Optimizing process of check-in and security check at airport terminals

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Need for an Implant Identification Card at Airport Security Check

BACKGROUND Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport securi...

متن کامل

Information Security Health Check

Organization’s dependency on information systems and the related resources has led to an increased vulnerability to computer crime and abuse. It is therefore of the utmost importance that senior management are aware of the importance of information security because they are ultimately accountable for the organization’s success. Unfortunately, no effective, easy to use tool is available to diagn...

متن کامل

Modeling Security-Check Queues

Motivated by the waiting lines between the US-Canadian border-crossings, we investigate a security-check system with both security and customer service goals. In such a system, every customer has to be inspected by the first stage inspector but only a proportion of customers need to go through the second stage for further inspection. This "further inspection proportion", affecting both security...

متن کامل

Airport Check-In Optimization by IP and Simulation in Combination

The check-in area of airport terminal is one of the busiest sections at airports at certain periods. The passengers are subjected to queues and delays during the check-in process. These delays and queues are due to constraints in the capacity of service facilities. In this project, the airport terminal is decomposed into several check-in areas. The airport check-in scheduling problem requires b...

متن کامل

Server Security: A Reality Check

Server security is paramount to any organization. All too often, network defenses focus entirely on the perimeter, leaving networks looking like pieces of candy—having a hard outer shell and a soft gooey inside. In today's threat landscape, defenders must operate under the presumption of compromise. Attacks involving spearphishing, social engineering, weak bring your own device (BYOD) security,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: MATEC Web of Conferences

سال: 2018

ISSN: 2261-236X

DOI: 10.1051/matecconf/201823601003