In the near future, mobile-phone users will able to track public buses on their phones, and will not need to spend time waiting at bus stops.
This follows the development of a Radio Frequency Identification smart cards
Sensor Network, originally aimed at managing bus and truck fleets more efficiently and cutting down on fuel burned by vehicles stuck in traffic.
The project, which involves Burapha University's Logistics Faculty and Southeast Asia rfid inlay(Seatec), will also help commuters by making bus and taxi travel in Bangkok more convenient.
The assistant professor of Burapha's Logistics Faculty, Nakorn Indra-Payoong, is in charge of the project's research and development, which has been under way for several years.
He said the project involved RFID readers called "B- bases", contactless cardscalled "B- moves", software applications and a control or computer centre.
air jordan 13 infrared for cheap adjusting this for individual preference and optimum comfort
air jordan 13 infrared for cheap a way to erase spam form the universe
If a perimeter or card system is breached, it is really not enough to simply notify the control room. In many cases, there is no one monitoring the facility after hours. Even if monitored remotely, NFC CARDby the time someone can respond, the intruder has come and gone.
Therefore, it is important that multitechnology readers also provide 'intelligent supervision' that monitors the communication between the access control panel and the reader at the door. For instance, intelligent four-state supervision continuously monitors for a cut line, short circuit, combo cardsclosed circuit, and open circuit conditions at door contacts and request to exit (REX) connections. Tri-state LEDs and audible alerts will indicate status, alarm and perimeter-tampering conditions. An internal tamper switch will automatically alert security personnel if the reader is violated. This supervision ensures that security personnel are immediately notified if someone tampers with the reader, a door is breached or a circuit is bypassed, either by cutting or shorting. But, as stated earlier, this is not enough.
Upon an alert, you need the contactless cardsto be removed from the system. When breached, the reader needs to become inactive, removing the opportunity for the intruder to enter through this access point.
cheap michael kors handbags, discount michael kors handbags, michael kors outlet store online
moncler outlet uk, moncler sale uk, cheap moncler jackets
Strengthen Competitive Power of Crusher Machine
Michelle Linn is excited to