Optimizing process of check-in and security check at airport terminals
نویسندگان
چکیده
منابع مشابه
The Need for an Implant Identification Card at Airport Security Check
BACKGROUND Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport securi...
متن کاملInformation Security Health Check
Organization’s dependency on information systems and the related resources has led to an increased vulnerability to computer crime and abuse. It is therefore of the utmost importance that senior management are aware of the importance of information security because they are ultimately accountable for the organization’s success. Unfortunately, no effective, easy to use tool is available to diagn...
متن کاملModeling Security-Check Queues
Motivated by the waiting lines between the US-Canadian border-crossings, we investigate a security-check system with both security and customer service goals. In such a system, every customer has to be inspected by the first stage inspector but only a proportion of customers need to go through the second stage for further inspection. This "further inspection proportion", affecting both security...
متن کاملAirport Check-In Optimization by IP and Simulation in Combination
The check-in area of airport terminal is one of the busiest sections at airports at certain periods. The passengers are subjected to queues and delays during the check-in process. These delays and queues are due to constraints in the capacity of service facilities. In this project, the airport terminal is decomposed into several check-in areas. The airport check-in scheduling problem requires b...
متن کاملServer Security: A Reality Check
Server security is paramount to any organization. All too often, network defenses focus entirely on the perimeter, leaving networks looking like pieces of candy—having a hard outer shell and a soft gooey inside. In today's threat landscape, defenders must operate under the presumption of compromise. Attacks involving spearphishing, social engineering, weak bring your own device (BYOD) security,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: MATEC Web of Conferences
سال: 2018
ISSN: 2261-236X
DOI: 10.1051/matecconf/201823601003