A Data-Driven Engine Starter System Using ESP32 With Multi-Layer Authentication and Alerts
The Data-Driven Engine Starter System using ESP32 is designed to enhance engine security by integrating multi-layer authentication mechanisms, including password input, fingerprint recognition, and RFID/NFC technology. This system prevents unauthorized engine access, ensuring only authenticated user...
| Main Authors: | Parunandhi, Amareshwari, Susmitha Reddy, Karnati, Sahithi, Nakirtha, Vasudha, ., Sai, Swetha |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2025
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2152/ http://eprints.intimal.edu.my/2152/1/jods2025_10.pdf http://eprints.intimal.edu.my/2152/2/695 |
Similar Items
The Requirement Analysis of An Offline Automated Invigilation System with Gmail Alert Integration
by: A., Eenaja, et al.
Published: (2025)
by: A., Eenaja, et al.
Published: (2025)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Data Science for AI Chatbot Bias Detection and Mitigation in Healthcare
by: Amareshwari, Parunandhi, et al.
Published: (2025)
by: Amareshwari, Parunandhi, et al.
Published: (2025)
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015)
by: Norhidayah, Masstor
Published: (2015)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Student academic alert system / Lee Foo Yee
by: Lee , Foo Yee
Published: (2003)
by: Lee , Foo Yee
Published: (2003)
Low-cost web-based greenhouse monitoring system using NodeMCU ESP8266
by: Muhammad Faizzul, Ahmam
Published: (2019)
by: Muhammad Faizzul, Ahmam
Published: (2019)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Study and Implementation of Internet of Things (IoT) Based Vehicle Safety
Alert and Tracking System
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
SOS Smart Reminder and Emergency Detection Device Using ESP8266 and MPU6050
by: Deepashree, H.S., et al.
Published: (2024)
by: Deepashree, H.S., et al.
Published: (2024)
Probabilistic Multi-Tiered Grey Wolf Optimizer-Based Routing for Sustainable Sensor Networks
by: Bahl, Vasudha, et al.
Published: (2022)
by: Bahl, Vasudha, et al.
Published: (2022)
Embedded web client in LPC2129 16/32 bit ARM7TDMI-S
by: Loh, Lim Chye
Published: (2007)
by: Loh, Lim Chye
Published: (2007)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
32-bit memory controller design: design of memory controller for micron SDR SDRAM
by: Chin, Chun Lek
Published: (2015)
by: Chin, Chun Lek
Published: (2015)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Weighted Watson-crick automata and applications in halal authentication
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Geofence alerts application with gps tracking for children monitoring
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
BROOD: business rules-driven object oriented design
by: Loucopoulos, P., et al.
Published: (2008)
by: Loucopoulos, P., et al.
Published: (2008)
Behavioral Biometrics for User Authentication Using Self- Refreshing SOM
by: Teh, Chee Siong, et al.
Published: (2017)
by: Teh, Chee Siong, et al.
Published: (2017)
Car rental management sytem with SMS alert
by: Fazreeny, Adnan
Published: (2013)
by: Fazreeny, Adnan
Published: (2013)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Hierarchical structural driven model for integrative information management architecture
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Two-factor human authentication
by: Liang, Xian Liang
Published: (2018)
by: Liang, Xian Liang
Published: (2018)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
Similar Items
-
The Requirement Analysis of An Offline Automated Invigilation System with Gmail Alert Integration
by: A., Eenaja, et al.
Published: (2025) -
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013) -
Data Science for AI Chatbot Bias Detection and Mitigation in Healthcare
by: Amareshwari, Parunandhi, et al.
Published: (2025) -
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015) -
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)