• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • Tagged with
  • 7
  • 7
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Biometri vid fysisk access : En jämförande studie mellan ansiktsigenkänning och fingeravtrycksavläsning

Hanner, Martin, Björk, Tobias January 2006 (has links)
<p>In today’s society, people often find themselves in situations where they need to be identified;for example when we buy alcohol, need to use an ATM or log on to our e-mail account. The most common methods today that are used for these kinds of matters are antiquated, and in</p><p>the meantime, criminals all over the world get more sophisticated. Companies invest billions every day in order to protect their interests. Maybe it’s time that we finally give biometrics the</p><p>attention that it deserves.</p><p>This essay aims to describe the biometric methods that are available today, find some of the most effective when it comes to physical access and make a comparison. Face recognition and fingerprint scanning will be described more thoroughly. Pros and cons will be analyzed and the theory will be linked to interviews with three Swedish organisations.</p> / <p>I dagens samhälle hamnar vi människor regelbundet i situationer där vi blir tvungna att identifiera oss. Det kan till exempelvis vara när vi köper alkohol, tar ut pengar eller loggar in på vårt e-mailkonto. De vanligaste metoderna, som idag används för dessa identifieringar, har funnits länge och är föråldrade och i takt med detta blir brottslingar världen allt mer sofistikerade. Dagligen investerar företag världen över miljarder för att skydda exempelvis</p><p>data med hjälp av koder och andra mjukvaruinstallationer. Kanske är det istället dags för att vi ger biometrin en ordentlig chans.</p><p>Den här uppsatsen syftar till att redogöra för de biometriska säkerhetsmetoder som finns tillgängliga, identifiera några av de effektivaste när det gäller fysisk access och jämföra dessa med varandra. Det är framförallt ansiktsigenkänning och fingeravtrycksavläsning som kommer att ges mycket plats i studien. För- och nackdelar kommer att tas upp och teorin kommer att kopplas till intervjuer gjorda med tre svenska företag.</p>
2

Implementation and evaluation of sensoring a user's position with React Native

Falk, Daniel January 2017 (has links)
Today, there are many different ways to handle physical access control. RFID cards and tags are still a major solution but during the last years the market have been focusing on taking advantage of the devices that most people always carry with them, such as smartphones, tablets or smartwatches. This thesis has been carried out together with the company BRP Systems. They develop and deliver business systems to mainly the fitness business. In their product suite there is an application for booking workout sessions at these facilities. In this thesis their booking application has been rebuilt as a prototype and the functionality of unlocking the door and checking into workout sessions has been added. The application has been developed in React Native for Android and has been implemented in three versions using different techniques to sensor the users position at the door. The techniques are iBeacon, GPS and QR code. The iBeacon- and GPS versions work by allowing the user to unlock the door when standing outside it. A local notification will be pushed if the application is in the background. The QR code version allows the user to scan a QR code at the door to unlock it. When the door has been unlocked the users can also check into their booked workout sessions. The system and the different versions have been tested at one of BRP Systems customers to evaluate the usability. The conclusion is that an application with high usability can be built with all tested techniques in React Native. For the system to be used several other factors such as security and maintenance has to be considered. The choice to use React Native might be of high risk since it is a relatively new framework relying on community developed libraries.
3

The biography of "access" as an expression of human rights in South African education policies

Gamede, Thobekile 30 March 2005 (has links)
This study In an attempt to promote equal access to education, we in South Africa, have adopted an instrumentalist approach to the debate of the right to education. In other words, we have provided an enabling legal framework and we simply assume that access to education has been granted to every one. We continue to pretend that we understand what exactly the concept of “access to education” means. We also assume that we all have a common understanding of what the Constitution means by the right to education. On 26 June 1955 the historic Freedom Charter of the African National Congress (ANC) was adopted. This charter declared “the doors of learning and culture shall be opened.” Over the next four decades, the demand for open and equal access to education became central platform in the anti-apartheid struggles that brought an ANC-led government to power in 1994. Yet, ten years later (2004) the problem of access continues to preoccupy education planners and activists against the backdrop of some of the most progressive policy positions including a Constitution that recognizes education as a basic right. The intellectual puzzle that motivates this study is to explain, therefore, why despite its prominence, it continues to be regarded as an intractable problem. The research strategy adopted in pursuit of this puzzle is to trace the changing meanings of the concept of “access to education” under and after apartheid, and its expression in the practices of two case study schools (comparative case studies). Data was collected from different sources to trace the concept of access to education in education from the apartheid era to the policies and practices that affirm access to education as a basic human right today. This study hopes to contribute significantly to the dialogue of “access” as a realisation of the basic right to education. For the conceptual framework Morrow’s distinction between epistemological access and physical access was used. Formal access to education refers to enrolment or registration at an education institution, in this case, a school, whereas epistemological access refers to access to knowledge and information that these education institutions hold. I expanded the conceptual framework to include dimensions of epistemological access such as how the topic is taught, who selected the topic, the value and political basis. I undertook documentary analysis and a series of interviews with individuals who were involved in the struggle either through intellectual contributions in the NEC and NEPI processes or in the National Education Co-ordinating Committee. I also conducted two case studies of schools located in vastly different social and political contexts. At these schools, I collected data through classroom and school observations, semi-structured interviews with principals, history teachers and learners. Findings: The first finding of this study is that the ways in which students experience access to knowledge (epistemological access) is strongly dependent on the history and politics of the school context and the institutional culture, rather than the formal prescriptions laid down in the school curriculum The second finding of this study is that even when students enjoy physical access to schools, they have highly uneven, even unequal, access to knowledge within those schools. The third finding is that despite the awareness and understanding of what good education entails, without physical access, it is difficult for individuals to entertain discussions about epistemological access. The fourth finding is that despite claims that the policy promotes increased access to education, it was not possible to find reports that refer to any significant degree of quality outcomes as a result of the implementation of the principle of “equality of access” to education. Increased access to education has not resulted in quality output. This dissertation contributes to knowledge by its nuanced exploration of the complexities of access to education as a human right. Most importantly it pushes the boundaries of knowledge pertaining to both physical and epistemological access at the time when each of these are crucial points in the education development agenda. / Thesis (PhD (Education Management and Policy Studies))--University of Pretoria, 2006. / Education Management and Policy Studies / unrestricted
4

Biometri vid fysisk access : En jämförande studie mellan ansiktsigenkänning och fingeravtrycksavläsning

Hanner, Martin, Björk, Tobias January 2006 (has links)
In today’s society, people often find themselves in situations where they need to be identified;for example when we buy alcohol, need to use an ATM or log on to our e-mail account. The most common methods today that are used for these kinds of matters are antiquated, and in the meantime, criminals all over the world get more sophisticated. Companies invest billions every day in order to protect their interests. Maybe it’s time that we finally give biometrics the attention that it deserves. This essay aims to describe the biometric methods that are available today, find some of the most effective when it comes to physical access and make a comparison. Face recognition and fingerprint scanning will be described more thoroughly. Pros and cons will be analyzed and the theory will be linked to interviews with three Swedish organisations. / I dagens samhälle hamnar vi människor regelbundet i situationer där vi blir tvungna att identifiera oss. Det kan till exempelvis vara när vi köper alkohol, tar ut pengar eller loggar in på vårt e-mailkonto. De vanligaste metoderna, som idag används för dessa identifieringar, har funnits länge och är föråldrade och i takt med detta blir brottslingar världen allt mer sofistikerade. Dagligen investerar företag världen över miljarder för att skydda exempelvis data med hjälp av koder och andra mjukvaruinstallationer. Kanske är det istället dags för att vi ger biometrin en ordentlig chans. Den här uppsatsen syftar till att redogöra för de biometriska säkerhetsmetoder som finns tillgängliga, identifiera några av de effektivaste när det gäller fysisk access och jämföra dessa med varandra. Det är framförallt ansiktsigenkänning och fingeravtrycksavläsning som kommer att ges mycket plats i studien. För- och nackdelar kommer att tas upp och teorin kommer att kopplas till intervjuer gjorda med tre svenska företag.
5

A framework to implement delegation in offline PACS : A strategy to restrict user’s path

Bharath, Tati January 2013 (has links)
Physical access control systems (PACS) deal with the security of the availability of resources. They work as an alternative to traditional manual security access control. Access control has two variants, the logical which deals with computer environments and the physical which deals with the physical entry into a property or warehouses. However, offline physical access control systems cannot enforce the user’s path making it unsuitable for use in classified areas, such as places where the public is restricted. Therefore, offline PACS need a framework that can delegate the authority to enforce the user’s path. This is satisfactorily met in the presented research with a new design of offline PACS that has the capability to implement delegation. This framework allows the locks to dynamically write and read access policies onto and from a smart card. It works by means of a construct called “Path Array” and communication among different entities occurs via a chain of trust formed with the use of pre-shared keys.
6

Mobile ID in physical access control applications

Simonetti, Jose Eduardo 10 November 2016 (has links)
Submitted by Daniele Santos (danielesantos.htl@gmail.com) on 2017-02-21T21:04:19Z No. of bitstreams: 1 Eduardo.pdf: 1544695 bytes, checksum: ad700b85bc86a6f4889a9f52275ab887 (MD5) / Approved for entry into archive by Janete de Oliveira Feitosa (janete.feitosa@fgv.br) on 2017-02-23T17:38:59Z (GMT) No. of bitstreams: 1 Eduardo.pdf: 1544695 bytes, checksum: ad700b85bc86a6f4889a9f52275ab887 (MD5) / Made available in DSpace on 2017-03-02T13:43:19Z (GMT). No. of bitstreams: 1 Eduardo.pdf: 1544695 bytes, checksum: ad700b85bc86a6f4889a9f52275ab887 (MD5) Previous issue date: 2016-11-10 / Today there exist a myriad of different types of physical access control systems (PACS) that use a smart card or mobile device as a key. The mobile device enabled smart locks, as they are often referred to, operate using either Wi-Fi or Bluetooth. This thesis has explored the use of a third emerging wireless technology called Near Field Communication (NFC) available in mobile devices such as smartphones. Near Field Communication (NFC) technology is a relatively new technology that is on the rise and is included in almost every new mobile device. By leveraging Near Field Communication (NFC) enabled mobile devices, a highly secure access control system can be achieved and developed taking advantage of the computational power of smartphones in comparison to traditional methods the business implications are huge, Several different authentication and encryption protocols, mobile operating systems and Near Field Communication (NFC) modes of operation where analyzed and evaluated. After considerations technical considerations the Secure Remote Password authentication protocol on top of Near Field Communication (NFC) card emulation (CE) scheme with the client application running on smartphones operating system (OS) was selected. This thesis shows that Near Field Communication (NFC) enables a mobile device to act as a key in a secure access control system (PACS) and as the user base for NFC grows larger so will the likelihood that we will come to see more of these types of systems in business and organizations.
7

Visualizing Zones : Defining the Notion of Zones in Physical Access Control for Security Management System

Ju, Joanne January 2023 (has links)
In the domain of access control, the notion of zone is still ambiguous. The zone demands clearer contextualization that resonates with the security operators in their workplace. Through interpretive research, this project aims to investigate intuitive ways to monitor the overview of security through visualisation and propose a groundwork that can facilitate discussion around future possibilities of zones in physical access control. Based on the sense making process, this project presents three visualisation models: textual, physical, and abstract. Each model explores various representations of zones to communicate zone-to-zone relationships to improve usability. Also, the design work demonstrates diverse expressive qualities interacting with spaces that are physical, conceptual, and logical. In the most practical sense, the zone means groups of doors, however, the zone also embodies an abstract layer of interpretation that is not strictly connected to a physical space.

Page generated in 0.0653 seconds