Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
373
result(s) for
"Microcomputers Access control."
Sort by:
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
2005
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths.It takes readers through the many different issues involved in spying on someone online.
Today's Top National Security Threat? You're Looking at It
2025
[...]that is probably how you get most of your information today, not on pieces of paper delivered to your door or in your mail, or even via AM or FM radio or on network television. Among the irrational core fears that most people have, as outlined by sociologist Dan Gardner in Risk: the Science and Politics of Fear and Robert M. Smith in Primal Fear: Tribalism, Empathy, and the Way Forward, are the fears of Catastrophic Potential (fear of mass-casualty events, rather than threats that cause smaller numbers of fatalities; this is why people are more frightened of airplane crashes than the much more dangerous public highways); Unfamiliarity (why you fear unknown streets at night, but not those in your own neighborhood); Lack of Understanding (if you have been taught how something works, you are less hesitant to use it than if its operation is a total mystery); Loss of Trust (when something you consider reliable does not do what you think it should, your sense of risk rises); Generational Risk (anything that threatens children or future generations evokes a strong emotional reaction); Outsiders (we innately fear those who do not share our values); Disruption (anything that unbalances existing social cohesion); and Conspiracies (\"everyone else knows what is going on but me; what are they hiding?\"). [...]it is easier for authoritarian governments to adapt Orwellian standards of doublespeak and manipulation when sending information abroad, and they have plenty of prior practice in deluding their own populations. Russia's goal is not to build greater global admiration of their nation, but simply to create more social disharmony within Western countries, to undermine public faith in their democratic institutions, and to stir political division and chaos. Because doing so works in Russia's global interests.
Journal Article
A Personal Microcomputer as an Access Control Management Platform in Road Transport
2023
For many years, the use of new computer systems to control various elements of everyday human life has been observed. Separate systems manage access control; others are used to control blinds and roller shutters; and others manage systems in the garden. Many of these systems can be integrated using available systems. This paper presents an example of an access control management system based on the Raspberry Pi microcomputer and shows an analysis of its performance, accuracy, and possibility of improvement. This study used official devices manufactured by the Raspberry Pi Foundation; however, it is possible to create a similar system with custom parts. This project used open-source software. The authors argued that it is possible to create an autonomous vehicle access control system using microcomputers and optical character recognition technology. Using simple devices, the plate recognition system was built and tested, proving the thesis that it is possible to build an access control system using available devices. This also confirms the thesis that microcomputers can be used to control other systems in the human environment.
Journal Article
Non-contact infrared temperature detection and RFID technology access control design
2021
The non-contact infrared body temperature detection and RFID technology access control design uses 51 single-chip microcomputer as the core main control module, which combines infrared temperature measurement function (GY-MLX90614 sensor) and radio frequency (MFRC522) card swipe access control system, through swiping card and temperature measurement together control the door opening and closing. When it works in the high-risk zone mode, it detects the body temperature while swiping the card. If the body temperature is normal, the door opens, if the body temperature is abnormal, the door does not open and the buzzer sounds; when working in the low-risk mode, if the body temperature is normal, the door opens, If the body temperature is abnormal, the door opens and the buzzer sounds. Finally, it inputs the obtained card information and body temperature data to the WiFi circuit (ESP8266) through the serial port, and uses it as a hotspot to connect to the mobile device to realize data transmission, so as to realize more efficient unmanned management in different areas during the epidemic.
Journal Article
Novel AMI in Zigbee Satellite Network Based on Heterogeneous Wireless Sensor Network for Global Machine-to-Machine Connectivity
by
Sung, Wen-Tsai
,
Sun, Jwo-Shiun
,
Wu, Chia-Lun
in
Access control
,
Advanced metering infrastructure
,
Antennas
2024
This study endeavored to enhance the efficiency and utility of microcomputer meters. In the past, their role was predominantly confined to remote meter reading, entailing high construction and communication transmission costs, coupled with subsequent maintenance and operational expenditures. These factors collectively impacted the enthusiasm of various stakeholders to invest in this realm. Hence, in alignment with the smart city development initiative, the natural gas industry has pioneered the establishment of an advanced metering infrastructure with heterogeneous wireless sensor networks (HWSNs) at its core. This visionary leap incorporates global machine-to-machine connectivity (G-M2MC) technology, interconnecting all facets of its operations, thereby positioning itself as a trailblazer within the industry. While advancing this endeavor, the project’s scheduling aligns with the enterprise’s sustainability goals in the early stages of digital transformation. This strategic allocation of resources is responsive to government policies and aspires to cultivate a digitally connected smart green energy hub, thereby expediting the transformation of the living environment. The objective is to provide a stable, secure, cost-effective, and reliable system that can be shared among peers. Furthermore, this study delved into the analysis of congestion avoidance in intelligent Zigbee satellite transport networks based on the HWSNs-GM2MC of non-synchronous satellite orbit system (NGSO) pivotal technologies, utilizing them to integrate the smart LNGas management system (SGMS). Concurrently, it developed application services through the smart meter application interface (SMAPI), distinct from conventional microcomputer meters. However, it is imperative to acknowledge that cloud computing, while processing sensitive data, grapples with issues of latency, privacy, efficiency, power consumption, and zero-trust security risk information management and ethical authority management capabilities in the defense of disaster relief responses.
Journal Article