Figure 1

Figure 2

Figure 3

Figure 4

Figure 5
![Structure of the FIDO system [Fido-Tech, 2021b].](https://sciendo-parsed.s3.eu-central-1.amazonaws.com/647379be4e662f30ba53f889/j_sgem-2022-0001_fig_005.jpg?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=AKIA6AP2G7AKOUXAVR44%2F20251020%2Feu-central-1%2Fs3%2Faws4_request&X-Amz-Date=20251020T073844Z&X-Amz-Expires=3600&X-Amz-Signature=d7a803d5a4668148517641149c66140dcb6958d9437961b2ba71060958d8c0d9&X-Amz-SignedHeaders=host&x-amz-checksum-mode=ENABLED&x-id=GetObject)
Figure 6

Figure 7

Figure 8

Strengths and weaknesses of the systems_
Strengths | Weaknesses |
---|---|
ASQ-SYS system | |
|
|
FIDO system | |
|
|
WLM system | |
|
|
PermaNET system | |
|
|
SmartFlow system | |
|
|
Strengths | Weaknesses |
---|---|
ASQ-SYS system | |
|
|
FIDO system | |
|
|
WLM system | |
|
|
PermaNET system | |
|
|
SmartFlow system | |
|
|
© 2022 Marian Kwietniewski, Piotr Świercz, Jarosław Chudzicki, published by Sciendo
This work is licensed under the Creative Commons Attribution 4.0 License.