22 research outputs found

    Construction and Use Examples of Private Electronic Notary Service in Educational Institutions

    Get PDF
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    Construction and Use Examples of Private Electronic Notary Service in Educational Institutions

    Get PDF
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    Complete set of polarization transfer observables for the 16O(p,n)16F{}^{16}{\rm O}(\vec{p},\vec{n}){}^{16}{\rm F} reaction at 296 MeV and 0 degrees

    Full text link
    We report measurements of the cross section and a complete set of polarization transfer observables for the 16O(p,n)16F{}^{16}{\rm O}(\vec{p},\vec{n}){}^{16}{\rm F} reaction at a bombarding energy of TpT_p = 296 MeV and a reaction angle of θlab\theta_{\rm lab} = 00^{\circ}. The data are compared with distorted-wave impulse approximation calculations employing the large configuration-space shell-model (SM) wave functions. The well-known Gamow-Teller and spin-dipole (SD) states at excitation energies of ExE_x \lesssim 8 MeV have been reasonably reproduced by the calculations except for the spin--parity JπJ^{\pi} = 22^- state at ExE_x = 5.86 MeV. The SD resonance at ExE_x \simeq 9.5 MeV appears to have more JπJ^{\pi} = 22^- strength than JπJ^{\pi} = 11^- strength, consistent with the calculations. The data show significant strength in the spin-longitudinal polarized cross section IDL(0)ID_L(0^{\circ}) at ExE_x \simeq 15 MeV, which indicates existence of the JπJ^{\pi} = 00^- SD resonance as predicted in the SM calculations.Comment: 6 figures, submitted to Physical Review

    Development of fast-response PPAC with strip-readout for heavy-ion beams

    Full text link
    A strip-readout parallel-plate avalanche counter (SR-PPAC) has been developed aiming at the high detection efficiency and good position resolution in high-intensity heavy-ion measurements. The performance was evaluated using 115 MeV/u 132^{132}Xe, 300 MeV/u 132^{132}Sn, and 300 MeV/u 48^{48}Ca beams. A detection efficiency beyond 99% for these beams is achieved even at an incident beam intensity of 0.7 billion particles per second. The best position resolution achieved is 235 um (FWHM).Comment: 16 pages, 18 figures, 2 table

    The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication

    No full text
    Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has many issues. In this paper, we propose a kind of biometrics authentication method using the timings of key strokes of an identical simple phrase for all users. For this method, selection of the phrase is important. We analyzed the timings of key strokes using Self Organizing Map (SOM) and selected the suitable phrase for authentication. We examined the effectiveness of this method with the authentication experiments using the map organized by SOM

    Private Electronic Notary Service in Universities and Its Utilization in Education

    No full text
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    Private Electronic Notary Service in Universities and Its Utilization in Education

    No full text
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities
    corecore