咨询与建议

限定检索结果

文献类型

  • 46 篇 会议
  • 35 篇 期刊文献
  • 10 篇 学位论文

馆藏范围

  • 91 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 70 篇 工学
    • 38 篇 计算机科学与技术...
    • 28 篇 电气工程
    • 13 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 核科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 8 篇 理学
    • 3 篇 化学
    • 2 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 3 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 91 篇 access control s...
  • 13 篇 access control
  • 10 篇 authentication
  • 9 篇 face recognition
  • 9 篇 text
  • 7 篇 přístupový systé...
  • 6 篇 authorization
  • 5 篇 feature extracti...
  • 5 篇 security
  • 5 篇 rfid
  • 4 篇 authorisation
  • 3 篇 microcontroller
  • 3 篇 acs
  • 3 篇 policies
  • 3 篇 mobile cloudlet
  • 3 篇 nfc
  • 3 篇 speech recogniti...
  • 3 篇 security system
  • 3 篇 cloud computing
  • 3 篇 integrated secur...

机构

  • 10 篇 brno university ...
  • 2 篇 singapore univ t...
  • 2 篇 st petersburg el...
  • 1 篇 saint-petersburg...
  • 1 篇 indian inst info...
  • 1 篇 brno univ techno...
  • 1 篇 shanghai univ ke...
  • 1 篇 college of econo...
  • 1 篇 spiiras 39 14th ...
  • 1 篇 spectrum technol...
  • 1 篇 jaypee univ info...
  • 1 篇 multimedia univ ...
  • 1 篇 nanjing univ inf...
  • 1 篇 sapienza univ ro...
  • 1 篇 gibio universida...
  • 1 篇 school of inform...
  • 1 篇 vienna univ tech...
  • 1 篇 manchester metro...
  • 1 篇 fac elect engn o...
  • 1 篇 zhejiang univ st...

作者

  • 2 篇 huang yongfeng
  • 2 篇 sammarco e.
  • 2 篇 shu yuanchao
  • 2 篇 tu shanshan
  • 2 篇 cheong soon-nyea...
  • 2 篇 garzia f.
  • 2 篇 ling huo-chong
  • 2 篇 chen jiming
  • 2 篇 cusani r.
  • 1 篇 maebara sunao
  • 1 篇 huang huang-nan
  • 1 篇 steingart viktor
  • 1 篇 dong hoon lee
  • 1 篇 a. ivanova
  • 1 篇 jing ning
  • 1 篇 xueyan cao
  • 1 篇 jin zhixiang
  • 1 篇 aswir premadi
  • 1 篇 ibeke ebuka
  • 1 篇 iwendi celestine

语言

  • 89 篇 英文
  • 2 篇 其他
检索条件"主题词=Access Control System"
91 条 记 录,以下是1-10 订阅
排序:
Student Apartment access control system Based on MTCNN-FaceNet Algorithm
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS 2025年 第1期24卷
作者: Zhang, Jing Zibo Vocat Inst Coll Articial Intelligence & Big Data Zibo 255000 Peoples R China
In response to the security management issues of student apartments, a study is conducted on a student apartment access control system based on multitasking cascaded convolutional networks and FaceNet. Firstly, a face... 详细信息
来源: 评论
access control system with hand geometry verification and smart cards
收藏 引用
IEEE AEROSPACE AND ELECTRONIC systemS MAGAZINE 2000年 第2期15卷 45-48页
作者: Sanchez-Reillo, R Gonzalez-Marcos, A ETSI Telecommun Dept Tecnol Foton E-28040 Madrid Spain
An access control system that joins the uniqueness of biometric verification, as well as the storage security and processing capabilities of smart cards, is defined here. The biometric technique chosen has been hand g... 详细信息
来源: 评论
access control system for Distributed Computing Networks
收藏 引用
AUTOMATIC control AND COMPUTER SCIENCES 2016年 第8期50卷 664-668页
作者: Konoplev, A. S. Kalinin, M. O. Peter Great St Petersburg Polytech Univ St Petersburg Russia
The architecture of access control system for user jobs access to computational resources of grid distributed computing networks, which provides protection of data being processed against threats of exceeding user pri... 详细信息
来源: 评论
access control system Based on Speech Recognition
Access Control System Based on Speech Recognition
收藏 引用
International Conference on Measurement, Instrumentation and Automation (ICMIA 2012)
作者: Wei, Zhengxi Liang, Jinming Sichuan Univ Sci & Engn Sch Comp Sci Zigong 643000 Peoples R China
In this paper, an embedded design method is presented for the access control system in the intelligent community, combining its characteristics of the application. Using speech recognition technology, intelligent comm... 详细信息
来源: 评论
access control system Based on Visible Light Communication
Access Control System Based on Visible Light Communication
收藏 引用
7th International Conference on Communications, Signal Processing, and systems (CSPS)
作者: Xue, Xinpeng Wang, Jinpeng Yu, Ying Zou, Nianyu Dalian Polytech Univ Sch Informat Sci & Engn 1st Qinggongyuan Dalian 116034 Liaoning Peoples R China
In recent years, with the continuous development of Visible Light Communication (VLC), its application fields are constantly expanding. In view of the tradition various gating locks have some shortcomings, especially ... 详细信息
来源: 评论
Lightweight access control system for Wearable Devices
收藏 引用
IT PROFESSIONAL 2019年 第1期21卷 50-58页
作者: Paniagua Diez, Fidel Suirez Touceda, Diego Sierra Camara, Jose Maria Zeadally, Sherali Carlos III Univ Madrid Evalues Lab IT Secur Evaluat Madrid Spain Univ Int La Rioja Logrono Spain Northeastern Univ Coll Comp & Informat Sci Boston MA 02115 USA Univ Kentucky Coll Commun & Informat Lexington KY USA
Wearable devices are being used in areas such as the health and military environments where, due to information sensitivity, access control is essential. In these environments, it is necessary to be able to control th... 详细信息
来源: 评论
Enforcing legal ownership rights by an access control system
收藏 引用
COMPUTERS & SECURITY 1996年 第3期15卷 212-226页
作者: Born, E Siemens Nixdorf Informationssysteme AG Muenchen Ger
Data processing is liable to civil and criminal law just as many other human activities of a civilized world. Thus in particular for data objects in a data processing environment, ownership and author or originator ri... 详细信息
来源: 评论
A Protective Mechanism for the access control system in the Virtual Domain
收藏 引用
China Communications 2016年 第11期13卷 129-142页
作者: Jinan Shen Deqing Zou Hai Jin Kai Yang Bin Yuan Weiming Li Services Computing Technology and System Laboratory Cluster and Grid Computing LaboratorySchool of Computing Science and TechnologyHuazhong University of Science and Technology School of Information Engineering Hubei University for Nationalities
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... 详细信息
来源: 评论
Tsarray: An Intelligent access control system Using Backscatter Communication
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2020年 第11期69卷 13821-13835页
作者: Chen, Yi Xiao, Fu Xie, Lei Huang, Haiping Sun, Lijuan Nanjing Univ Posts & Telecommun Jiangsu High Technol Res Key Lab Wireless Sensor Nanjing 210023 Jiangsu Peoples R China Nanjing Univ State Key Lab Novel Software Technol Nanjing 210023 Jiangsu Peoples R China
With the help of computer vision-based technology, current face recognition access control systems can effectively reduce the hassle of swiping cards. However, it is not suitable for special industry areas where priva... 详细信息
来源: 评论
Efficient access control system based on aesthetic QR code
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2018年 第1期22卷 81-91页
作者: Huang, Peng-Cheng Chang, Chin-Chen Li, Yung-Hui Liu, Yanjun Xiamen Univ Technol Dept Comp Sci & Technol Xiamen Peoples R China Feng Chia Univ Dept Informat Engn & Comp Sci Taichung Taiwan Natl Cent Univ Dept Comp Sci & Informat Engn Taoyuan Taiwan
With the explosive growth of smart phones in recent years, QR code is becoming more and more popular. This work presents a new electronic access control system for smart building based on QR code. The system exploits ... 详细信息
来源: 评论