Search results
1 – 10 of over 1000
Biometrics, the measurement of ‘people‐based’ characteristics is rapidly becoming a major field of technology as an expert explains.
Oleksiy Mazhelis, Jouni Markkula and Jari Veijalainen
To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and…
Abstract
Purpose
To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.
Design/methodology/approach
The reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.
Findings
In order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combined. The use of the dynamic part enables continuous and user‐friendly verification, while the static part is responsible for accurate verification. A suitable distribution of architecture components between the terminal and the remote server is proposed.
Research limitations/implications
The proposed architecture represents a specification that corresponds to the computational viewpoint of the reference model for open distributed processing. Other specifications, such as engineering or technological specifications, which are needed for successful implementation of the system, are not provided in the paper.
Practical implications
The paper provides a specification of the integrated identify verification system architecture that can be utilised during further design and subsequent implementation of the system.
Originality/value
While available approaches to identity verification in a mobile environment concentrate mainly on connectivity identity verification (employed in accessing communication services), the proposed architecture focuses on application‐level identity verification needed to access application‐level resources, remotely or locally on the terminal.
Details
Keywords
This is a comprehensive list of books, some pamphlets, and a few sound recordings about or by Ronald (and Nancy) Reagan. Collections of photographs and cartoons as well as…
Abstract
This is a comprehensive list of books, some pamphlets, and a few sound recordings about or by Ronald (and Nancy) Reagan. Collections of photographs and cartoons as well as biographies, political commentary, speeches, quotations and even recipes are represented. Omitted are books in which there is only brief mention of him. The bibliography was compiled in connection with a major exhibit on Ronald Reagan at the Colorado State University Library. It is the author's intention to continue to collect Reagan materials.
Guillermo Azuara, José Luis Tornos and José Luis Salazar
The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.
Abstract
Purpose
The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.
Design/methodology/approach
First, the authors put forward a secure traceability system with a cryptographic operator that improves efficiency, saves costs and is adaptable to all types of supply chains. Second, the authors implement the system in a food manufacturing company, show the compatibility of the system with the initial production chain and demonstrate its improvement.
Findings
The authors have economically and technologically improved the detection of faked goods in the supply chain by means of a cheap and scalable system based on RFID.
Research limitations/implications
The system has been tested in a manufacturing point of the supply chain, not in the supply chain as a whole. As traceability is additive in character, the results can be generalized and applied to each part of the supply chain.
Practical implications
A prototype has been built and implemented for a food manufacturing company. It meets all the specifications required for detection of fakes in manufactured products.
Originality/value
Unlike other existing products used to detect fakes through traceability, this system identifies fakes and potential counterfeits, significantly reducing the cost of security management. Another important difference is that verification can be performed by a third party not involved in the system, without loss of security.
Details
Keywords
Kexin Zhang, Dachao Li and Xingwei Xue
In this paper, taking a p-section girder cable-stayed bridge as an example, the construction monitoring and load test of the bridge are implemented.
Abstract
Purpose
In this paper, taking a p-section girder cable-stayed bridge as an example, the construction monitoring and load test of the bridge are implemented.
Design/methodology/approach
In order to ensure the safety of cable-stayed bridge structure in construction and achieve the internal force state of the completed bridge, the construction process is monitored for liner and stress of the p-section girder, construction error and safety state during construction. At the same time, to verify whether the bridge can meet the design requirements, the static and dynamic load tests are done.
Findings
The results of construction monitoring show that the stress state of the structure during construction is basically consistent with the theoretical calculation and design requirements. The final measured stress state of the structure is within the allowable range of the cable-stayed bridge, and the structural stress state is normal and meets the specification requirements. The load tests results show that the measured deflection of the midspan section of the main girder is less than the theoretical calculation value. The maximum deflection of the main girder is 48.03 mm, which is less than 54.25 mm of the theoretical value, indicating that the main girder has sufficient structural stiffness. Under the dynamic load test, the natural frequency of the three spans of the bridge is less than the theoretical frequency.
Originality/value
This study can provide important reference value for the construction and maintenance of similar p-section girder cable-stayed bridges.
Details
Keywords
Jingbo Zhao, Yan Tao and Zhiming Sun
This paper aims to clarify voltage sourced converter’s (VSC’s) influence rules on the alternating current (AC) short-circuit current and identify the key factors, so as to propose…
Abstract
Purpose
This paper aims to clarify voltage sourced converter’s (VSC’s) influence rules on the alternating current (AC) short-circuit current and identify the key factors, so as to propose the short-circuit current suppression strategy.
Design/methodology/approach
This paper investigates the key factors which impact the short-circuit current supplied by the VSC based on the equivalent current source model. This study shows that the phase of the VSC equivalent current source is mainly affected by the type of fault, whereas the amplitude is mainly decided by the control mode, the amplitude limiter and the electrical distance. Based on the above influence mechanism, the dynamic limiter with short-circuit current limiting function is designed. The theoretical analysis is verified by simulations on PSCAD.
Findings
The short-circuit current feeding from VSC is closely related to the control mode and control parameters of the VSC, fault type at AC side and the electrical distance of the fault point. The proposed dynamic limiter can make VSC absorb more reactive power to suppress the short-circuit current.
Research limitations/implications
The dynamic limiter proposed in this paper is limited to suppress three-phase short-circuit fault current. The future work will focus more on improving and extending the dynamic limiter to the fault current suppression application in other fault scenarios.
Practical implications
The research results provide a reference for the design of protection system.
Originality/value
The key influence factors are conducive to put forward the measures to suppress the fault current, eliminate the risk of short-circuit current exceeding the standard and reduce the difficulty of protection design.
Details
Keywords
A recent seminar, organised by European Study Conferences, discussed the economics of introducing microprocessors into manufacturing operations and the type of applications which…
Abstract
A recent seminar, organised by European Study Conferences, discussed the economics of introducing microprocessors into manufacturing operations and the type of applications which lent themselves to this technology. But what of the overriding factor: the attitude of workers towards a tiny piece of silicon which can cost them their jobs? ASTMS official, Barrie Sherman, outlines the changes in work practice and attitudes needed to avert labour resistance.
An overview of the OPTIRAM/LIBPAC computerised system for the intelligent optical scanning of catalogue cards, or any other form of printed or good hand‐written material, into a…
Abstract
An overview of the OPTIRAM/LIBPAC computerised system for the intelligent optical scanning of catalogue cards, or any other form of printed or good hand‐written material, into a full MARC format is given. The article provides information on the sophisticated scanning technology employed, using standard Group 3 facsimile transmission devices to read catalogue card entries and produce an internally coded data string, used to drive format recognition programs developed by LIBPAC, each tailored to suit a particular application. Sections deal with the varied aspects of this individual approach and the benefits that can arise from taking advantage of user‐specific software to enhance and standardise the resulting machine‐readable catalogue. The article includes examples which show the full capabilities of the optical scanner and examples of catalogue cards that have been converted into the MARC format.
The purpose of this study is to present and discuss some core issues regarding the transparency of the eVoting process. Apart from the protection of voting secrecy, the possible…
Abstract
Purpose
The purpose of this study is to present and discuss some core issues regarding the transparency of the eVoting process. Apart from the protection of voting secrecy, the possible manipulation of votes, even of the entire election, is one of the key issues in eVoting. Comparatively few Supreme Court rulings are available for eVoting, as it is a new field. Where there are rulings available, they often focus on the case at hand and do not derive general principles. On 3 March 2009, the German Constitutional Court published a ruling on the use of voting terminals[1] from which also general principles can be derived far beyond the case itself.
Design/methodology/approach
Apart from the protection of voting secrecy, the possible manipulation of votes, even of the entire election, is one of the key issues in eVoting. Comparatively few Supreme Court rulings are available for eVoting, as it is a new field. Where there are rulings available, they often focus on the case at hand and do not derive general principles. On 3 March 2009, the German Constitutional Court published a ruling on the use of voting terminals[1] from which general principles can also be derived far beyond the case itself.
Findings
The paper presented some core issues in eVoting transparency as required by the ruling of the German Constitutional Court. In particular, it suggested a way to define and operationalise the terms “audit chain”, “count” and “recount”, which arguably represent the core issues in eVoting transparency and auditability. Furthermore, the paper introduced a model to map the key security dimensions in an eVoting system and the degree to which they are fulfilled by technical, not just organisational, means, with auditability being the dimension discussed in this contribution.
Research limitations/implications
The paper only considers political elections and starts off the framework and requirements set by the German Constitutional Court. With one exception, these requirements can be seen as rather generic for most Western-style democracies, the exception being observability and auditability of the election by the general public.
Practical implications
The paper derives concrete design principles for remote eVoting systems.
Originality/value
The paper develops a security framework for remote eVoting from given legal requirements. After an analysis of popular existing eVoting protocols, a generic eVoting protocol is derived satisfying these requirements.
Details
Keywords
Xinghua Shan, Zhiqiang Zhang, Fei Ning, Shida Li and Linlin Dai
With the yearly increase of mileage and passenger volume in China's high-speed railway, the problems of traditional paper railway tickets have become increasingly prominent…
Abstract
Purpose
With the yearly increase of mileage and passenger volume in China's high-speed railway, the problems of traditional paper railway tickets have become increasingly prominent, including complexity of business handling process, low efficiency of ticket inspection and high cost of usage and management. This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally. The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.
Design/methodology/approach
Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system, the grid-oriented passenger service record (PSR) data storage model, efficient access to massive PSR data under high concurrency condition, the linkage between face recognition service platforms and various terminals in large scenarios, and two-factor authentication of the e-ticket identification code based on the key and the user identity information. Focusing on the key technologies and architecture the of existing ticketing system, multiple service resources are expanded and developed such as electronic ticket clusters, PSR clusters, face recognition clusters and electronic ticket identification code clusters.
Findings
The proportion of paper ticket printed has dropped to 20%, saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide. The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds, significantly improving the efficiency of passenger transport organization. Meanwhile, problems of paper ticket counterfeiting, reselling and loss have been generally eliminated.
Originality/value
E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence.
Details