To see the other types of publications on this topic, follow the link: Token system.

Journal articles on the topic 'Token system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Token system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.

Full text
Abstract:
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to generate token or OTP still have vulnerable because can attacked from tokens steal through MITM and found that the generated tokens with the same value. Therefore, we propose a two-factor authentication framework based on ethereum blockchain with dApp as token generation system. Firstly, outcome from the analysis of the system, next succeeded in creating a two-factor authentication system without using third-parties. Second, token system generate up to 3164 different tokens in one second and has been collisions tested. Third, security method to protect token from MITM attack. The attacker unable to get access caused all the checking are done by dApp user authentication.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Moon, and Jee Chung. "Sustainable Growth and Token Economy Design: The Case of Steemit." Sustainability 11, no. 1 (December 30, 2018): 167. http://dx.doi.org/10.3390/su11010167.

Full text
Abstract:
Cryptocurrency blockchain technology is attracting worldwide attention, and the number of initial coin offerings (ICOs) is increasing rapidly. This new economic trend, called cryptoeconomics, can program human behavior through incentive design. A cryptocurrency-based incentive system is not only transparent, but also allows businesses to substitute initial investment costs with cryptocurrency tokens until they are on a sustainable growth trajectory in terms of network effects. This study aims to propose a process for building a desirable model of a token economy, based on the case of Steemit—a blogging and social networking website that is creating high values due to its efficient token economy model. We suggest the following design process of a token economy model: (1) Determine token-business fit, (2) determine the chance of success, (3) determine the properties of token, (4) give tokens intrinsic value, (5) establish strategies to raise token value, (6) establish operational strategies of token economy system, (7) establish strategies for token liquidation, and (8) continue modifying the operational base. Considering cryptoeconomics is still at an early stage, it is expected that the guidelines on the token economy model suggested in this paper will lay a significant foundation for the development of cryptoeconomics research.
APA, Harvard, Vancouver, ISO, and other styles
3

Jánoky, László Viktor, János Levendovszky, and Péter Ekler. "An analysis on the revoking mechanisms for JSON Web Tokens." International Journal of Distributed Sensor Networks 14, no. 9 (September 2018): 155014771880153. http://dx.doi.org/10.1177/1550147718801535.

Full text
Abstract:
JSON Web Tokens provide a scalable solution with significant performance benefits for user access control in decentralized, large-scale distributed systems. Such examples would entail cloud-based, micro-services styled systems or typical Internet of Things solutions. One of the obstacles still preventing the wide-spread use of JSON Web Token–based access control is the problem of invalidating the issued tokens upon clients leaving the system. Token invalidation presently takes a considerable processing overhead or a drastically increased architectural complexity. Solving this problem without losing the main benefits of JSON Web Tokens still remains an open challenge which will be addressed in the article. We are going to propose some solutions to implement low-complexity token revocations and compare their characteristics in different environments with the traditional solutions. The proposed solutions have the benefit of preserving the advantages of JSON Web Tokens, while also adhering to stronger security constraints and possessing a finely tuneable performance cost.
APA, Harvard, Vancouver, ISO, and other styles
4

Bockelman, Brian, Andrea Ceccanti, Thomas Dack, Dave Dykstra, Maarten Litmaath, Mischa Sallé, and Hannah Short. "WLCG Token Usage and Discovery." EPJ Web of Conferences 251 (2021): 02028. http://dx.doi.org/10.1051/epjconf/202125102028.

Full text
Abstract:
Since 2017, the Worldwide LHC Computing Grid (WLCG) has been working towards enabling token based authentication and authorisation throughout its entire middleware stack. Following the publication of the WLCG Common JSON Web Token (JWT) Schema v1.0 [1] in 2019, middleware developers have been able to enhance their services to consume and validate the JWT-based [2] OAuth2.0 [3] tokens and process the authorization information they convey. Complex scenarios, involving multiple delegation steps and command line flows, are a key challenge to be addressed in order for the system to be fully operational. This paper expands on the anticipated token based workflows, with a particular focus on local storage of tokens and their discovery by services. The authors include a walk-through of this token flow in the RUCIO managed data-transfer scenario, including delegation to FTS and authorised access to storage elements. Next steps are presented, including the current target of submitting production jobs authorised by Tokens within 2021.
APA, Harvard, Vancouver, ISO, and other styles
5

Hao, Yong Ping, Xiao Lei Xu, Wei Ping Shao, and Peng Fei Zeng. "A Method of Business Process Modeling Based on Petri Net." Key Engineering Materials 450 (November 2010): 413–16. http://dx.doi.org/10.4028/www.scientific.net/kem.450.413.

Full text
Abstract:
Through the analysis of the execution and dispatching principle of the Petri net, the business process management mode based on Petri net is proposed. We merge the place node and the transition node, and reside the token in the node. The only token in process instances and the sub-token in parallel process are introduced, which can avoid conflicts caused by multi-tokens. The business process model for the drawings design and approval is established, and it is verified by the workflow modeling system.
APA, Harvard, Vancouver, ISO, and other styles
6

Wilding, Denise, Clare Rowan, Bill Maurer, Denise Schmandt-Besserat, Denise Wilding, Clare Rowan, Bill Maurer, and Denise Schmandt-Besserat. "Tokens, Writing and (Ac)counting: A Conversation with Denise Schmandt-Besserat and Bill Maurer." Exchanges: The Interdisciplinary Research Journal 5, no. 1 (October 27, 2017): 1–14. http://dx.doi.org/10.31273/eirj.v5i1.196.

Full text
Abstract:
In her foundational study of Neolithic clay tokens, the renowned archaeologist Denise Schmandt-Besserat identified that different token shapes represented different goods and were used in accounting and distribution. When these tokens came to be stored in sealed clay envelopes (likely representing a debt), each token was impressed on the outside of the envelope before being placed inside (thus allowing people to see quickly what was within). Three-dimensional objects were thus reduced to two-dimensional representations, the first form of writing (and contributing to cuneiform script). These clay envelopes in turn developed into pictographic tablets; here each token did not have to be impressed into the clay in a 'one, one, one' system, but instead quantity was indicated by a numerical symbol - abstract number was born. Much of Schmandt-Besserat’s work can be found online at https://sites.utexas.edu/dsb/. Her book ‘How Writing Came About’ was listed by American Scientist magazine as one of the 100 books that shaped science in the 20th century, and she remains an active expert on all things ‘token’.
APA, Harvard, Vancouver, ISO, and other styles
7

Reynolds, Graham J. "A Token Based Graphics System." Computer Graphics Forum 5, no. 2 (June 1986): 139–45. http://dx.doi.org/10.1111/j.1467-8659.1986.tb00283.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scott, Derek W., and Rodger Ll Wood. "The Role of Food Substitutes in a Token Economy System." British Journal of Psychiatry 150, no. 6 (June 1987): 864–67. http://dx.doi.org/10.1192/bjp.150.6.864.

Full text
Abstract:
Data from five behaviour management (token economy) units were analysed for periods of 10–20 weeks before and after the use of a food substitute (Complan®), provided when insufficient tokens had been earned to buy a full- or part-meal. The efficacy of this form of negative punishment to control disturbed and aggressive behaviour was examined. No evidence was found to suggest that the contingent use of a food substitute made any contribution to the therapeutic process.
APA, Harvard, Vancouver, ISO, and other styles
9

Engelmann, Felix, Lukas Müller, Andreas Peter, Frank Kargl, and Christoph Bösch. "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 270–90. http://dx.doi.org/10.2478/popets-2021-0070.

Full text
Abstract:
Abstract Decentralized token exchanges allow for secure trading of tokens without a trusted third party. However, decentralization is mostly achieved at the expense of transaction privacy. For a fair exchange, transactions must remain private to hide the participants and volumes while maintaining the possibility for noninteractive execution of trades. In this paper we present a swap confidential transaction system (SwapCT) which is related to ring confidential transactions (e.g. used in Monero) but supports multiple token types to trade among and enables secure, partial transactions for noninteractive swaps. We prove that SwapCT is secure in a strict, formal model and present its efficient performance in a prototype implementation with logarithmic signature sizes for large anonymity sets. For our construction we design an aggregatable signature scheme which might be of independent interest. Our SwapCT system thereby enables a secure and private exchange for tokens without a trusted third party.
APA, Harvard, Vancouver, ISO, and other styles
10

Winkler, Robin C. "Twenty Years of Token Economies in Psychiatric Institutions: Some Basic Issues." Behaviour Change 2, no. 2 (June 1985): 111–18. http://dx.doi.org/10.1017/s0813483900008925.

Full text
Abstract:
Developments over the last twenty years in the use of token economies in psychiatric institutions are reviewed. Token economies are considered in the context of two systems: the internal social system of psychiatric institutions and the mental health service system as a whole. Two themes emerge: the first concerns difficulties in establishing and maintaining token economies and the second, the impact of deinstitutionalization policies. It is argued that, although token economies remain viable for intervention goals internal to the institution, they have not been proven viable in furthering the goals of deinstitutionalization. Post-institutional programmes and community alternatives to institutions are of more current value than token economies in institutions.
APA, Harvard, Vancouver, ISO, and other styles
11

Araldo, Andrea, Song Gao, Ravi Seshadri, Carlos Lima Azevedo, Hossein Ghafourian, Yihang Sui, Sayeeda Ayaz, David Sukhin, and Moshe Ben-Akiva. "System-Level Optimization of Multi-Modal Transportation Networks for Energy Efficiency using Personalized Incentives: Formulation, Implementation, and Performance." Transportation Research Record: Journal of the Transportation Research Board 2673, no. 12 (July 19, 2019): 425–38. http://dx.doi.org/10.1177/0361198119864906.

Full text
Abstract:
The paper presents the system optimization (SO) framework of Tripod, an integrated bi-level transportation management system aimed at maximizing energy savings of the multi-modal transportation system. From the user’s perspective, Tripod is a smartphone app, accessed before performing trips. The app proposes a series of alternatives, consisting of a combination of departure time, mode, and route. Each alternative is rewarded with an amount of tokens which the user can later redeem for goods or services. The role of SO is to compute the optimized set of tokens associated with the available alternatives to minimize the system-wide energy consumption under a limited token budget. To do so, the alternatives that guarantee the largest energy reduction must be rewarded with more tokens. SO is multi-modal, in that it considers private cars, public transit, walking, car pooling, and so forth. Moreover, it is dynamic, predictive, and personalized: the same alternative is rewarded differently, depending on the current and the predicted future condition of the network and on the individual profile. The paper presents a method to solve this complex optimization problem and describe the system architecture, the multi-modal simulation-based optimization model, and the heuristic method for the online computation of the optimized token allocation. Finally it showcases the framework with simulation results.
APA, Harvard, Vancouver, ISO, and other styles
12

Mamun, Munzur-ul, A. H. M. Zadidul Karim, and Md Istiaq Mahbub. "Low Power Microcontroller Based Intelligent Token Number Speaker and Display System." International Journal of Engineering and Technology 3, no. 2 (2011): 199–202. http://dx.doi.org/10.7763/ijet.2011.v3.224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kaid, Husam, Abdulrahman Al-Ahmari, Zhiwu Li, and Reggie Davidrajuh. "Intelligent Colored Token Petri Nets for Modeling, Control, and Validation of Dynamic Changes in Reconfigurable Manufacturing Systems." Processes 8, no. 3 (March 20, 2020): 358. http://dx.doi.org/10.3390/pr8030358.

Full text
Abstract:
The invention of reconfigurable manufacturing systems (RMSs) has created a challenging problem: how to quickly and effectively modify an RMS to address dynamic changes in a manufacturing system, such as processing failures and rework, machine breakdowns, addition of new machines, addition of new products, removal of old machines, and changes in processing routes induced by the competitive global market. This paper proposes a new model, the intelligent colored token Petri net (ICTPN), to simulate dynamic changes or reconfigurations of a system. The main idea is that intelligent colored tokens denote part types that represent real-time knowledge about changes and status of a system. Thus, dynamic configurations of a system can be effectively modeled. The developed ICTPN can model dynamic changes of a system in a modular manner, resulting in the development of a very compact model. In addition, when configurations appear, only the changed colored token of the part type from the current model has to be modified. Based on the resultant ICTPN model, deadlock-free, conservative, and reversible behavioral properties, among others, are guaranteed. The developed ICTPN model was tested and validated using the GPenSIM tool and compared with existing methods from the literature.
APA, Harvard, Vancouver, ISO, and other styles
14

Srivastava, Shivam. "Smart Canteen System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4223–29. http://dx.doi.org/10.22214/ijraset.2021.34840.

Full text
Abstract:
The project “SMART CANTEEN SYSTEM” enables to register online and selects the food item from E- menu card so those customers don’t have to wait in the queue for a long time. Any customer who wants to order their food they should scanned the QR Code in the Canteen or outside the canteen and after that customer can simply register on the website and select the food items that we want and after selecting the item the token number will be generated. The token number will pop up in your screen when your item is ready and then customer can see and collect their order from the canteen, without waiting in the queue.
APA, Harvard, Vancouver, ISO, and other styles
15

Mattessich, Richard. "RECENT INSIGHTS INTO MESOPOTAMIAN ACCOUNTING OF THE 3RD MILLENNIUM b.c. — SUCCESSOR TO TOKEN ACCOUNTING." Accounting Historians Journal 25, no. 1 (June 1, 1998): 1–27. http://dx.doi.org/10.2308/0148-4184.25.1.1.

Full text
Abstract:
This paper examines from an accounting perspective recent work by Nissen et al. [1993], here regarded as an extension of the archaeological research of Schmandt-Besserat [1977, 1992] and its analysis by Mattessich [1987, 1994]. The transition from the 4th millennium b.c. to the 3rd millennium b.c. featured the use of protocuneiform and cuneiform accounting techniques to replace the older token accounting. This research reinforces the previously made hypothesis [Mattessich, 1987] that the inserting of tokens into a clay container during the last phase of token accounting corresponded to debit entries, while the impressing of tokens on the surface of the container was meant to convey the credit total of an equity. Similarly, in proto-cuneiform bookkeeping, debit entries appear again on one side while the credit total appears on the reverse side, but this time on the clay tablets. Yet, the research also leads to the hypothesis that the “closed double-entry system” of token accounting could not be maintained in the archaic bookkeeping of the subsequent period where, apparently, a debit/credit scheme was used in which only some but not all entries had counter-entries. Finally, the paper illustrates important labor production aspects of archaic bookkeeping and cost accounting which are contrasted to modern budgeting and standard costing.
APA, Harvard, Vancouver, ISO, and other styles
16

Baker, Roger. "Token economy in a hospital rehabilitation system." Journal of Advanced Nursing 13, no. 5 (September 1988): 631–39. http://dx.doi.org/10.1111/j.1365-2648.1988.tb01457.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Clark, Gillian, and Janette Bright. "THE FOUNDLING HOSPITAL AND ITS TOKEN SYSTEM." Family & Community History 18, no. 1 (April 2015): 53–68. http://dx.doi.org/10.1179/1463118015z.00000000039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

WILLIAMS, CHRIS, and MIKE PRICE. "A ward token system: the illustrated version." Journal of the Institute of Mental Subnormality (APEX) 1, no. 4 (August 26, 2009): 20–21. http://dx.doi.org/10.1111/j.1468-3156.1974.tb00058.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cooling, Jim, and Walid Al-Hasawi. "Token bus communications within a multiprocessor system." Microprocessors and Microsystems 11, no. 4 (May 1987): 187–95. http://dx.doi.org/10.1016/0141-9331(87)90337-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nedopetalski, Felipe, and Joslaine Cristina Jeske de Freitas. "Overload Control in a Token Player for a Fuzzy Workflow Management System." Revista de Informática Teórica e Aplicada 28, no. 1 (January 19, 2021): 11–21. http://dx.doi.org/10.22456/2175-2745.105893.

Full text
Abstract:
The underlying proposal of this work is to control overload of a Token Player in a Fuzzy Workflow Management System. In order to accomplish this, possibility theory is used to measure how much the Token Player can be overloaded. The model used in this work is built using Colored Petri net and the simulation is made using CPN Tools. Finally, is possible to control overload of the Token Player in a Fuzzy Workflow Management System, nevertheless more time is spent to achieve the end of activities.
APA, Harvard, Vancouver, ISO, and other styles
21

VASILEVSKAYA, L. Y. "TOKEN AS A NEW CIVIL RIGHTS OBJECT: ISSUES OF LEGAL CLASSIFICATION OF DIGITAL LAW." Actual Problems of Russian Law, no. 5 (June 18, 2019): 111–19. http://dx.doi.org/10.17803/1994-1471.2019.102.5.111-119.

Full text
Abstract:
The paper is devoted to the study of the new object of civil rights — the token (digital law). The question of the legal nature, civil law regime of digital rights is explored. The norms of the law on the concept and content of digital rights are analyzed. Consideration of a token as a digital method of fixing property rights makes it possible to consider it as a certain property value, the legal regime of which is similar to the «valuable rights» (Wertrechte) distinguished in the European continental law of the German type. It is concluded that the token performs several functions in the information system: 1) recognition of the authorized person; 2) a digital unit of the price of the share of a person’s participation in a business project, in construction investment; 3) a digital unit of the asset balance of the property of a legal entity; 4) digital equivalent of non-documentary securities; 5) the fulfillment of monetary obligations in digital form; 6) digital means of payment. Existing in the form of a digital entry in the register on the blockchain platform and performing various functions, the token as a fairly flexible digital (primarily financial) tool allows digital civilian turnover participants to perform digital «transactions» in cyberspace. The question of the possibility of qualifying the actions of users of the information system for making tokens as civil law transactions is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhen, Li Ping, Shao Wei Si, and Huan Qing Xie. "The Calculation of TTR in PROFIBUS System." Advanced Materials Research 482-484 (February 2012): 2183–87. http://dx.doi.org/10.4028/www.scientific.net/amr.482-484.2183.

Full text
Abstract:
In PROFIBUS system, we analyzed the time behavior of data exchange and token-passing, and give the TTR selection method, when each master station holding enough token time. And then we discussed the random characteristics of networks and FDL, give the formula of random behavior to calculate time, and get the TTR and the revised value of TTR in PROFIBUS system which has FDL and MS1 communication. Finally, further discussed the case of transmission errors, analyzed the impact of transmission errors to TTR and the real-time of system, and give the TTR and the revised value in this situation.
APA, Harvard, Vancouver, ISO, and other styles
23

Aldya, Aldy Putra, Alam Rahmatulloh, and Muhammad Nur Arifin. "Stateless Authentication with JSON Web Tokens using RSA-512 Algorithm." JURNAL INFOTEL 11, no. 2 (June 30, 2019): 36. http://dx.doi.org/10.20895/infotel.v11i2.427.

Full text
Abstract:
Today's technology needs are getting higher, one of the technologies that continues to grow now is Web Service (WS). WS can increase service flexibility on a system. However, security at WS is one of the things that needs attention. One effort to overcome this problem is JWT (JSON Web Token). JWT is one of the authentication mechanisms in WS, with a standard signature algorithm, HMAC SHA256, RSA-256 or ECDSA. In this research we will discuss the performance of JWT RSA-512 which is implemented on SOAP and RESTful. Because based on previous research the speed performance of the 512-bit algorithm is better, but it is not yet known if applied to JWT. The test results show that the speed of the JWT RSA-512 token on the RESTful process is superior to 24.69% compared to SOAP. Then the speed of the authentication of JWT RSA-512 tokens, RESTful is superior to 11.64% compared to SOAP. Whereas in testing the size of JWT RSA-512 generated tokens, RESTful is only 1.25% superior to SOAP.
APA, Harvard, Vancouver, ISO, and other styles
24

S, Brintha Asha. "Token Authentication based Election System with AI BOT." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (March 31, 2019): 288–95. http://dx.doi.org/10.22214/ijraset.2019.3051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Jie Xu and M. van der Schaar. "Token System Design for Autonomic Wireless Relay Networks." IEEE Transactions on Communications 61, no. 7 (July 2013): 2924–35. http://dx.doi.org/10.1109/tcomm.2013.061013.120777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Baugher, Dan, Robert Dennehy, and Andrew Varanelli. "Token versus Stored Value Card use in New York City Subway System: Observational Study over Two Time Periods." Transportation Research Record: Journal of the Transportation Research Board 1521, no. 1 (January 1996): 91–97. http://dx.doi.org/10.1177/0361198196152100113.

Full text
Abstract:
As transportation systems search for ways to improve service and reduce costs, new systems for fare payment are becoming more common. The human throughput at turnstiles of a large number of token and stored value card users was observed in the New York City subway system for 1 week and then for another week after a 6-month interval. The results suggest that magnetic card swipe read/write technologies for fare payment may, at least initially, slow down access to subway platforms and increase entry problems for users. Stored value card users took longer, on average, and showed more variability in throughput than token users. Stored value card users also experienced a fair amount of difficulty in swiping their cards through turnstile readers, although the difficulties decreased after 6 months. Users of cards also differed from token users on a number of demographic variables. With about 50 percent of the ridership served by the new system at the time of the study, the most consistent finding across both study phases was a tendency for males to use the new card-based system more often than females and for Spanish riders to use cards less often than other riders. Possible problems with the voluntary adoption of cards by riders and the need for marketing efforts are also discussed in light of the inability of cards to offer any improvements in terms of ease of use or turnstile entry speed over that of token systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Klimm, Alexander, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, and Jürgen Becker. "A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices." International Journal of Reconfigurable Computing 2011 (2011): 1–19. http://dx.doi.org/10.1155/2011/820454.

Full text
Abstract:
Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.
APA, Harvard, Vancouver, ISO, and other styles
28

Ribalda, R., G. G. de Rivera, A. de Castro, and J. Garrido. "A mobile biometric system-on-token system for signing digital transactions." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 13–19. http://dx.doi.org/10.1109/msp.2010.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Schiemer, Greg. "Improvising Machines: Spectral Dance and Token Objects." Leonardo Music Journal 9 (December 1999): 107–14. http://dx.doi.org/10.1162/096112199750316893.

Full text
Abstract:
The author examines the evolution of a system he developed for the creation of two compositions, Spectral Dance and Token Objects, against a backdrop of other composers who have built their own electronic systems. This provides a window on the gradual transformation that has taken place in the way music has been created over the last three decades.
APA, Harvard, Vancouver, ISO, and other styles
30

Liu, Yu, and Ji Ke Gao. "Research and Test on Token Bucket Algorithm in LTE System." Applied Mechanics and Materials 543-547 (March 2014): 2063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2063.

Full text
Abstract:
Token bucket algorithm is a common algorithm used for traffic shaping and rate limiting. In LTE (Long Term Evolution) system, RRC (Radio Resource Control) layer configures priority, PBR (prioritisedBitRate), and BSD (bucketSizeDuration) for every logical channel so that lower priority channel can also get resource and bursting data can be sent in a short time. This paper firstly introduces application of token bucket algorithm in LTE system. And the test procedure is designed to test the algorithm. Test result shows that the algorithm is used in LTE system successfully. The algorithm has been used in TD-LTE radio frequency conformance testing instrument.
APA, Harvard, Vancouver, ISO, and other styles
31

Singh, Mr Anurag, and Dr Amod Tiwari. "An Executive Approach to Achieve Mutual Exclusion in Distributed Data using Topology and Association Rule." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4537–42. http://dx.doi.org/10.24297/ijct.v13i6.2515.

Full text
Abstract:
In this paper, a new approach is being proposed to achieve mutual exclusion in distributed system using computer network and topology of nth nodes. In this executive approach nodes communicate among themselves using message passing technique. In this executive approach, distributed system with n nodes is logically partitioned into number of sub distributed system having only m½ nodes, where m is obtained by adding a minimum number in n to make it next perfect square number only if n is not a perfect square. Proposed algorithm is a Token based approach and achieves token optimally in 2 messages only for the best case and in worst case a node achieves token in n messages only.
APA, Harvard, Vancouver, ISO, and other styles
32

Takagi, R., C. J. Goodman, and C. Roberts. "Modelling passenger flows at a transport interchange using Petri nets." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 217, no. 2 (March 1, 2003): 125–34. http://dx.doi.org/10.1243/095440903765762869.

Full text
Abstract:
Modelling passenger flows within a transport interchange is a compromise between computational speed and accuracy, especially if the model is to be embedded within an optimization procedure for managing the effects of disrupted traffic. Petri nets offer the possibility of the standardized representation of a concurrent dynamic system. Such a representation consists of a network formed by places that are linked together by arcs and transitions, and tokens that move around in this network. Using coloured Petri nets (CPNs) allows information to be associated with each token, such as the number of passengers represented by the token, the destinations of subgroups of those passengers and data related to measures such as accumulated passenger transit times. Practicalities such as the variation of walking speeds between passengers and the restricted capacity of features of the interchange infrastructure, such as escalators, can also be incorporated. Furthermore, the model is capable of being extended to represent the transport services themselves, at least within a reasonable area outside the interchange.
APA, Harvard, Vancouver, ISO, and other styles
33

Subramanian, Hemang. "Security tokens: architecture, smart contract applications and illustrations using SAFE." Managerial Finance 46, no. 6 (August 13, 2019): 735–48. http://dx.doi.org/10.1108/mf-09-2018-0467.

Full text
Abstract:
Purpose Blockchain technologies have pervaded modern crowdfunding and capital sourcing through a variety of financial instruments implemented as smart contracts. Smart contracts provide a unique mechanism not only to create a unique one-of-a-type financial instrument, but also to enable unique innovations atop existing financial instruments due to underlying efficiencies. The smartness comes from the flexibility that programs provide which can create extremely unique financial instruments that are often complex to implement, yet easy to create, maintain through versioning, trade and destroy. The purpose of this paper is to describe the security token architecture as an application of smart contracts. Further, the author illustrates the implementation and design of a commonly used financial instrument known as Simple Agreement for Future Equity (SAFE) using the security token architecture proposed and smart contract functionality. The author then models the transaction using relational algebra, and, models the utility maximization. The author shows how on account of reduced information asymmetry between the investors and SAFE users (i.e. startups) utility is positive when smart contract-based security tokens are deployed for each state in the SAFE contract. Design/methodology/approach Using an existing well-adopted instrument called a SAFE contract, the author illustrates the architecture of a smart contract-based security token system. The author illustrates how different components of a SAFE contract can be implemented as a smart contract and discusses the advantages and disadvantages of applying blockchain-based smart contracts to design SAFE instruments. The author deploys two methods: a state space diagram to explain state transitions and a utility model to explain the utilities. Findings The key findings of this research study are the design of a security token architecture, which can be used to convert any the physical or contract-based financial instrument to a smart contract that runs on the blockchain. However, there are limitations to the implementation of the same which can be overcome. The model illustrates the positive utilities derived for all economic actors, i.e. the contractors, the utility providers, etc., in the market. Originality/value This paper is an original paper. For the very first time, the author explored the architecture of a security token system. Using a well-known financial instrument, namely the SAFE, the author describes various components, e.g. the four contracts that form SAFE and then model the utilities for the system.
APA, Harvard, Vancouver, ISO, and other styles
34

Sran, Sandeep K., and John C. Borrero. "ASSESSING THE VALUE OF CHOICE IN A TOKEN SYSTEM." Journal of Applied Behavior Analysis 43, no. 3 (September 2010): 553–57. http://dx.doi.org/10.1901/jaba.2010.43-553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Weaver, Alfred C., and M. Alex Colvin. "A real-time messaging system for token ring networks." Software: Practice and Experience 17, no. 12 (December 1987): 885–97. http://dx.doi.org/10.1002/spe.4380171203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Cai, Tianqi, H. J. Cai, Hao Wang, Xiji Cheng, and Linfeng Wang. "Analysis of Blockchain System With Token-Based Bookkeeping Method." IEEE Access 7 (2019): 50823–32. http://dx.doi.org/10.1109/access.2019.2911124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, J. H., W. H. Tseng, M. J. Ding, Y. S. Su, and L. C. Wu. "VirtualTalker: an online multimedia system on token passing networks." IEEE Transactions on Consumer Electronics 39, no. 3 (1993): 609–18. http://dx.doi.org/10.1109/30.234643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Nguyen, Thien, Huu Nguyen, and Phuoc Tran. "Mixed-Level Neural Machine Translation." Computational Intelligence and Neuroscience 2020 (November 29, 2020): 1–7. http://dx.doi.org/10.1155/2020/8859452.

Full text
Abstract:
Building the first Russian-Vietnamese neural machine translation system, we faced the problem of choosing a translation unit system on which source and target embeddings are based. Available homogeneous translation unit systems with the same translation unit on the source and target sides do not perfectly suit the investigated language pair. To solve the problem, in this paper, we propose a novel heterogeneous translation unit system, considering linguistic characteristics of the synthetic Russian language and the analytic Vietnamese language. Specifically, we decrease the embedding level on the source side by splitting token into subtokens and increase the embedding level on the target side by merging neighboring tokens into supertoken. The experiment results show that the proposed heterogeneous system improves over the existing best homogeneous Russian-Vietnamese translation system by 1.17 BLEU. Our approach could be applied to building translation bots for language pairs with different linguistic characteristics.
APA, Harvard, Vancouver, ISO, and other styles
39

Rosenberg, Michael S. "Maximizing the Effectiveness of Structured Classroom Management Programs: Implementing Rule-Review Procedures with Disruptive and Distractible Students." Behavioral Disorders 11, no. 4 (August 1986): 239–48. http://dx.doi.org/10.1177/019874298601100405.

Full text
Abstract:
Structured classroom management systems such as token economies have been commonly employed in special education, remedial, and regular classrooms for the reduction of disruptive and socially inappropriate student behaviors. Still, many well-intentioned management plans do not achieve maximum effectiveness because several key prerequisites to a program's success are overlooked. The present study assessed the relative strength of daily rule review and rehearsal on student behavior when such procedures were added to a token economy. The token program was designed to increase appropriate classroom behaviors of disruptive boys attending a multicategorical resource room. Results indicated that a brief daily review of the classroom rules can maximize the effectiveness of a well-planned and reliably implemented classroom management system. Compared to the token economy alone condition, the token economy with the daily review of the classroom rules resulted in an overall time-on-task improvement of 12% and a 50% reduction in the instances of disruptive talkouts. Additionally, it was found that the daily review of rules provided a greater number of opportunities to respond to be presented during lessons. Explanations and implications of these results are discussed in terms of instructional utilization and the need for planning for generalization and covertization.
APA, Harvard, Vancouver, ISO, and other styles
40

Merriman, William J., Beth E. Barnett, and Eric S. Jarry. "Improving Fitness of Dually Diagnosed Adults." Perceptual and Motor Skills 83, no. 3 (December 1996): 999–1004. http://dx.doi.org/10.2466/pms.1996.83.3.999.

Full text
Abstract:
Lack of prior research led to this study on the effect of a physical fitness program combined with a token economy reinforcement system on the physical fitness of 22 dually diagnosed adults of a day-treatment program. Between pre- and posttests, subjects participated in a 12-wk. training program of 40 to 45 min. of exercise three times a week. Subjects received tokens after each session in which they participated actively. Analysis indicated significant differences between pre- and posttest scores for muscular endurance, cardiorespiratory endurance, and flexibility but not for body composition.
APA, Harvard, Vancouver, ISO, and other styles
41

Liang, Geng, and Xin An. "Simulation analysis of communication performance of PROFIBUS in single and multiple master mode." Measurement and Control 53, no. 7-8 (June 10, 2020): 1238–49. http://dx.doi.org/10.1177/0020294020927420.

Full text
Abstract:
With the application of digital information technology and communication technology, industrial intelligence and integration also began to develop rapidly, and the importance of the research on bus communication in industrial control communication also increased. As the first international bus standard, PROFIBUS has been widely used in the field of industrial control; in recent years, it was mainly used to connect devices to the control layer and convert data through token transmission. Based on the understanding of the transmission mechanism of PROFIBUS fieldbus protocol, this article carries out a simulation study on its communication performance. Through analysis of the data link layer, changing the target token cycle time (high and low priority) and random setting each site message number, as well as the number of master station and slave station, how the main token latency and packet loss rate and efficiency of bus affect the change of performance parameters was observed. For multiple communication systems, the relationship between the address value on the main token ring and transport performance is found by experiments on the site address value on the main token ring and the target token cycle time value. Finally, the scheduling algorithm is applied to the communication scheduling of PROFIBUS fieldbus. The results confirm that the scheduling algorithm has better transmission efficiency than the traditional MAC media access protocol under the condition that the load rate does not exceed 100%, which makes up for the shortcomings of the original PROFIBUS bus system and makes the communication performance better.
APA, Harvard, Vancouver, ISO, and other styles
42

Karandikar, Nikita, Antorweep Chakravorty, and Chunming Rong. "Blockchain Based Transaction System with Fungible and Non-Fungible Tokens for a Community-Based Energy Infrastructure." Sensors 21, no. 11 (May 31, 2021): 3822. http://dx.doi.org/10.3390/s21113822.

Full text
Abstract:
Renewable energy microgeneration is rising leading to creation of prosumer communities making it possible to extract value from surplus energy and usage flexibility. Such a peer-to-peer energy trading community requires a decentralized, immutable and access-controlled transaction system for tokenized energy assets. In this study we present a unified blockchain-based system for energy asset transactions among prosumers, electric vehicles, power companies and storage providers. Two versions of the system were implemented on Hyperledger Fabric. Assets encapsulating an identifier or unique information along with value are modelled as non-fungible tokens (NFT), while those representing value only are modelled as fungible tokens (FT). We developed the associated algorithms for token lifecycle management, analyzed their complexities and encoded them in smart contracts for performance testing. The results show that performance of both implementations are comparable for most major operations. Further, we presented a detailed comparison of FT and NFT implementations based on use-case, design, performance, advantages and disadvantages. Our implementation achieved a throughput of 448.3 transactions per second for the slowest operation (transfer) with a reasonably low infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
43

Maurel, Denis, and Brigitte Le Pévédic. "The syntactic prediction with token automata: application to HandiAS system." Theoretical Computer Science 267, no. 1-2 (September 2001): 121–29. http://dx.doi.org/10.1016/s0304-3975(00)00299-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kimura, G., and Y. Takahashi. "Diffusion Approximation for a Token Ring System with Nonexhausive Service." IEEE Journal on Selected Areas in Communications 4, no. 6 (September 1986): 794–801. http://dx.doi.org/10.1109/jsac.1986.1146408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

WILLIAMS, CHRIS, and MIKE PARICE. "EARLY DAYS: FIRST STEPS TO A WARD-BASED TOKEN SYSTEM." Journal of the Institute of Mental Subnormality (APEX) 1, no. 3 (August 26, 2009): 20–22. http://dx.doi.org/10.1111/j.1468-3156.1973.tb00041.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Yu, Stevenson. "Evaluating Philippine Students’ Class Participation with a Token Currency System." Recoletos Multidisciplinary Research Journal 5, no. 2 (January 31, 2018): 17–34. http://dx.doi.org/10.32871/rmrj1705.02.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mala, R. Parimala, and C. Jayakumar Kumar. "Providing Authentication by Using Biometric Multimodal Framework for Cloud Computing." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (September 1, 2015): 591. http://dx.doi.org/10.11591/tijee.v15i3.1578.

Full text
Abstract:
Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication system. Now in this current tech world, everyone needs security everywhere to protect our personal gadgets. So to keep it secured, biometric based approach can be applied for better convenience and ease of use for the user. In this paper, a novel hybrid multimodal approach for ear recognition and finger print recognition has been presented for better robustness and efficiency which can be applied in various fields of applications like authentication in banking transactions. Biometric based human recognition is rapidly gaining popularity due to breached of traditional security systems and the lowering cost of sensors. This paper comprehensively reviews multimodal recognition using ear pattern and finger print data, it is concluded that further research should investigate fast and fully automatic ear-finger print multimodal systems robust to occlusions and deformations.
APA, Harvard, Vancouver, ISO, and other styles
48

Sunitha, Dr K. V. N., and P. Sunitha Devi. "Text Normalization for Telugu Text-to-Speech Synthesis." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 2 (October 10, 2013): 2241–49. http://dx.doi.org/10.24297/ijct.v11i2.1176.

Full text
Abstract:
Most areas related to language and speech technology, directly or indirectly, require handling of unrestricted text, and Text-to-speech systems directly need to work on real text. To build a natural sounding speech synthesis system, it is essential that the text processing component produce an appropriate sequence of phonemic units corresponding to an arbitrary input text. A novel approach is used, where the input text is tokenized, and classification is done based on token type. The token sense disambiguation is achieved by the semantic nature of the language and then the expansion rules are applied to get the normalized text. However, for Telugu language not much work is done on text normalization. In this paper we discuss our efforts for designing a rule based system to achieve text normalization in the context of building Telugu text-to-speech system.
APA, Harvard, Vancouver, ISO, and other styles
49

Cockell, Robert, and Basel Halak. "On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics." Cryptography 4, no. 2 (April 7, 2020): 12. http://dx.doi.org/10.3390/cryptography4020012.

Full text
Abstract:
This paper proposes a portable hardware token for user’s authentication; it is based on the use of keystroke dynamics to verify users biometrically. The proposed approach allows for a multifactor authentication scheme, in which a user cannot be granted access unless they provide a correct password on a hardware token and their biometric signature. The latter is extracted while the user is typing their password. This paper explains the design rationale of the proposed system and provides a comprehensive insight in the development of a hardware prototype of the same. The paper also presents a feasibility study that included a systematic analysis based on training data obtained from 32 users. Our results show that dynamic keystroke can be employed to construct a cost-efficient solution for biometric user authentication with an average error rate of 4.5%.
APA, Harvard, Vancouver, ISO, and other styles
50

Malanga, R. "Fire Protection Systems Development to Protect Subway System Token Booth Clerks from Incendiary Attack." Journal of Fire Protection Engineering 3, no. 4 (January 1, 1991): 109–22. http://dx.doi.org/10.1177/104239159100300401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography