23 research outputs found
Construction and Use Examples of Private Electronic Notary Service in Educational Institutions
People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities
Construction and Use Examples of Private Electronic Notary Service in Educational Institutions
People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities
Complete set of polarization transfer observables for the reaction at 296 MeV and 0 degrees
We report measurements of the cross section and a complete set of
polarization transfer observables for the reaction at a bombarding energy of =
296 MeV and a reaction angle of = .
The data are compared with distorted-wave impulse approximation calculations
employing the large configuration-space shell-model (SM) wave functions.
The well-known Gamow-Teller and spin-dipole (SD) states at excitation
energies of 8 MeV have been reasonably reproduced by the
calculations except for the spin--parity = state at =
5.86 MeV.
The SD resonance at 9.5 MeV appears to have more =
strength than = strength, consistent with the
calculations.
The data show significant strength in the spin-longitudinal polarized cross
section at 15 MeV, which indicates existence
of the = SD resonance as predicted in the SM calculations.Comment: 6 figures, submitted to Physical Review
Development of fast-response PPAC with strip-readout for heavy-ion beams
A strip-readout parallel-plate avalanche counter (SR-PPAC) has been developed
aiming at the high detection efficiency and good position resolution in
high-intensity heavy-ion measurements. The performance was evaluated using 115
MeV/u Xe, 300 MeV/u Sn, and 300 MeV/u Ca beams. A
detection efficiency beyond 99% for these beams is achieved even at an incident
beam intensity of 0.7 billion particles per second. The best position
resolution achieved is 235 um (FWHM).Comment: 16 pages, 18 figures, 2 table
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has many issues. In this paper, we propose a kind of biometrics authentication method using the timings of key strokes of an identical simple phrase for all users. For this method, selection of the phrase is important. We analyzed the timings of key strokes using Self Organizing Map (SOM) and selected the suitable phrase for authentication. We examined the effectiveness of this method with the authentication experiments using the map organized by SOM
Private Electronic Notary Service in Universities and Its Utilization in Education
People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities
Private Electronic Notary Service in Universities and Its Utilization in Education
People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities