Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Check in Check out Using Blue Tooth Ad Hoc Network (CICO-BT)

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 3 - Article 4
Year of Publication: 2010
Authors:
P. K. Bishnoi
P. K. Das
10.5120/1145-1498

P K Bishnoi and P K Das. Article: Check in Check out Using Blue Tooth Ad Hoc Network(CICO-BT). International Journal of Computer Applications 7(3):21–27, September 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {P. K. Bishnoi and P. K. Das},
	title = {Article: Check in Check out Using Blue Tooth Ad Hoc Network(CICO-BT)},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {7},
	number = {3},
	pages = {21--27},
	month = {September},
	note = {Published By Foundation of Computer Science}
}

Abstract

In this era of information technology, enterprise needs the automation of every business process to get the competitive advantage and multidimensional growth of the business. For this every enterprises need to observe the incoming and out going time of every employee and to stop the entry of unauthorized persons. For CICO many automated and manual systems are available like smart card, RFID, manual ID card, thumb impression techniques, etc. Every technique has its advantages and disadvantages. But the biggest problems with people /employee in this IT era is that employees have to carry a number of electronic devices (PDA, Mobile Phone, Smart card, Client for RFID, Library card, ATM Card, Credit Card etc) with them for different purposes. Carrying so many e-devices/e-cards is not comfortable for a person. To reduce the number of e-devices one has to carry, many IT/Electronic industries are working towards integration. As a result, mobile phone today can be used for MP3/MP4 player, FM radio, storing data, surfing Internet and much other application in business transactions etc.

The purpose of this paper is to integrate the authentication process at the time of entry and exit of employee using mobile phones with the support of Bluetooth (BT) Ad-Hoc network.

Today the cost of BT enabled mobile is not very high. The minimum cost of a BT and Kilobyte Virtual Machine (KVM) mobile is Rs.2500/- and an employee can easily afford it. An analysis report says that - 95% employees are having BT and KVM mobiles. It means mobile phone can be used as an ID card also for the purpose of authentication in CICO system.

Reference

  • “Advantages of BarCode” [Online] Available http://www.articlealley.com/
  • “BarCode Scanner” [Online] Available http://www.semicron.com.
  • “Biometric” [Online] Available http://en.wikipedia.org/wiki/Biometrics
  • “Biometrics Security” [Online] Available http://www.allpctips.com/2009/12/13/biometrics/.
  • “Bluetooth technology”. [Online]. Available: http://www.bluetomorrow.com /index.php? option= com_frontpage&Itemid=1.[Accessed: March 09, 2009]. “Bluetooth: Low Power and Low Cost”. [Online]. Available: http: //www.bluetomorrow.com. [Accessed: March 09, 2009].
  • “High Speed Bluetooth” [Online]. Available: http://www.bluetomorrow.com /content/section / 344/466/. [Accessed: March 09, 2009].
  • “I frame,”. [Online]. Available: http://htmlhelp.com. [Accessed: March 09, 2009].
  • “RFID Smart Cards” [Online] Available http://rfid.bemrosebooth.com
  • Bruce Hopkins, Ranjith Antony, Bluetooth for Java. Apress, 2003.
  • David Blankenbeckler “An Introduction to Bluetooth” [Online]. Available: http://www.wirelessdevnet.com /training/channels/bluetooth/features/bluetooth.html. [Accessed: Feb 06, 2009].
  • James Keogh, The Complete Reference: J2ME. TataMcGraw- Hill, 2003.
  • Jonathan Gennick, Carol McCullough-Dieter & Gerrit-Jan Linker, Oracle 8i DBA Bible. IDG Book India, 2002.
  • K.A.C. Dushamali1, V.I.R. Fernando2, Ravindya Samarakoon3 Udayanthi Weerasooriya4 “Student Information Access System Via Bluetooth” Second International Conference on Industrial and Information Systems, ICIIS 2007, 8 – 11 August 2007, Sri Lanka [pp. 393-397]
  • Rick Greenwald, Robert Stackowiak & Jonathan Stern Oracle Essentials. O’Reilly IIIrd Edition.