International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 7 - Number 3 |
Year of Publication: 2010 |
Authors: P. K. Bishnoi, P. K. Das |
10.5120/1145-1498 |
P. K. Bishnoi, P. K. Das . Check in Check out Using Blue Tooth Ad Hoc Network(CICO-BT). International Journal of Computer Applications. 7, 3 ( September 2010), 21-27. DOI=10.5120/1145-1498
In this era of information technology, enterprise needs the automation of every business process to get the competitive advantage and multidimensional growth of the business. For this every enterprises need to observe the incoming and out going time of every employee and to stop the entry of unauthorized persons. For CICO many automated and manual systems are available like smart card, RFID, manual ID card, thumb impression techniques, etc. Every technique has its advantages and disadvantages. But the biggest problems with people /employee in this IT era is that employees have to carry a number of electronic devices (PDA, Mobile Phone, Smart card, Client for RFID, Library card, ATM Card, Credit Card etc) with them for different purposes. Carrying so many e-devices/e-cards is not comfortable for a person. To reduce the number of e-devices one has to carry, many IT/Electronic industries are working towards integration. As a result, mobile phone today can be used for MP3/MP4 player, FM radio, storing data, surfing Internet and much other application in business transactions etc.