[1]
عكسة ك. و حراق م. ا., "Monitoring Critical Areas and Unauthorized Access Using RFID Technology", IERK, م 12, عدد 01, ص 702–717, 2023.