Search results

1 – 10 of over 1000
Article
Publication date: 1 February 1989

John R. Parks

Biometrics, the measurement of ‘people‐based’ characteristics is rapidly becoming a major field of technology as an expert explains.

Abstract

Biometrics, the measurement of ‘people‐based’ characteristics is rapidly becoming a major field of technology as an expert explains.

Details

Sensor Review, vol. 9 no. 2
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 1 December 2005

Oleksiy Mazhelis, Jouni Markkula and Jari Veijalainen

To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and…

1128

Abstract

Purpose

To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.

Design/methodology/approach

The reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.

Findings

In order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combined. The use of the dynamic part enables continuous and user‐friendly verification, while the static part is responsible for accurate verification. A suitable distribution of architecture components between the terminal and the remote server is proposed.

Research limitations/implications

The proposed architecture represents a specification that corresponds to the computational viewpoint of the reference model for open distributed processing. Other specifications, such as engineering or technological specifications, which are needed for successful implementation of the system, are not provided in the paper.

Practical implications

The paper provides a specification of the integrated identify verification system architecture that can be utilised during further design and subsequent implementation of the system.

Originality/value

While available approaches to identity verification in a mobile environment concentrate mainly on connectivity identity verification (employed in accessing communication services), the proposed architecture focuses on application‐level identity verification needed to access application‐level resources, remotely or locally on the terminal.

Details

Information Management & Computer Security, vol. 13 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 1982

Ronald Burt De Waal

This is a comprehensive list of books, some pamphlets, and a few sound recordings about or by Ronald (and Nancy) Reagan. Collections of photographs and cartoons as well as…

Abstract

This is a comprehensive list of books, some pamphlets, and a few sound recordings about or by Ronald (and Nancy) Reagan. Collections of photographs and cartoons as well as biographies, political commentary, speeches, quotations and even recipes are represented. Omitted are books in which there is only brief mention of him. The bibliography was compiled in connection with a major exhibit on Ronald Reagan at the Colorado State University Library. It is the author's intention to continue to collect Reagan materials.

Details

Reference Services Review, vol. 10 no. 2
Type: Research Article
ISSN: 0090-7324

Article
Publication date: 16 March 2012

Guillermo Azuara, José Luis Tornos and José Luis Salazar

The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.

1962

Abstract

Purpose

The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.

Design/methodology/approach

First, the authors put forward a secure traceability system with a cryptographic operator that improves efficiency, saves costs and is adaptable to all types of supply chains. Second, the authors implement the system in a food manufacturing company, show the compatibility of the system with the initial production chain and demonstrate its improvement.

Findings

The authors have economically and technologically improved the detection of faked goods in the supply chain by means of a cheap and scalable system based on RFID.

Research limitations/implications

The system has been tested in a manufacturing point of the supply chain, not in the supply chain as a whole. As traceability is additive in character, the results can be generalized and applied to each part of the supply chain.

Practical implications

A prototype has been built and implemented for a food manufacturing company. It meets all the specifications required for detection of fakes in manufactured products.

Originality/value

Unlike other existing products used to detect fakes through traceability, this system identifies fakes and potential counterfeits, significantly reducing the cost of security management. Another important difference is that verification can be performed by a third party not involved in the system, without loss of security.

Details

Industrial Management & Data Systems, vol. 112 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 17 March 2023

Kexin Zhang, Dachao Li and Xingwei Xue

In this paper, taking a p-section girder cable-stayed bridge as an example, the construction monitoring and load test of the bridge are implemented.

Abstract

Purpose

In this paper, taking a p-section girder cable-stayed bridge as an example, the construction monitoring and load test of the bridge are implemented.

Design/methodology/approach

In order to ensure the safety of cable-stayed bridge structure in construction and achieve the internal force state of the completed bridge, the construction process is monitored for liner and stress of the p-section girder, construction error and safety state during construction. At the same time, to verify whether the bridge can meet the design requirements, the static and dynamic load tests are done.

Findings

The results of construction monitoring show that the stress state of the structure during construction is basically consistent with the theoretical calculation and design requirements. The final measured stress state of the structure is within the allowable range of the cable-stayed bridge, and the structural stress state is normal and meets the specification requirements. The load tests results show that the measured deflection of the midspan section of the main girder is less than the theoretical calculation value. The maximum deflection of the main girder is 48.03 mm, which is less than 54.25 mm of the theoretical value, indicating that the main girder has sufficient structural stiffness. Under the dynamic load test, the natural frequency of the three spans of the bridge is less than the theoretical frequency.

Originality/value

This study can provide important reference value for the construction and maintenance of similar p-section girder cable-stayed bridges.

Details

International Journal of Building Pathology and Adaptation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-4708

Keywords

Article
Publication date: 12 April 2022

Jingbo Zhao, Yan Tao and Zhiming Sun

This paper aims to clarify voltage sourced converter’s (VSC’s) influence rules on the alternating current (AC) short-circuit current and identify the key factors, so as to propose…

131

Abstract

Purpose

This paper aims to clarify voltage sourced converter’s (VSC’s) influence rules on the alternating current (AC) short-circuit current and identify the key factors, so as to propose the short-circuit current suppression strategy.

Design/methodology/approach

This paper investigates the key factors which impact the short-circuit current supplied by the VSC based on the equivalent current source model. This study shows that the phase of the VSC equivalent current source is mainly affected by the type of fault, whereas the amplitude is mainly decided by the control mode, the amplitude limiter and the electrical distance. Based on the above influence mechanism, the dynamic limiter with short-circuit current limiting function is designed. The theoretical analysis is verified by simulations on PSCAD.

Findings

The short-circuit current feeding from VSC is closely related to the control mode and control parameters of the VSC, fault type at AC side and the electrical distance of the fault point. The proposed dynamic limiter can make VSC absorb more reactive power to suppress the short-circuit current.

Research limitations/implications

The dynamic limiter proposed in this paper is limited to suppress three-phase short-circuit fault current. The future work will focus more on improving and extending the dynamic limiter to the fault current suppression application in other fault scenarios.

Practical implications

The research results provide a reference for the design of protection system.

Originality/value

The key influence factors are conducive to put forward the measures to suppress the fault current, eliminate the risk of short-circuit current exceeding the standard and reduce the difficulty of protection design.

Details

Circuit World, vol. 49 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 1 October 1978

A recent seminar, organised by European Study Conferences, discussed the economics of introducing microprocessors into manufacturing operations and the type of applications which…

Abstract

A recent seminar, organised by European Study Conferences, discussed the economics of introducing microprocessors into manufacturing operations and the type of applications which lent themselves to this technology. But what of the overriding factor: the attitude of workers towards a tiny piece of silicon which can cost them their jobs? ASTMS official, Barrie Sherman, outlines the changes in work practice and attitudes needed to avert labour resistance.

Details

Industrial Management, vol. 78 no. 10
Type: Research Article
ISSN: 0007-6929

Article
Publication date: 1 March 1985

Martin Harrison

An overview of the OPTIRAM/LIBPAC computerised system for the intelligent optical scanning of catalogue cards, or any other form of printed or good hand‐written material, into a…

Abstract

An overview of the OPTIRAM/LIBPAC computerised system for the intelligent optical scanning of catalogue cards, or any other form of printed or good hand‐written material, into a full MARC format is given. The article provides information on the sophisticated scanning technology employed, using standard Group 3 facsimile transmission devices to read catalogue card entries and produce an internally coded data string, used to drive format recognition programs developed by LIBPAC, each tailored to suit a particular application. Sections deal with the varied aspects of this individual approach and the benefits that can arise from taking advantage of user‐specific software to enhance and standardise the resulting machine‐readable catalogue. The article includes examples which show the full capabilities of the optical scanner and examples of catalogue cards that have been converted into the MARC format.

Details

Program, vol. 19 no. 3
Type: Research Article
ISSN: 0033-0337

Article
Publication date: 13 May 2014

Alexander Prosser

The purpose of this study is to present and discuss some core issues regarding the transparency of the eVoting process. Apart from the protection of voting secrecy, the possible…

Abstract

Purpose

The purpose of this study is to present and discuss some core issues regarding the transparency of the eVoting process. Apart from the protection of voting secrecy, the possible manipulation of votes, even of the entire election, is one of the key issues in eVoting. Comparatively few Supreme Court rulings are available for eVoting, as it is a new field. Where there are rulings available, they often focus on the case at hand and do not derive general principles. On 3 March 2009, the German Constitutional Court published a ruling on the use of voting terminals[1] from which also general principles can be derived far beyond the case itself.

Design/methodology/approach

Apart from the protection of voting secrecy, the possible manipulation of votes, even of the entire election, is one of the key issues in eVoting. Comparatively few Supreme Court rulings are available for eVoting, as it is a new field. Where there are rulings available, they often focus on the case at hand and do not derive general principles. On 3 March 2009, the German Constitutional Court published a ruling on the use of voting terminals[1] from which general principles can also be derived far beyond the case itself.

Findings

The paper presented some core issues in eVoting transparency as required by the ruling of the German Constitutional Court. In particular, it suggested a way to define and operationalise the terms “audit chain”, “count” and “recount”, which arguably represent the core issues in eVoting transparency and auditability. Furthermore, the paper introduced a model to map the key security dimensions in an eVoting system and the degree to which they are fulfilled by technical, not just organisational, means, with auditability being the dimension discussed in this contribution.

Research limitations/implications

The paper only considers political elections and starts off the framework and requirements set by the German Constitutional Court. With one exception, these requirements can be seen as rather generic for most Western-style democracies, the exception being observability and auditability of the election by the general public.

Practical implications

The paper derives concrete design principles for remote eVoting systems.

Originality/value

The paper develops a security framework for remote eVoting from given legal requirements. After an analysis of popular existing eVoting protocols, a generic eVoting protocol is derived satisfying these requirements.

Details

Transforming Government: People, Process and Policy, vol. 8 no. 2
Type: Research Article
ISSN: 1750-6166

Keywords

Open Access
Article
Publication date: 5 April 2023

Xinghua Shan, Zhiqiang Zhang, Fei Ning, Shida Li and Linlin Dai

With the yearly increase of mileage and passenger volume in China's high-speed railway, the problems of traditional paper railway tickets have become increasingly prominent…

1404

Abstract

Purpose

With the yearly increase of mileage and passenger volume in China's high-speed railway, the problems of traditional paper railway tickets have become increasingly prominent, including complexity of business handling process, low efficiency of ticket inspection and high cost of usage and management. This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally. The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.

Design/methodology/approach

Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system, the grid-oriented passenger service record (PSR) data storage model, efficient access to massive PSR data under high concurrency condition, the linkage between face recognition service platforms and various terminals in large scenarios, and two-factor authentication of the e-ticket identification code based on the key and the user identity information. Focusing on the key technologies and architecture the of existing ticketing system, multiple service resources are expanded and developed such as electronic ticket clusters, PSR clusters, face recognition clusters and electronic ticket identification code clusters.

Findings

The proportion of paper ticket printed has dropped to 20%, saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide. The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds, significantly improving the efficiency of passenger transport organization. Meanwhile, problems of paper ticket counterfeiting, reselling and loss have been generally eliminated.

Originality/value

E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence.

Details

Railway Sciences, vol. 2 no. 1
Type: Research Article
ISSN: 2755-0907

Keywords

1 – 10 of over 1000