
R
F
I
D
a
nte
nna
c
omes
in
d
if
f
e
r
e
nt
s
ize
s
,
a
nd
dif
f
e
r
e
nt
c
omm
unica
ti
on
r
a
nge
s
de
pe
nding
on
the
dis
tanc
e
be
twe
e
n
the
r
e
a
de
r
a
nd
the
tag
[
13
]
.
M
os
t
c
or
por
a
ti
ons
a
nd
e
d
uc
a
ti
ona
l
ins
ti
tut
ions
e
nde
a
vor
to
pr
ovide
a
s
e
c
ur
e
leve
l
of
their
onli
ne
a
ppli
c
a
ti
ons
.
He
nc
e
,
they
we
r
e
a
ll
owing
mo
r
e
c
onf
idential
da
ta
e
xc
ha
nge
be
twe
e
n
or
ga
niza
ti
ons
[
14
,
15
]
.
S
o
,
the
r
e
a
r
e
mul
ti
f
a
r
ious
s
e
c
ur
it
y
a
nd
pr
ivac
y
is
s
ue
s
that
ne
e
d
to
be
unde
r
s
tood
a
nd
take
n
c
a
r
e
of
[
1
6
,
1
7
].
M
a
na
ge
ment
identif
ica
ti
on
,
dis
a
s
ter
r
e
c
ove
r
y,
ope
r
a
ti
ona
l
int
e
gr
it
y,
a
nd
c
onf
identialit
y
a
r
e
va
r
ious
domains
that
s
uf
f
e
r
e
d
f
r
om
s
e
c
ur
it
y
a
nd
pr
ivac
y
c
ha
ll
e
nge
s
[
1
8
,
1
9
]
.
T
he
r
e
f
o
r
e
,
s
e
r
vice
da
mage
s
or
s
ys
tem
downtim
e
c
ould
c
a
us
e
los
s
e
s
of
m
il
li
ons
o
f
doll
a
r
s
of
a
c
e
r
tain
c
ompany
[
20
].
T
he
mo
r
e
the
number
of
a
c
c
e
s
s
e
s
to
the
s
ys
te
m
by
the
us
e
r
incr
e
a
s
e
s
,
the
mor
e
s
e
c
ur
it
y
thr
e
a
ts
a
ls
o
incr
e
a
s
e
;
he
nc
e
,
the
a
dm
ini
s
tr
a
tor
s
s
hould
us
e
de
c
e
nt
a
ppr
oa
c
he
s
f
o
r
s
e
c
ur
ing
the
s
ys
tem
[
21,
22]
.
Da
ta
a
nd
inf
or
mation
s
e
c
ur
it
y
a
r
e
c
ons
ider
e
d
a
s
a
big
c
ha
ll
e
nge
whe
n
it
c
omes
to
e
-
ba
nking
s
ys
t
e
ms
or
e
-
c
omm
e
r
c
e
in
due
to
the
r
e
quir
e
ment
of
r
e
a
l
da
ta
a
nd
money
tr
a
ns
a
c
ti
on
whic
h
is
c
ons
ider
e
d
a
s
a
c
r
it
ica
l
is
s
ue
a
nd
s
hould
not
be
a
c
c
e
s
s
e
d
without
pr
ope
r
identif
ica
ti
on
[
23
-
25
].
T
h
e
r
e
f
or
in
da
ta
c
omm
unica
ti
on
s
e
r
vice
s
,
it
is
ve
r
y
im
por
tant
f
or
the
da
ta
to
be
or
igi
na
l
a
nd
s
e
c
ur
e
d
[2
6
-
2
8
].
G
e
ne
r
a
ll
y,
the
number
of
pa
s
s
wor
d
pr
e
dictions
to
a
n
a
uthentica
ted
onli
ne
s
ys
tem
s
pe
c
if
ies
the
mea
s
ur
e
ment
of
pa
s
s
wor
d
a
tt
a
c
k
on
that
s
ys
tem
[2
9
-
31
].
I
n
or
de
r
to
s
a
ve
a
nd
s
e
c
ur
e
the
da
te
f
o
r
e
a
c
h
s
ys
tem,
da
ta
int
e
gr
it
y
,
m
e
s
s
a
ge
a
uthentica
ti
on,
a
c
c
e
s
s
c
ontr
ol,
a
uthentica
ti
on
of
da
ta
e
nti
ty
a
nd
the
ke
y
,
a
nd
a
ll
the
in
f
or
mation
s
e
c
ur
it
y
objec
ti
ve
s
s
hould
be
maintaine
d
s
a
f
e
ly
by
the
us
e
r
s
a
nd
the
a
dmi
nis
tr
a
to
r
s
[
32
,
33
].
T
o
a
c
h
ieve
the
o
bjec
ti
ve
s
o
f
inf
o
r
mation
s
e
c
ur
it
y
,
a
uthe
nti
c
a
ti
on
is
the
mos
t
c
omm
on
methods
to
do
s
o.
S
e
ve
r
a
l
s
tudi
e
s
ha
ve
be
e
n
c
onduc
ted
towa
r
ds
e
s
tablis
hing
a
s
mar
t
u
niver
s
it
y
a
s
we
ll
as
R
F
I
D
tec
hnology
ha
s
be
e
n
a
dopted
by
s
e
ve
r
a
l
mar
ke
t
s
a
nd
r
e
tailer
s
to
im
pr
ove
pe
r
f
or
manc
e
while
r
e
duc
ing
the
ti
me
f
or
pur
c
ha
s
ing
[
34
]
.
Author
s
de
ve
loped
a
s
mar
t
s
hopping
a
nd
bil
li
ng
s
ys
tem
to
be
us
e
d
a
t
m
a
r
ke
ts
in
or
de
r
to
a
s
s
is
t
a
c
us
tom
e
r
in
s
hopping
whi
le
pur
c
ha
s
ing
a
pr
oduc
t
[
35
]
.
And,
a
s
tudy
is
pr
ovided
a
n
e
a
s
ier
wa
y
to
f
ind
,
a
r
r
a
nge
books
wi
th
mi
nim
um
ti
m
e
in
a
ddit
ion
to
the
s
im
pli
c
it
y
f
o
r
f
e
tching
boo
ks
[
3
6
]
.
L
ikew
is
e
,
r
e
s
e
a
r
c
he
r
s
ha
ve
pr
opos
e
d
a
pr
otot
ype
s
ys
tem
f
or
a
tt
e
nda
nc
e
in
a
ddit
ion
to
s
mar
t
a
utom
a
ti
on
of
e
lec
tr
ica
l
a
ppli
a
nc
e
s
by
us
ing
R
F
I
D
with
wir
e
les
s
s
e
n
s
or
ne
twor
ks
[3
7
]
.
Als
o,
the
a
r
t
icle
ha
s
dis
c
us
s
e
d
the
be
ne
f
it
s
of
a
dopti
ng
R
F
I
D
tec
hnology
in
mar
k
e
ts
a
nd
r
e
tail
s
e
c
tor
s
[
3
8
]
.
B
e
s
ides
,
r
e
s
e
a
r
c
h
is
pr
ovided
a
mec
ha
nis
m
f
or
s
mar
t
a
tt
e
nda
nc
e
mana
ge
ment
a
lo
ng
with
ti
meta
ble,
s
tudent
inf
o
r
mation
s
ys
tem
pr
o
vidi
ng
a
wide
da
taba
s
e
f
or
Unive
r
s
it
y
s
tudents
a
nd
s
taf
f
m
e
mber
s
[
3
9
].
T
he
c
ur
r
e
nt
pa
pe
r
a
im
s
to
take
a
dva
ntage
of
us
ing
R
F
I
D
in
s
mar
t
Unive
r
s
it
y
a
nd
s
mar
t
mar
ke
ts
a
s
we
ll
,
by
de
s
igni
ng
a
s
mar
t
s
hopping
s
y
s
tem
f
or
s
tudents
withi
n
a
s
mar
t
Unive
r
s
it
y
e
nvir
onment,
w
he
r
e
the
s
tudents
a
r
e
c
a
pa
ble
of
pur
c
ha
s
ing
a
p
r
od
uc
t
f
r
om
a
ny
s
hop
ins
ide
the
Unive
r
s
it
y
c
a
mpus
by
us
ing
th
e
s
a
me
R
F
I
D
c
a
r
d
that
holdi
ng
their
inf
o
r
mation.
B
e
s
ide
s
,
pr
e
s
e
nts
mul
ti
-
leve
l
s
e
c
ur
e
pa
s
s
wor
d
in
the
pr
opos
e
d
e
-
pa
yment
s
ys
tem
via
us
ing
ha
s
hing
c
r
yp
togr
a
phy
a
lgor
it
hm
to
pr
e
ve
nt
il
lega
l
a
c
c
e
s
s
via
c
r
a
f
ter
.
2.
M
AT
E
R
I
AL
S
AN
D
M
E
T
HO
DS
(
M
E
T
HO
DOL
OG
Y)
T
his
s
e
c
ti
on
pr
e
s
e
nt
s
c
omponents
of
the
pr
opos
e
d
e
lec
tr
onic
c
ir
c
uit
de
s
ign
that
include
s
s
of
twa
r
e
a
nd
ha
r
dwa
r
e
r
e
quir
e
ments
a
s
we
ll
a
s
methods
a
n
d
im
pleme
ntation
s
teps
of
the
s
ys
tem.
T
he
s
ys
tem
a
im
s
to
make
a
ll
pa
yment
ins
ide
the
Unive
r
s
it
y
e
lec
tr
onic
a
ll
y
with
r
e
s
pe
c
t
to
s
e
c
u
r
it
y
is
s
ue
via
pr
opos
ing
m
ult
i
-
leve
l
s
e
c
ur
it
y
pa
r
a
digm
s
.
T
he
ha
r
dwa
r
e
c
omponents
r
e
quir
e
d
f
or
the
im
pleme
ntation
a
r
e
Ar
duino
UN
O
boa
r
d,
E
ther
ne
t
s
hield,
a
nd
s
e
ns
or
s
(
R
F
I
D
R
e
a
de
r
)
.
F
igu
r
e
1
p
r
ovides
a
n
ove
r
view
of
the
p
r
opos
ing
s
ys
tem.
Ac
c
or
ding
to
F
igu
r
e
1
,
T
he
R
F
I
D
r
e
a
de
r
is
c
onn
e
c
ted
to
the
A
r
duino
Uno
mi
c
r
oc
ontr
ol
ler
de
vice
whic
h
is
c
onne
c
ted
to
e
the
r
ne
t
s
hield
de
vice
.
T
h
e
s
ignal
is
s
e
nt
to
a
c
li
e
nt
-
ba
s
e
d
s
ys
tem
by
the
Ar
duino
thr
ough
E
the
r
ne
t
c
a
ble,
the
da
taba
s
e
(
s
e
r
ve
r
s
ide)
then
im
pleme
nts
the
pa
yment
pr
oc
e
s
s
b
y
us
ing
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
538
-
544
540
the
c
li
e
nt
-
ba
s
e
d
a
ppli
c
a
ti
on
to
c
he
c
k
the
ba
lanc
e
o
f
the
s
tudent.
T
he
pr
opos
e
d
s
ys
tem
pr
ovides
e
a
s
y
a
c
c
e
s
s
to
s
tudent
inf
or
mation
by
dis
playing
thei
r
inf
o
r
matio
n
s
uc
h
a
s
tot
a
l
ba
lanc
e
,
c
ur
r
e
nt
ba
lanc
e
,
a
nd
the
n
ote
a
bout
a
ll
their
pa
ymen
t
a
nd
other
inf
o
r
mation.
T
he
R
F
I
D
r
e
a
de
r
r
e
a
ds
the
I
D
f
or
the
s
tudent
tag
a
nd
s
e
nds
it
via
the
A
r
duino
de
vice
us
ing
the
E
ther
ne
t
s
hield
a
tt
a
c
he
d
to
the
Ar
duino
to
th
e
s
e
r
ve
r
by
de
s
ktop
a
ppli
c
a
ti
on
ba
s
e
d
(
M
S
S
QL
S
E
R
VE
R
AN
D
C
#)
f
o
r
Da
taba
s
e
I
D
c
he
c
king
p
r
oc
e
dur
e
.
T
he
da
taba
s
e
is
c
r
e
a
ted
by
M
S
S
QL
pr
og
r
a
m
a
nd
c
ontains
the
r
e
c
or
ds
of
the
s
tudent
I
Ds
,
onc
e
the
I
D
is
f
oun
d,
the
money
withdr
a
wa
l
is
to
be
done
.
T
he
R
F
I
D
r
e
a
de
r
is
c
onne
c
ted
to
the
Ar
duino
pins
a
s
f
o
ll
ow
in
T
a
ble
1
.
T
he
Ar
duino
de
vice
p
r
oc
e
s
s
e
s
the
s
ignal
then
s
e
nds
it
via
E
ther
ne
t
c
a
ble
to
the
s
e
r
ve
r
F
igur
e
1.
B
lock
d
iagr
a
m
f
or
the
p
r
opos
e
d
s
ys
tem
a
r
c
hit
e
c
tur
e
T
a
ble
1.
R
F
I
D
m
odule
a
nd
Ar
duino
UN
O
p
in
c
onne
c
tor
s
R
F
I
D
modul
e
A
r
dui
no U
N
O
pi
ns
R
E
S
E
T
D9
M
I
S
O
D
12
M
O
S
I
D
11
S
C
K
D
13
S
A
D
D
10
2.
1.
P
h
as
e
on
e
(
e
-
p
ay
m
e
n
t
m
an
age
m
e
n
t
s
ys
t
e
m
)
F
igur
e
2
s
hows
the
c
ompl
e
te
wor
kf
low
of
the
e
-
pa
yment
s
ys
tem
,
including
the
a
dmi
nis
tr
a
to
r
,
s
tudents
,
a
nd
s
a
les
point
mana
ge
r
s
.
2.
2.
P
h
as
e
t
wo
(
m
u
lt
i
-
leve
l
s
ys
t
e
m
s
e
c
u
r
it
y)
I
n
thi
s
s
tudy,
two
s
e
c
ur
it
y
leve
l
a
ppli
e
d
to
e
nf
or
c
e
s
ys
tem
c
onf
identialit
y
,
whic
h
is
a
s
e
c
r
e
t
c
ode
a
nd
pa
s
s
wor
d
e
nc
r
ypti
on.
F
o
r
the
f
ir
s
t,
leve
l
the
s
ys
tem
a
s
ks
the
us
e
r
to
e
nter
his
s
e
c
r
e
t
c
ode
be
f
or
e
s
tar
ti
ng
the
pr
oc
e
s
s
of
f
e
e
s
withdr
a
wa
l
to
c
onf
ir
m
the
iden
ti
f
ica
ti
on
of
the
us
e
r
a
nd
to
pr
otec
t
the
pr
ivac
y
of
the
us
e
r
whe
n
tag
los
t
or
thef
t
by
r
e
que
s
ti
ng
the
s
e
c
r
e
t
c
ode
a
s
s
igned
to
him
a
nd
ve
r
if
y
the
s
e
c
r
e
t
c
od
e
s
tor
e
d
(
S
HA
-
256)
in
the
da
taba
s
e
a
s
we
mentioned
in
t
he
s
e
c
ond
pa
r
a
digm
s
e
c
ur
it
y
if
it
is
tr
ue
a
nd
then
doing
the
us
e
r
f
e
e
pr
oc
e
s
s
a
s
s
hown
in
F
igu
r
e
3.
F
igur
e
2.
Us
e
c
a
s
e
diagr
a
m
of
the
pr
opos
e
d
s
ys
tem
F
igur
e
3.
S
e
c
r
e
t
c
ode
of
the
s
ys
tem
a
uthentica
t
ion
M
S
S
Q
L
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Se
c
ur
e
d
e
-
pay
me
nt
s
y
s
te
m
bas
e
d
on
automated
aut
he
nti
c
ati
on
data
…
(
A
li
A
l
F
ar
aw
n
)
541
T
he
ba
s
ic
int
e
r
f
a
c
e
de
s
ign
of
the
pa
yment
pr
oc
e
s
s
a
t
the
s
a
les
point
s
is
f
a
ll
ing
int
o
two
s
teps
,
the
f
ir
s
t
s
tep
is
to
c
a
r
r
y
out
the
pa
yment
p
r
oc
e
s
s
by
taking
the
I
D
f
r
o
m
s
tudent
that
s
tor
e
d
in
R
F
I
D
c
a
r
d,
a
nd
the
s
e
c
ond
s
tep
is
to
de
ter
mi
ne
the
pur
c
ha
s
e
ty
pe
a
nd
the
p
r
ice
a
nd
then
to
p
r
e
s
s
on
the
butt
on
(
F
e
e
s
)
,
in
thi
s
s
tep
the
s
tudent
s
hould
e
nter
his
/her
c
ode
to
c
he
c
k
whe
ther
the
c
ode
is
c
or
r
e
c
t
be
f
or
e
the
c
ompl
e
ti
on
of
tr
a
ns
a
c
ti
on.
F
or
the
s
e
c
ond
pa
r
a
digm
,
it
e
r
a
ti
ve
pa
s
s
wor
d
s
a
lt
e
d
ha
s
h
e
nc
r
ypti
on
is
us
e
d
f
or
pa
s
s
wor
d
e
nc
r
ypti
on.
E
nc
r
ypti
on
is
the
pr
oc
e
s
s
of
c
onve
r
ti
n
g
inf
o
r
mation
that
is
s
im
ple
text
whe
n
s
tor
ing
on
dif
f
e
r
e
nt
s
tor
a
ge
media
to
number
s
a
nd
letter
s
that
a
r
e
r
a
ndoml
y
or
de
r
e
d
s
o
that
they
be
c
ome
incompr
e
he
ns
ibl
e
or
unr
e
a
da
ble
to
a
nyone
.
E
nc
r
yp
ti
on
is
us
e
f
ul
be
c
a
us
e
:
1
)
c
onf
identialit
y:
a
s
e
r
vice
us
e
d
to
s
tor
e
the
c
o
ntent
of
inf
or
mation
f
r
o
m
a
ll
pe
r
s
ons
,
2
)
i
ntegr
i
ty:
a
s
e
r
vi
c
e
us
e
d
to
s
a
ve
inf
or
mation
f
r
om
c
ha
nge
(
de
lete
,
a
dd,
or
modi
f
y)
by
una
utho
r
ize
d
pe
r
s
ons
[
34
]
.
I
n
thi
s
pe
r
s
pe
c
ti
ve
,
we
c
on
duc
ted
a
n
a
nti
-
c
onti
nuous
c
oll
is
ion
s
a
lt
e
d
ha
s
h
e
nc
r
ypti
on
(
AC
C
S
HE
)
tec
hnique
whic
h
e
xt
r
a
c
ts
a
unique
f
e
a
tur
e
s
f
r
om
e
a
c
h
us
e
r
to
r
e
pe
a
t
s
e
c
ur
e
d
s
a
lt
e
d
ha
s
hing
a
lgor
it
hm
(
S
HA
-
256)
s
e
ve
r
a
l
ti
mes
to
c
onve
r
t
the
s
im
ple
text
of
the
pa
s
s
wor
d
to
c
o
mpl
e
x
64
r
a
ndom
number
s
a
nd
let
ter
s
e
nc
r
ypted
pa
s
s
wor
d
s
a
ve
d
in
the
da
taba
s
e
a
c
c
or
ding
to
[
40]
.
T
he
ha
s
hing
with
s
a
lt
is
us
e
d
to
s
uppor
t
ha
s
hing
r
e
s
ult
s
.
W
he
ther
,
whe
n
two
ha
s
he
d
pa
s
s
wor
ds
us
e
d
the
s
a
me
plain
text
,
the
r
e
s
ult
is
not
the
s
a
me
[
4
1]
.
W
hil
e
the
e
-
pa
yment
s
ys
tem
a
ppli
c
a
ti
on
ne
e
ds
c
r
it
ica
l
s
e
c
ur
it
y
r
e
quir
e
ments
the
r
e
f
or
the
s
a
lt
c
ode
c
r
y
ptogr
a
phica
ll
y
s
e
c
ur
e
ps
e
udo
-
r
a
ndom
number
g
e
ne
r
a
tor
(
C
S
P
R
NG
)
is
us
ing
to
gua
r
d
s
ys
tem
s
e
c
ur
it
y
a
ga
ins
t
a
tt
a
c
ks
[
42
]
.
F
igur
e
4
pr
e
s
e
nts
the
pa
s
s
wor
d
e
nc
r
ypti
on
pr
oc
e
s
s
ing
in
de
t
a
il
s
.
F
igur
e
4.
P
a
s
s
wor
d
e
nc
r
ypti
on
p
r
oc
e
s
s
ing
3.
RE
S
UL
T
S
AN
D
DI
S
CU
S
S
I
ON
T
he
pr
e
s
e
nted
s
ys
tem
is
a
c
hieving
e
le
c
tr
onic
pa
yment
a
nd
tr
a
ns
a
c
ti
on
to
pr
ovide
f
a
c
il
it
ies
f
or
mana
ging
s
tudent
budge
t
in
e
-
Unive
r
s
it
y
.
T
his
s
ys
tem
ha
s
a
leve
l
of
s
e
c
ur
it
y
by
c
onf
ir
mi
ng
the
s
e
c
r
e
t
c
ode
by
a
s
tudent
to
c
onf
i
r
mation
pur
pos
e
s
.
T
he
t
r
a
ns
a
c
ti
on
is
done
only
i
f
the
c
ode
is
c
o
r
r
e
c
t
a
nd
the
s
ys
tem
will
a
ls
o
be
mo
r
e
s
e
c
ur
e
by
a
dopti
ng
pa
s
s
wor
d
e
nc
r
ypti
on
s
c
he
me
to
pr
e
ve
nt
ha
c
king
o
f
the
us
e
r
a
c
c
ount.
T
he
e
nc
r
ypti
on
e
xa
mpl
e
is
us
e
d
in
the
s
y
s
tem
is
s
hown
in
F
igur
e
5.
W
he
n
typi
ng
a
pa
s
s
wor
d
in
a
logi
n
int
e
r
f
a
c
e
s
uc
h
a
s
(
@1980N
J
F
)
,
it
will
e
nc
ode
dir
e
c
tl
y
int
o
the
da
taba
s
e
with
r
a
ndom
im
a
ge
s
a
nd
non
-
int
r
us
ive
c
ha
r
a
c
ter
s
,
a
nd
thi
s
f
e
a
tur
e
pr
ovides
a
high
leve
l
of
s
e
c
ur
it
y
f
or
the
s
tudents
a
s
it
is
di
f
f
icult
to
ha
c
k
by
int
r
ude
r
s
a
nd
a
ls
o
in
the
c
a
s
e
of
r
obbe
r
y
.
T
he
a
dva
ntage
f
or
r
e
pe
a
ted
s
e
c
ur
e
d
s
a
lt
e
d
ha
s
hing
a
lgor
it
h
m
is
to
c
r
e
a
te
a
mo
r
e
c
ompl
e
x
a
nd
mo
r
e
dif
f
icult
pa
s
s
wor
d
to
br
e
a
k
[
43
]
.
As
s
hown
in
F
igur
e
6
,
whic
h
e
xplain
the
t
im
e
r
e
qui
r
e
d
to
c
a
lcula
te
the
e
nc
r
ypted
pa
s
s
wor
d
inc
r
e
a
s
e
d
whe
n
the
va
lue
of
mi
nim
um
a
lt
e
r
a
t
ion
inc
r
e
a
s
ing
,
whic
h
mea
ns
the
ti
me
c
ompl
e
xit
y
incr
e
a
s
e
f
or
e
b
r
e
a
k
pa
s
s
wor
d.
T
he
a
v
e
r
a
ge
ti
me
of
20
us
e
r
s
,
the
va
lu
e
o
f
mi
ni
mum
a
l
ter
a
ti
on
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
538
-
544
542
c
ha
nge
d
f
r
om
10,
100,
10000
,
a
nd
100000.
F
inall
y,
the
(
AC
C
S
HE
)
method
ha
s
s
e
ve
r
a
l
c
ontr
ol
ke
y
f
e
a
tur
e
s
to
c
ha
ng
the
r
e
s
ult
s
,
s
uc
h
a
s
the
number
of
r
e
pe
ti
t
ion
a
nd
s
a
lt
us
e
d
withou
t
a
f
f
e
c
ti
ng
the
us
a
bil
it
y
s
ys
tem
a
s
we
s
how
in
F
igur
e
6.
F
igur
e
5.
E
xa
mpl
e
of
the
e
nc
r
ypti
on
in
e
nc
r
ypti
on
mec
ha
nis
m
in
the
pr
opos
e
d
s
ys
tem
.
F
igur
e
6.
T
he
a
ve
r
a
ge
ti
me
f
or
20
us
e
r
s
ba
s
e
d
on
t
he
pa
s
s
wor
d
e
nc
r
ypti
on
s
c
he
me
4.
CONC
L
USI
ONS
AN
D
F
UT
UR
E
DI
RE
C
T
I
ON
S
An
e
lec
tr
onic
pa
yment
s
ys
tem
is
im
pleme
nted
b
y
de
s
igni
ng
a
nd
c
r
e
a
ti
ng
a
da
taba
s
e
s
ys
tem
f
or
holdi
ng
s
tudents
inf
or
mation
(
na
me
,
id
,
budge
t
,
e
tc.
)
,
the
s
ys
tem
pr
ovides
a
mec
ha
nis
m
that
a
ll
ows
s
tudents
to
inqui
r
e
a
bout
their
ba
lanc
e
a
nd
give
a
noti
f
ica
t
ion
f
or
r
e
c
ha
r
ging.
B
e
s
ides
,
de
s
ign
a
nd
tes
t
the
c
ompl
e
te
ha
r
dwa
r
e
s
ys
tem
that
wor
ks
with
the
da
taba
s
e
to
maintain
the
de
pos
it
a
nd
pa
yment
e
lec
tr
onica
l
ly.
T
his
s
ys
tem
ha
s
a
leve
l
of
s
e
c
ur
it
y
a
s
a
c
onf
ir
mation
c
o
de
a
nd
(
S
HA
-
256)
pa
s
s
wor
d
e
nc
r
ypti
on
method
to
e
nf
or
c
e
the
s
ys
tem
a
uthentica
ti
on
a
nd
c
onf
ir
mation
pa
r
a
d
igm
s
f
r
om
il
lega
l
a
c
c
e
s
s
a
s
we
ll
to
pr
ovide
e
-
U
niver
s
it
y
a
pps
.
T
he
f
utur
e
di
r
e
c
ti
on
of
the
s
ys
tem
is
to
a
d
d
a
we
b
int
e
r
f
a
c
e
that
s
hows
e
xtr
a
de
tails
f
or
th
e
s
tudent
a
c
c
ount,
in
a
ddit
ion,
to
im
pleme
nt
a
mobi
l
e
a
ppli
c
a
ti
on
that
is
c
a
pa
ble
f
or
pur
c
ha
s
ing,
c
ha
r
ging,
a
nd
withdr
a
wing.
RE
F
E
RE
NC
E
S
[1
]
Park
S.
Y
.
,
“
A
n
an
al
y
s
i
s
o
f
t
h
e
t
ech
n
o
l
o
g
y
acce
p
t
a
n
c
e
mo
d
el
i
n
u
n
d
er
s
t
a
n
d
i
n
g
U
n
i
v
ers
i
t
y
s
t
u
d
en
t
s
'
b
e
h
av
i
o
ral
i
n
t
en
t
i
o
n
t
o
u
s
e
e
-
l
earn
i
n
g
,
”
Jo
u
r
n
a
l
o
f
E
d
u
c
a
t
i
o
n
a
l
Tec
h
n
o
l
o
g
y
&
S
o
ci
e
t
y
,
v
o
l
.
12
,
n
o
.
3
,
p
p
.
1
5
0
-
1
6
2
,
2
0
0
9
.
[2
]
A
l
h
i
l
al
i
A
.
H
.
,
A
l
i
N
.
S.
,
K
ad
h
i
m
M.
F.
,
A
l
-
Sad
aw
i
B.
,
A
l
s
h
ar
q
i
H
.
,
“
Mu
l
t
i
-
o
b
j
ec
t
i
v
e
at
t
e
n
d
a
n
ce
an
d
man
ag
e
men
t
i
n
f
o
rmat
i
o
n
s
y
s
t
em
u
s
i
n
g
co
m
p
u
t
er
ap
p
l
i
ca
t
i
o
n
i
n
i
n
d
u
s
t
ry
s
t
r
i
p
,”
In
d
o
n
e
s
i
a
n
Jo
u
r
n
a
l
o
f
E
l
ect
r
i
c
a
l
E
n
g
i
n
ee
r
i
n
g
a
n
d
Co
m
p
u
t
er
S
c
i
en
ce
,
v
o
l
.
16
,
n
o
.
1
,
p
p
.
3
7
1
-
3
8
1
,
2
0
1
9
.
[3
]
Ih
amj
i
M.
,
A
b
d
el
m
o
u
n
i
m
E
.
,
Z
b
i
t
o
u
J
.
,
Ben
n
i
s
H
.
,
L
at
rach
M.
,
“
A
co
mp
act
mi
n
i
at
u
re
fract
al
p
l
a
n
ar
an
t
e
n
n
a
fo
r
RFID
read
er
s
,”
In
d
o
n
es
i
a
n
Jo
u
r
n
a
l
o
f
E
l
ect
r
i
ca
l
E
n
g
i
n
eer
i
n
g
a
n
d
Co
m
p
u
t
e
r
S
c
i
en
ce
,
v
o
l
.
15
,
n
o
.
1
,
p
p
.
3
0
0
-
3
0
5
,
2
0
1
9
.
[
4
]
Y
u
r
u
Z
.
,
D
el
o
n
g
C.
,
L
i
p
i
n
g
T
.
,
“
T
h
e
Res
earc
h
an
d
A
p
p
l
i
cat
i
o
n
o
f
Co
l
l
eg
e
S
t
u
d
en
t
A
t
t
en
d
an
ce
S
y
s
t
em
b
as
e
d
o
n
RFID
T
ech
n
o
l
o
g
y
,”
In
t
er
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
Co
n
t
r
o
l
a
n
d
A
u
t
o
m
a
t
i
o
n
,
v
o
l
.
6
,
n
o
.
2
,
p
p
.
2
7
3
-
2
8
2
,
2
0
1
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Se
c
ur
e
d
e
-
pay
me
nt
s
y
s
te
m
bas
e
d
on
automated
aut
he
nti
c
ati
on
data
…
(
A
li
A
l
F
ar
aw
n
)
543
[5
]
A
ri
f
Z
.
H
.
,
A
l
i
N
.
S.
,
Z
ak
ari
a
N
.
A
.
,
A
l
-
Mh
i
q
an
i
M.
N
.
,
“
A
t
t
en
d
an
ce
Man
ag
eme
n
t
Sy
s
t
em
fo
r
E
d
u
cat
i
o
n
al
Sect
o
r
:
Cri
t
i
cal
Rev
i
ew
,”
In
t
er
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
Co
m
p
u
t
e
r
S
ci
en
ce
a
n
d
M
o
b
i
l
e
Co
m
p
u
t
i
n
g
,
v
o
l
.
7
,
n
o
.
8
,
p
p
.
6
0
-
66
,
2
0
1
8
.
[
6
]
A
b
b
as
i
A
.
Z
.
,
Sh
ai
k
h
Z
.
A
.
,
“
Bu
i
l
d
i
n
g
a
s
mar
t
U
n
i
v
ers
i
t
y
u
s
i
n
g
RFID
t
ech
n
o
l
o
g
y
,”
I
E
E
E
-
2
0
0
8
I
n
t
e
r
n
a
t
i
o
n
a
l
Co
n
f
er
e
n
ce
o
n
C
o
m
p
u
t
er
S
c
i
en
ce
a
n
d
S
o
f
t
w
a
r
e
E
n
g
i
n
ee
r
i
n
g
, v
o
l
.
5
,
p
p
.
6
4
1
-
6
4
4
,
D
ecem
b
er
2
0
0
8
.
[7
]
E
l
Bo
u
t
ah
i
ri
A
.
,
E
l
A
l
a
o
u
i
M.
,
E
l
K
h
a
d
i
r
i
K
.
,
T
a
h
i
r
i
A
.
,
Q
j
i
d
aa
H
.
,
“
D
e
s
i
g
n
o
f
N
e
w
Po
w
er
G
en
era
t
i
n
g
C
i
rcu
i
t
fo
r
Pas
s
i
v
e
U
H
F
RFID
T
ag
,”
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
P
o
wer
E
l
ect
r
o
n
i
c
s
a
n
d
D
r
i
ve
S
y
s
t
e
m
s
,
v
o
l
.
9
,
n
o
.
3
,
p
p
.
1
3
8
9
-
1
3
9
7
,
2
0
1
8
[8
]
T
arb
o
u
c
h
M.
,
E
l
A
mri
A
.
,
T
erch
o
u
n
e
H
.
,
“
D
es
i
g
n
,
Real
i
zat
i
o
n
a
n
d
Mea
s
u
reme
n
t
s
o
f
C
o
mp
ac
t
D
u
al
-
b
a
n
d
CP
W
-
fed
Pat
ch
A
n
t
e
n
n
a
f
o
r
2
.
4
5
/
5
.
8
0
G
H
z
RFID
A
p
p
l
i
ca
t
i
o
n
s
,”
I
n
t
e
r
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
E
l
ec
t
r
i
ca
l
&
Co
m
p
u
t
e
r
E
n
g
i
n
eer
i
n
g
,
v
o
l
.
8
,
n
o
.
1
,
p
p
.
2
0
8
8
-
8
7
0
8
,
2
0
1
8
.
[
9
]
Su
n
eh
ra
D
.
,
G
o
u
d
V
.
S.
,
“
A
t
t
en
d
an
ce
rec
o
rd
i
n
g
an
d
co
n
s
o
l
i
d
a
t
i
o
n
s
y
s
t
em
u
s
i
n
g
A
rd
u
i
n
o
a
n
d
Ra
s
p
b
erry
P
i
,”
2
0
1
6
In
t
e
r
n
a
t
i
o
n
a
l
Co
n
f
er
e
n
ce
o
n
S
i
g
n
a
l
P
r
o
ces
s
i
n
g
,
Co
m
m
u
n
i
ca
t
i
o
n
,
P
o
wer
a
n
d
E
m
b
ed
d
ed
S
ys
t
em
(S
C
O
P
E
S
),
p
p
.
1
2
4
0
-
1
2
4
5
,
O
ct
o
b
er
2
0
1
6
.
[1
0
]
E
l
H
ac
h
i
m
i
Y
.
,
G
mi
h
Y
.
,
Mak
ro
u
m
E
.
M.
,
Farch
i
A
.
,
“
A
Mi
n
i
at
u
ri
ze
d
Pat
c
h
A
n
t
e
n
n
a
D
es
i
g
n
ed
a
n
d
Ma
n
u
fac
t
u
red
U
s
i
n
g
S
l
o
t
's
T
ech
n
i
q
u
e
f
o
r
RFID
U
H
F
M
o
b
i
l
e
A
p
p
l
i
c
at
i
o
n
s
,”
In
t
e
r
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
E
l
ect
r
i
c
a
l
a
n
d
Co
m
p
u
t
e
r
E
n
g
i
n
eer
i
n
g
,
v
o
l
.
8
,
n
o
.
6
,
p
p
.
5
1
3
4
-
5
1
4
3
,
2
0
1
8
.
[
11
]
Cu
rt
i
n
J
.
,
K
au
ffma
n
R.
J
.
,
R
i
g
g
i
n
s
F.
J
.
“
Mak
i
n
g
t
h
e
‘MO
ST
’
o
u
t
o
f
RFID
t
ech
n
o
l
o
g
y
:
a
re
s
earch
a
g
en
d
a
fo
r
t
h
e
s
t
u
d
y
o
f
t
h
e
ad
o
p
t
i
o
n
,
u
s
ag
e
an
d
i
m
p
act
o
f
RFID
,
”
In
f
o
r
m
a
t
i
o
n
Tech
n
o
l
o
g
y
a
n
d
M
a
n
a
g
e
m
en
t
,
v
o
l
.
8
,
n
o
.
2
,
2
0
0
7
.
[
12
]
W
h
i
t
e
G
.
,
G
ard
i
n
er
G
.
,
Prab
h
ak
ar
G
.
P.
,
A
b
d
Razak
A
.
,
“
A
co
mp
ari
s
o
n
o
f
b
arc
o
d
i
n
g
an
d
RFID
t
ec
h
n
o
l
o
g
i
es
i
n
p
ract
i
ce
,”
Jo
u
r
n
a
l
o
f
i
n
f
o
r
m
a
t
i
o
n
,
i
n
f
o
r
m
a
t
i
o
n
t
ec
h
n
o
l
o
g
y
a
n
d
o
r
g
a
n
i
z
a
t
i
o
n
s
,
v
o
l
.
2
,
p
p
.
1
1
9
-
1
3
2
,
2
0
0
7
.
[
13
]
Ban
s
o
d
e
S.
Y
.
,
D
es
al
e
S.
K
.
,
“
Imp
l
eme
n
t
a
t
i
o
n
o
f
RFID
t
ech
n
o
l
o
g
y
i
n
U
n
i
v
ers
i
t
y
o
f
Pu
n
e
L
i
b
rary
,”
P
r
o
g
r
a
m
:
E
l
ec
t
r
o
n
i
c
Li
b
r
a
r
y
a
n
d
In
f
o
r
m
a
t
i
o
n
S
y
s
t
e
m
s
,
v
o
l
.
43
,
n
o
.
2
,
p
p
.
2
0
2
-
2
1
4
,
2
0
0
9
.
[
14
]
Bu
eh
rer
G
.
T
.
,
W
e
i
d
e
B.
W
.
Si
v
i
l
o
t
t
i
P.
A.
G.
,
“
U
s
i
n
g
p
ar
s
e
t
ree
v
a
l
i
d
at
i
o
n
t
o
p
re
v
en
t
SQ
L
i
n
j
ect
i
o
n
at
t
ac
k
s
,
”
P
r
o
ceed
i
n
g
S
E
M
’0
5
P
r
o
cee
d
i
n
g
s
o
f
t
h
e
5
t
h
i
n
t
e
r
n
a
t
i
o
n
a
l
wo
r
ks
h
o
p
o
n
S
o
f
t
w
a
r
e
e
n
g
i
n
ee
r
i
n
g
a
n
d
m
i
d
d
l
ew
a
r
e
,
pp.
1
0
6
–
1
1
3
,
2
0
0
5
.
[
15
]
A
l
i
N
.
S.
“
In
v
es
t
i
g
at
i
o
n
framew
o
rk
o
f
w
eb
ap
p
l
i
cat
i
o
n
s
v
u
l
n
era
b
i
l
i
t
i
e
s
,
at
t
ac
k
s
a
n
d
p
r
o
t
ec
t
i
o
n
t
ech
n
i
q
u
e
s
i
n
s
t
ru
ct
u
red
q
u
er
y
l
a
n
g
u
ag
e
i
n
j
ec
t
i
o
n
a
t
t
ac
k
s
,
”
I
n
t
.
J.
W
i
r
el
es
s
a
n
d
M
o
b
i
l
e
Co
m
p
u
t
i
n
g
,
v
o
l
.
1
4
,
n
o
.
2
,
p
p
.
1
0
3
–
1
2
2
,
2
0
1
8
.
[1
6
]
Al
-
M
h
i
q
an
i
M.
N
.
,
A
h
mad
R.
,
A
b
d
u
l
k
areem
K
.
H
.
A
l
i
N
.
S.
,
“
In
v
es
t
i
g
a
t
i
o
n
s
t
u
d
y
o
f
cy
b
er
-
p
h
y
s
i
cal
s
y
s
t
e
ms
:
ch
aract
er
i
s
t
i
c
s
,
ap
p
l
i
ca
t
i
o
n
d
o
ma
i
n
s
,
an
d
s
ecu
r
i
t
y
ch
al
l
e
n
g
e
s
,
”
A
R
P
N
Jo
u
r
n
a
l
o
f
E
n
g
i
n
eer
i
n
g
a
n
d
A
p
p
l
i
e
d
S
c
i
en
ces
,
v
o
l
.
1
2
,
n
o
.
2
2
,
p
p
.
6
5
5
7
–
6
5
6
7
,
2
0
1
7
.
[1
7
]
A
l
i
N
.
S.
,
Sh
i
b
g
h
at
u
l
l
ah
A
.
S.
,
A
t
t
ar
M.
H.
A.
L.
,
“
Rev
i
e
w
o
f
t
h
e
d
efen
s
i
v
e
ap
p
ro
ac
h
es
f
o
r
s
t
ru
c
t
u
re
d
q
u
ery
l
an
g
u
a
g
e
i
n
j
ect
i
o
n
,
”
Jo
u
r
n
a
l
o
f
Th
e
o
r
e
t
i
c
a
l
a
n
d
A
p
p
l
i
ed
In
f
o
r
m
a
t
i
o
n
Tech
n
o
l
o
g
y
,
v
o
l
.
7
6
,
n
o
.
2
,
p
p
.
2
5
8
–
2
6
9
,
2
0
1
5
.
[1
8
]
Bh
ad
a
u
ri
a
R.
,
Ch
a
k
i
R.
,
Ch
ak
i
N
.
Sa
n
y
a
l
S.
,
“
A
S
u
rv
e
y
o
n
Secu
r
i
t
y
I
s
s
u
es
i
n
C
l
o
u
d
Co
m
p
u
t
i
n
g
,
ar
X
i
v
p
re
p
r
i
n
t
,”
[O
n
l
i
n
e],
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
ar
x
i
v
.
o
rg
/
ab
s
/
1
1
0
9
.
5
3
8
8
,
ar
X
i
v
:
1
1
0
9
.
5
3
8
8
,
2
0
1
1
.
[1
9
]
Sh
i
h
K
.
H.
,
L
ee
M
.
F.
. “
U
s
ers
’
i
n
t
en
t
i
o
n
s
o
n
t
h
e
mo
b
i
l
e
s
ecu
ri
t
i
e
s
t
rad
i
n
g
s
y
s
t
em,
”
In
t
.
J.
M
o
b
i
l
e
Co
m
m
u
n
i
ca
t
i
o
n
s
,
v
o
l
.
1
5
,
n
o
.
3
,
p
p
.
2
5
2
–
2
6
5
,
2
0
1
7
.
[
20
]
H
al
f
o
n
d
W
.
G.
J
.
,
Ch
o
u
d
h
ar
y
S.
R.
O
rs
o
A
.
,
“
Im
p
ro
v
i
n
g
p
e
n
et
ra
t
i
o
n
t
es
t
i
n
g
t
h
r
o
u
g
h
s
t
at
i
c
an
d
d
y
n
am
i
c
a
n
al
y
s
i
s
,
”
S
o
f
t
wa
r
e
Tes
t
i
n
g
,
V
e
r
i
f
i
c
a
t
i
o
n
a
n
d
R
e
l
i
a
b
i
l
i
t
y
,
v
o
l
.
2
1
,
n
o
.
3
,
p
p
.
1
9
5
–
2
1
4
,
2
0
1
1
.
[
21
]
Mo
rri
s
R.
,
T
h
o
mp
s
o
n
K
.
,
“
Pas
s
w
o
rd
s
ecu
r
i
t
y
:
A
cas
e
h
i
s
t
o
ry
,”
Co
m
m
u
n
i
c
a
t
i
o
n
s
o
f
t
h
e
A
CM
,
v
o
l
.
22
,
n
o
.
1
1
,
p
p
.
5
9
4
-
5
9
7
,
1
9
7
9
.
[
22
]
Sh
ay
R.
,
K
o
ma
n
d
u
ri
S.
,
K
e
l
l
e
y
P.
G
.
,
L
eo
n
P.
G
.
,
Ma
zu
rek
M.
L
.
,
Bau
er
L
.
,
Cran
o
r
L
.
F.
,
et
.
al
,
“
E
n
co
u
n
t
er
i
n
g
s
t
ro
n
g
er
p
as
s
w
o
r
d
req
u
i
reme
n
t
s
:
u
s
er
at
t
i
t
u
d
es
an
d
b
eh
a
v
i
o
rs
,”
S
ym
p
o
s
i
u
m
o
n
U
s
a
b
l
e
P
r
i
va
cy
a
n
d
S
ec
u
r
i
t
y
(S
O
U
P
S
)
,
Red
mo
n
d
,
W
A
U
SA
,
14
–
1
6
J
u
l
y
2
0
1
0
.
[
23
]
Si
l
h
a
v
y
R.
,
Sen
k
er
i
k
R.
,
O
p
l
a
t
k
o
v
a
Z
.
K
.
,
Pro
k
o
p
o
v
a
Z
.
Si
l
h
av
y
P.
,
“
So
ft
w
are
en
g
i
n
e
eri
n
g
i
n
i
n
t
el
l
i
g
en
t
s
y
s
t
e
ms
,
”
P
r
o
ceed
i
n
g
s
o
f
t
h
e
4
t
h
Co
m
p
u
t
e
r
S
c
i
en
ce
On
-
l
i
n
e
Co
n
f
er
en
ce
2
0
1
5
(C
S
O
C
2
0
1
5
)
,
v
o
l.
3
(
So
f
t
w
are
E
n
g
i
n
eeri
n
g
i
n
In
t
e
l
l
i
g
e
n
t
Sy
s
t
em
s
),
2
0
1
5
.
[
24
]
A
l
i
N
.
S.
,
“
Pro
t
ect
i
o
n
w
e
b
ap
p
l
i
cat
i
o
n
s
u
s
i
n
g
rea
l
-
t
i
m
e
t
ech
n
i
q
u
e
t
o
d
et
ec
t
s
t
r
u
ct
u
red
q
u
er
y
l
a
n
g
u
ag
e
i
n
j
ect
i
o
n
at
t
ac
k
s
,
”
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
Co
m
p
u
t
er
A
p
p
l
i
ca
t
i
o
n
s
,
v
o
l
.
1
4
9
,
n
o
.
6
,
p
p
.
26
–
32
,
2
0
1
6
.
[
25
]
D
ey
S.
,
N
at
h
J
.
N
at
h
A
.
,
“
A
n
i
n
t
e
g
rat
e
d
s
y
mme
t
ri
c
k
e
y
cry
p
t
o
g
rap
h
i
c
met
h
o
d
–
amal
g
ama
t
i
o
n
o
f
T
T
J
S
A
al
g
o
ri
t
h
m,
ad
v
a
n
ced
Caes
ar
c
i
p
h
er
al
g
o
ri
t
h
m,
b
i
t
r
o
t
a
t
i
o
n
an
d
re
v
ers
a
l
met
h
o
d
:
SJ
A
a
l
g
o
ri
t
h
m,
”
In
t
er
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
M
o
d
er
n
E
d
u
ca
t
i
o
n
a
n
d
Co
m
p
u
t
er
S
ci
e
n
ce
,
v
o
l
.
4
,
n
o
.
5
,
p
p
.
1
–
9
,
2
0
1
2
.
[2
6
]
D
as
A
.
,
Bo
n
n
eau
J
.
,
Caes
ar
M.
,
Bo
ri
s
o
v
N
.
W
an
g
X
.,
“
T
h
e
T
an
g
l
e
d
W
eb
o
f
Pas
s
w
o
rd
Reu
s
e,
”
ND
S
S
,
v
o
l
.
1
4
,
pp.
23
–
26
,
2
0
1
4
.
[2
7
]
Ch
at
t
erj
ee
D
.
,
N
a
t
h
J
.
,
D
as
S.
,
A
g
ar
w
al
S.
N
at
h
A
.
,
“
Sy
mmet
ri
c
k
e
y
cry
p
t
o
g
r
ap
h
y
u
s
i
n
g
mo
d
i
f
i
ed
D
J
S
SA
s
y
mme
t
ri
c
k
e
y
al
g
o
r
i
t
h
m,
”
P
r
o
ceed
i
n
g
s
o
f
In
t
er
n
a
t
i
o
n
a
l
Co
n
f
e
r
en
ce
W
o
r
l
d
co
m
p
,
p
p
.
18
–
21
,
2
0
1
1
.
[2
8
]
D
el
l
’
A
m
i
co
M.
,
Mi
c
h
i
ar
d
i
P
.,
Ro
u
d
i
er
Y
.
,
“
Pas
s
w
o
r
d
s
t
ren
g
t
h
:
a
n
emp
i
ri
cal
a
n
al
y
s
i
s
,
”
P
r
o
ceed
i
n
g
s
I
E
E
E
i
n
INF
O
C
O
M
,
p
p
.
1
–
9
,
2
0
1
0
.
[2
9
]
K
el
l
ey
P.
G
.
,
K
o
ma
n
d
u
ri
S.
,
Mazu
rek
M.
L
.
,
Sh
ay
R.
,
V
i
d
as
T
.
,
Bau
er
L
.
,
Ch
r
i
s
t
i
n
N
.
,
Cra
n
o
r
L
.
F.
,
L
o
p
ez,
J
.
,
“
G
u
es
s
ag
a
i
n
(a
n
d
ag
a
i
n
a
n
d
a
g
ai
n
):
meas
u
ri
n
g
p
as
s
w
o
rd
s
t
ren
g
t
h
b
y
s
i
m
u
l
a
t
i
n
g
p
as
s
w
o
rd
-
cr
ac
k
i
n
g
a
l
g
o
ri
t
h
ms
,
”
IE
E
E
S
ym
p
o
s
i
u
m
o
n
S
ec
u
r
i
t
y
a
n
d
P
r
i
va
cy
(
S
P
)
,
p
p
.
5
2
3
–
537
,
2
0
1
2
.
[
30
]
K
o
ma
n
d
u
ri
S.
,
Sh
ay
R.
,
K
el
l
ey
P.
G
.
,
Mazu
rek
M.
L
.
,
Bau
er
L
.
,
Ch
ri
s
t
i
n
N
.
,
Cran
o
r
L
.
F.
E
g
el
man
S.
,
“O
f
p
as
s
w
o
rd
s
an
d
p
e
o
p
l
e:
meas
u
ri
n
g
t
h
e
effect
o
f
p
as
s
w
o
r
d
-
co
m
p
o
s
i
t
i
o
n
p
o
l
i
ci
e
s
,
”
P
r
o
cee
d
i
n
g
s
o
f
t
h
e
S
IG
CH
I
Co
n
f
er
e
n
ce
o
n
H
u
m
a
n
F
a
c
t
o
r
s
i
n
Co
m
p
u
t
i
n
g
S
y
s
t
e
m
s
,
p
p
.
2
5
9
5
–
2
6
0
4
,
2
0
1
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
538
-
544
544
[
31
]
Ch
u
ri
P.
P.
,
G
h
at
e
V
.
,
G
h
ag
K.
, “
J
u
mb
l
i
n
g
-
s
a
l
t
i
n
g
:
an
i
mp
ro
v
i
s
ed
ap
p
ro
ac
h
fo
r
p
as
s
w
o
rd
en
cr
y
p
t
i
o
n
,
”
In
t
er
n
a
t
i
o
n
a
l
Co
n
f
er
e
n
ce
o
n
S
ci
e
n
ce
a
n
d
Tech
n
o
l
o
g
y
(TICS
T)
,
p
p
.
236
–
2
4
2
,
2
0
1
5
.
[
32
]
Bo
n
n
eau
J
.
,
J
u
s
t
M.
,
Mat
t
h
ew
s
,
G
.
(2
0
1
0
)
‘W
h
a
t
’s
i
n
a
n
ame?
E
v
al
u
at
i
n
g
s
t
a
t
i
s
t
i
cal
at
t
ack
s
o
n
p
ers
o
n
a
l
k
n
o
w
l
e
d
g
e
q
u
e
s
t
i
o
n
s
,
”
F
i
n
a
n
ci
a
l
C
r
yp
t
o
g
r
a
p
h
y
a
n
d
D
a
t
a
S
e
cu
r
i
t
y
-
14
th
In
t
er
n
a
t
i
o
n
a
l
Co
n
f
e
r
en
ce
,
S
p
ri
n
g
er,
Ber
l
i
n
,
H
ei
d
el
b
erg
,
v
o
l
.
6
0
5
2
,
pp.
98
–
1
1
3
,
2
0
1
0
.
[
33
]
M
en
ezes
A
.
J
.
,
V
an
O
o
r
s
ch
o
t
,
P.
C.
,
V
a
n
s
t
o
n
e
S.
A.
,
“
H
an
d
b
o
o
k
o
f
A
p
p
l
i
e
d
Cry
p
t
o
g
ra
p
h
y
,
”
J
u
n
e,
CRC
Pre
s
s
,
Mas
s
ac
h
u
s
et
t
s
In
s
t
i
t
u
t
e
o
f
T
ech
n
o
l
o
g
y
(MI
T
)
,
1
9
9
6
.
[
34
]
Sa
y
an
e
k
ar
P.
,
Raj
i
w
at
e
A
.
,
Q
az
i
L
.
,
K
u
l
k
arn
i
A
.
,
“
Cu
s
t
o
mi
z
ed
N
FC
en
a
b
l
e
d
ID
card
fo
r
A
t
t
e
n
d
a
n
ce
an
d
T
ran
s
act
i
o
n
u
s
i
n
g
Face
Reco
g
n
i
t
i
o
n
,”
In
t
er
n
a
t
i
o
n
a
l
R
es
ea
r
c
h
Jo
u
r
n
a
l
o
f
E
n
g
i
n
eer
i
n
g
a
n
d
Tech
n
o
l
o
g
y
,
v
o
l
.
3
,
n
o
.
9
,
p
p
.
1
3
6
6
-
1
3
6
8
,
2
0
1
6
.
[
35
]
A
l
i
Z
.
,
So
n
k
u
s
are
R.
,
“
RFID
b
as
ed
s
mar
t
s
h
o
p
p
i
n
g
an
d
b
i
l
l
i
n
g
,
”
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
A
d
va
n
ce
d
R
es
e
a
r
c
h
i
n
Co
m
p
u
t
er
a
n
d
Co
m
m
u
n
i
c
a
t
i
o
n
E
n
g
i
n
eer
i
n
g
,
v
o
l
.
2
,
n
o
.
1
3
,
p
p
.
4
6
9
6
-
4
6
9
9
,
2
0
1
3
.
[3
6
]
Bri
an
A
.
L
.
A
.
,
A
ro
ck
i
am
L
.
,
Mal
arch
el
v
i
P.
D
.
S.
K
.
,
“
A
n
IO
T
b
as
e
d
s
ec
u
re
d
s
mart
l
i
b
rar
y
s
y
s
t
em
w
i
t
h
N
FC
b
as
ed
b
o
o
k
t
rac
k
i
n
g
,”
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
E
m
er
g
i
n
g
Te
ch
n
o
l
o
g
y
i
n
Co
m
p
u
t
er
S
c
i
en
ce
&
E
l
ect
r
o
n
i
c
s
(IJE
TCS
E
)
,
v
o
l
.
11
,
n
o
.
5
,
p
p
.
1
8
-
2
1
,
2
0
1
4
.
[3
7
]
A
l
Sh
i
mmary
M.
K
.
,
A
l
N
a
y
ar
M.
M.
,
K
u
b
b
a
A
.
R
.
,
“
D
es
i
g
n
i
n
g
s
mart
U
n
i
v
er
s
i
t
y
u
s
i
n
g
RFID
an
d
W
S
N
,”
In
t
e
r
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
Co
m
p
u
t
e
r
A
p
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
112
,
n
o
.
15
,
p
p
.
3
4
-
3
9
,
2
0
1
5
.
[3
8
]
N
o
v
o
t
n
y
Á
.
,
D
áv
i
d
L
.
,
Cs
áfo
r
H
.
,
“
A
p
p
l
y
i
n
g
RFID
t
ec
h
n
o
l
o
g
y
i
n
t
h
e
ret
a
i
l
i
n
d
u
s
t
r
y
–
b
en
ef
i
t
s
an
d
co
n
cer
n
s
fr
o
m
t
h
e
co
n
s
u
mer's
p
er
s
p
ect
i
v
e
,”
A
m
f
i
t
e
a
t
r
u
E
c
o
n
o
m
i
c
Jo
u
r
n
a
l
,
v
o
l
.
17
,
n
o
.
3
9
,
p
p
.
6
1
5
-
6
3
1
,
2
0
1
5
.
[3
9
]
Rj
ei
b
H
.
D
.
,
A
l
i
N
.
S.
,
A
l
Faraw
n
A
.
,
A
l
-
Sad
aw
i
B.
,
A
l
s
h
ar
q
i
H
.
,
“
A
t
t
e
n
d
a
n
ce
an
d
i
n
f
o
rma
t
i
o
n
s
y
s
t
em
u
s
i
n
g
RFID
an
d
w
e
b
-
b
a
s
ed
a
p
p
l
i
ca
t
i
o
n
fo
r
aca
d
emi
c
s
ect
o
r,
”
In
t
.
J.
A
d
v.
Co
m
p
u
t
.
S
c
i
.
A
p
p
l
.
,
v
o
l
.
9
,
n
o
.
1
,
p
p
.
2
6
6
–
2
7
4
,
2
0
1
8
.
[
40
]
A
l
a
t
t
ar
M.
H
.
,
Fara
w
n
A
.
A.
,
A
l
i
N
.
S.
,
“
A
n
t
i
-
co
n
t
i
n
u
o
u
s
co
l
l
i
s
i
o
n
s
u
s
er
-
b
as
e
d
u
n
p
re
d
i
c
t
ab
l
e
i
t
erat
i
v
e
p
a
s
s
w
o
rd
s
al
t
ed
h
a
s
h
e
n
cry
p
t
i
o
n
,
”
In
t
.
J.
In
t
e
r
n
e
t
Tech
n
o
l
o
g
y
a
n
d
S
ecu
r
ed
Tr
a
n
s
a
c
t
i
o
n
s
,
v
o
l
.
8
,
n
o
.
4
,
p
p
.
6
1
9
–
6
3
4
,
2
0
1
8
.
[
41
]
Rah
man
M.
T.
,
Mah
i
M.
J.
N.
,
“
Pro
p
o
s
al
f
o
r
SZ
RP
p
ro
t
o
co
l
w
i
t
h
t
h
e
es
t
ab
l
i
s
h
me
n
t
o
f
t
h
e
s
al
t
ed
S
H
A
-
2
5
6
b
i
t
H
MA
C
PBK
D
F2
a
d
v
a
n
ce
s
ec
u
ri
t
y
s
y
s
t
em
i
n
a
M
A
N
E
T
,
”
In
t
e
r
n
a
t
i
o
n
a
l
Co
n
f
e
r
en
ce
o
n
E
l
ec
t
r
i
ca
l
E
n
g
i
n
ee
r
i
n
g
a
n
d
In
f
o
r
m
a
t
i
o
n
&
Co
m
m
u
n
i
ca
t
i
o
n
Tech
n
o
l
o
g
y
(ICE
E
ICT)
,
pp.
1
–
5
,
A
p
ri
l
2
0
1
4
.
[
42
]
Mc
E
v
o
y
R.
,
Cu
rran
J
.
,
Co
t
t
er
P.
,
Mu
rp
h
y
C.
,
“
F
o
rt
u
n
a
:
cry
p
t
o
g
ra
p
h
i
cal
l
y
s
ecu
re
p
s
e
u
d
o
-
ran
d
o
m
n
u
mb
er
g
en
era
t
i
o
n
i
n
s
o
ft
w
are
an
d
h
ard
w
are,
”
IE
T
Ir
i
s
h
S
i
g
n
a
l
s
a
n
d
S
ys
t
em
s
Co
n
f
e
r
en
ce
(IS
S
C
2
0
0
6
)
,
p
p
.
4
5
7
–
4
6
2
,
2
0
0
6
.
[
43
]
Cas
t
e
l
l
u
cci
a
C.
,
D
u
rmu
t
h
M.
,
Peri
t
o
D
.
,
“
A
d
ap
t
i
v
e
n
p
as
s
w
o
r
d
-
s
t
ren
g
t
h
met
ers
fro
m
Mark
o
v
mo
d
e
l
s
,
”
ND
S
S
’1
2
:
P
r
o
ceed
i
n
g
s
o
f
t
h
e
Net
wo
r
k
a
n
d
D
i
s
t
r
i
b
u
t
e
d
S
y
s
t
e
m
S
ec
u
r
i
t
y
S
y
m
p
o
s
i
u
m
,
2
0
1
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.