A novel cost effective access control and auto filling form system using QR code

Author(s):  
Dinesh Khandal ◽  
Devendra Somwanshi
2021 ◽  
Vol 5 (5) ◽  
pp. 102-107
Author(s):  
Yuhanis Yusof ◽  
Lee Cheng Hooi ◽  
Azizi Abas

Advertisement on products or services can be found in many forms; video, banners, pamphlets, etc. However, these advertisements only function as a one-way communication as consumers are only presented with the product information and the seller. Further action on purchasing the product is absent or is to be made separately. Such an approach may not guarantee a sale for the seller as the customer may only retrieve the information of the product but purchase it elsewhere. Hence, this study demonstrates the use of QR code technology not only in marketing but also in e-commerce. The technology is realized in "On the GoShop" mobile application that has two types of users: seller and buyer. Sellers are people who wanted to promote their product and/or services while buyers are the ones who have a desire to purchase. An evaluation study on the acceptance of the mobile application was then performed on a total of 50 respondents and it is learned that the proposed e-commerce application is well accepted. Ninety percent of the respondents agree with the usefulness of the application and are looking forward to using the application in daily routines. The use of QR code technology not only facilitates consumer in purchasing their desired product but also contribute to cost-effective marketing.


Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


2021 ◽  
Author(s):  
Herman Cheung

The intent of this thesis research is to develop a new methodology to improve existing nuclear process in an efficient, precise, and cost-effective way. This thesis presents three new designs: Secure Trilateral Access Control (STAC), Network-Integrated Nuclear Operation (NINO), and network-driven Condition-Based Nuclear Maintenance (CBNM). STAC design has three tiers: Tier-1 ensures security controls of external accesses to the new nuclear network. Tier-2 ensures qualification controls for carrying nuclear operations. Tier-3 ensures qualification controls for nuclear maintenances. NINO design is to increase efficiency of conducting nuclear operations and ensure correctness of executing targeted operations. CBNM design is to increase efficiency and cost savings for conducting nuclear maintenance and schedule maintenance based on equipment conditions to avoid extremely expensive forced outages. Feasibility and practicality of these new designs are illustrated analytically and numerically in the thesis. The significance of these designs is tremendous, resulting in huge nuclear operation cost savings.


Author(s):  
Umar Farooq ◽  
Muhammad Amar ◽  
Hafiza Rabbia Ibrahim ◽  
Oneeza Khalid ◽  
Sehrish Nazir ◽  
...  

2015 ◽  
Vol 21 (10) ◽  
pp. 2643-2649 ◽  
Author(s):  
Wei Wu ◽  
Shun Hu ◽  
Xu Yang ◽  
Joseph K. Liu ◽  
Man Ho Au

Sign in / Sign up

Export Citation Format

Share Document