Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott
Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.
Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...
Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)
Molloy, Ian; Li, Jiangtao; Li, Ninghui
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.
Cahill, Timothy P.
In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…
The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…
Nicklin, Julie L.
Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)
Fox, Linda Kirk
This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…
Tamura, Shinsuke; Yanase, Tatsuro
This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.
Yang, Bijou; James, Simon; Lester, David
American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.
Androulaki, Elli; Bellovin, Steven
Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.
Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...
Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN
This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...
Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David
The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…
Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.
Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr
Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…
A credit card is a convenient method of payment, but it does carry risks. The enormous ... Identity theft and the exponential ... Unique Security Features of a Credit Card with the Aim of Identifying ..... technology in an attempt to try and curb the.
Lydia L. Gan; Ramin Cooper Maysami
This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...
Schapira, D V; Kumar, N B; Clark, R A; Yag, C
Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...
Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom
The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...
Spinella, Marcello; Yang, Bijou; Lester, David
Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.
Rybka, Kathryn M.
Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)
Yang, Bijou; Lester, David
In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.
Ahmet Faruk Aysan; L. Yildiz
The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...
Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S
This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.
Mirjana Pejić Bach
Full Text Available Credit cards have become one of the major ways for conducting cashless transactions. However, they have a long term impact on the well being of their owner through the debt generated by credit card usage. Credit card issuers approve high credit limits to credit card owners, thereby influencing their credit burden. A system dynamics model has been used to model behavior of a credit card owner in different scenarios according to the size of a credit limit. Experiments with the model demonstrated that a higher credit limit approved on the credit card decreases the budget available for spending in the long run. This is a contribution toward the evaluation of action for credit limit control based on their consequences.
McCall, Michael; Eckrich, Donald W
Researchers have suggested there may be sex differences in attitudes towards credit card possession and use. Undergraduates, 41 men and 41 women, completed a survey regarding their attitudes towards credit, credit card use, and repayment. Analysis indicated sex played a significant moderating role between number of credit cards used and the importance of paying off monthly balances. Women possessed more credit cards than men and engaged in more frequent shopping. Number of credit cards increased with paying off of monthly balances. Data are discussed in terms of the importance of managing credit card debt in an increasingly cashless society.
... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...
... Certain Credit Card Complaint Data AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of... Bureau plans to exercise its discretion to publicly disclose certain credit card complaint data that do not include personally identifiable information. The Bureau receives credit card complaints from...
... Regarding Credit Card Market AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice and request for information. SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and Disclosure Act of... review (Review) of the consumer credit card market, within the limits of its existing resources available...
Joo, S.-H.; Grable, J. E.; Bagwell, D. C.
At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…
This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...
Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people. On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia. A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.
Full Text Available Kisan Credit Card (KCC has now been regarded as the only medium of short-term credit for agriculture. The Kisan Credit Card (KCC scheme was introduced by the Finance Minister in his budget speech in the year 1998-99. From the year 1998-99, the scheme was implemented by public sector commercial banks, RRBs (Regional Rural Banks and cooperative banks in the country. It has emerged as an innovative credit distribution system to meet the production credit requirements of the farmers in a timely and easy manner. The present paper is aimed to study role of Kisan Credit Card in the rural credit facilitation in India.
Full Text Available Credit card as a kind of advanced means of payment and the new way of consumer credit in the world widely, but in our country is faced with some problems, such as their per capita spending is low, open the card number is small, motionless bank card is a lot. In this paper, using the Logit model to analyze the Anshan city in Liaoning province consumer credit card usage. And combined with empirical analysis to provide banking management Suggestions and marketing countermeasures, including targeted to provide different kinds of credit card.
Oct 27, 2012 ... Simiyu, Justo Simiyu - Department of Business Management, Chuka. University College ... Key words: Debit cards, credit cards, commercial banks, Kenya. Introduction ..... saving at once convenience without proper planning.
About three quarters of credit card accounts attract interest charges. In the US, credit card debt is $951.7 billion of a total of $2,539.7 billion of consumer credit. In the UK, credit card debt is £55.1 billion of £174.4 billion of consumer credit. The 2005 US Bankruptcy Abuse Prevention and Consumer Protection Act and the 2003 UK Treasury Select Committee's report require lenders to collect a minimum payment of at least the interest accrued each month. Thus people are protected from the ef...
Spinella, Marcello; Lester, David; Yang, Bijou
In a sample of 139 community residents, credit card ownership was associated with age, sex, income, attitudes toward credit cards and toward money, and scores on a verbal measure of prefrontal cortical dysfunction, supporting a neuroeconomic approach to economic decision-making.
Martins, Guilherme Silveira; FGV-EAESP; Martins, Michele Esteves; FGV-EAESP; Di Serio, Luiz Carlos; FGV-EAESP; Csillag, João Mário; FGV-EAESP; Santos, Camila Aparecida; Freeddom Tecnologia e Serviços S.A.
This paper discusses the value creation sources of Mobile Payment concept into the Credit Card Chain. A case-study was developed based on the Transaction Cost Theory, Value Chain Analysis, RB V, Schumpeterian Innovation, and Strategic Network Theory. The results illustrate the technology potential to modify the configuration of Credit Card chain.
Awanis, Sandra; Cui, Charles Chi
Purpose â€“ Prior research suggests that payment mechanisms are imbued with cues that affect purchase evaluation and future spending behavior. Credit cards are distinguished from other payment mechanisms as they elicit greater willingness to spend, prompt weaker recollections of past credit expenses and overvaluation of available funds â€“ a phenomena the authors call as â€œcredit card effect.â€� Little is known about the individualsâ€™ differential exposure to the credit card effect. The pur...
Smith, Temple Day
Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…
Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom
RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.
Pinto, M B; Parente, D H; Palmer, T S
Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use.
Full Text Available College students frequently show they have little skill when it comes to using a credit card in a responsible manner. This article deals with this issue in an emerging market and in a pioneering manner. University students (n = 769 in São Paulo, Brazil’s main financial center, replied to a questionnaire about their credit card use habits. Using Logit models, associations were discovered between personal characteristics and credit card use habits that involve financially risky behavior. The main results were: (a a larger number of credit cards increases the probability of risky behavior; (b students who alleged they knew what interest rates the card administrators were charging were less inclined to engage in risky behavior. The results are of interest to the financial industry, to university managers and to policy makers. This article points to the advisability, indeed necessity, of providing students with information about the use of financial products (notably credit cards bearing in mind the high interest rates which their users are charged. The findings regarding student behavior in the use of credit cards in emerging economies are both significant and relevant. Furthermore, financial literature, while recognizing the importance of the topic, has not significantly examined the phenomenon in emerging economies.
.... This goes a long way toward improving and streamlining the contracting process. One of the key reform initiatives in streamlining the process is the implementation of the Government-wide credit card program...
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
We propose and experimentally demonstrate an angle-multiplexing based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we choose to shine one at a time a number of broadband lightsources, each at different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam is diffracted and separated in space. In this way, the number of pixels of each color plane is investigated. Then we apply a feed forward back propagation neural network configuration to separate the counterfeit credit card from the real one. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, a 3-layer neural network, and a notebook computer can identify all 69 counterfeit credit cards from eight real credit cards.
.... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...
Macdonald, S A; Wells, S L; Giesbrecht, N; West, P M
In 1994, regulatory changes were introduced in Ontario, Canada, permitting the purchase of alcoholic beverages with credit cards at government-operated liquor stores. Two objectives of this study were: (1) to compare the characteristics of credit card shoppers with non credit card shoppers at liquor stores, and (2) to assess whether changes occurred in alcohol consumption patterns among shoppers following the introduction of credit cards. Random digit dialing was used to interview 2,039 telephone participants prior to the introduction of credit cards (Time 1); 1,401 of these subjects were contacted 1 year later (Time 2). Independent sample t tests were used to compare credit card shoppers with shoppers not using credit cards, and paired t tests were performed to assess whether drinking behaviors changed from Time 1 to Time 2. The credit card shoppers were more likely than the non credit card shoppers to be highly educated (p Credit card shoppers drank an average of 6.3 drinks over the previous week compared with 4.0 drinks among non credit card shoppers (p credit card shoppers dropped from 6.7 drinks at Time 1 to 6.3 at Time 2 (NS), credit card shoppers reported drinking significantly more often after credit cards were introduced (p credit cards may not present public health problems since significant increases in alcohol consumption among credit card shoppers were not found.
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS KINGPIN SANCTIONS REGULATIONS Interpretations § 598.409 Credit extended and cards issued by U.S... existing credit agreements, including, but not limited to, charge cards, debit cards, or other credit...
Druedahl, Jeppe; Jørgensen, Casper Nordal
This paper addresses the credit card debt puzzle using a generalization of the buffer-stock consumption model with long-term revolving debt contracts. Closely resembling actual US credit card law, we assume that card issuers can always deny their cardholders access to new debt, but that they cannot...... to simultaneously hold positive gross debt and positive gross assets even though the interest rate on the debt is much higher than the return rate on the assets. Including a risk of being excluded from new borrowing which is positively correlated with unemployment, we are able to simultaneously explain...
Williams, Dylan; Waterwall, Brian; Giardelli, Tiffany
It is no surprise that the amount of credit card debt and outstanding loan balances of college students is increasing every year. College students are heavily targeted by credit companies through the use of e-mail, campus booths, and standard mail. The reason for these solicitations is because of the soaring expense levels of college students and…
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS TRAFFICKING SANCTIONS REGULATIONS Interpretations § 536.409 Credit extended and cards issued by U... any existing credit agreements, including, but not limited to, charge cards, debit cards, or other...
... 49 Transportation 5 2010-10-01 2010-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... LIBERIAN REGIME OF CHARLES TAYLOR SANCTIONS REGULATIONS Interpretations § 593.409 Credit extended and cards..., including, but not limited to, charge cards, debit cards, or other credit facilities issued by a U.S...
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Credit and charge card applications and... required under this section on or with a solicitation or an application to open a credit or charge card... offer by the card issuer to open a credit or charge card account that does not require the consumer to...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 546.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... ZIMBABWE SANCTIONS REGULATIONS Interpretations § 541.408 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 548.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... BALKANS STABILIZATION REGULATIONS Interpretations § 588.409 Credit extended and cards issued by U.S... not limited to, charge cards, debit cards, or other credit facilities issued by a U.S. financial...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... TERRORISM SANCTIONS REGULATIONS Interpretations § 594.410 Credit extended and cards issued by U.S. financial... agreements, including, but not limited to, charge cards, debit cards, or other credit facilities issued by a...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 542.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U...'IVOIRE SANCTIONS REGULATIONS Interpretations § 543.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... DEMOCRATIC REPUBLIC OF THE CONGO SANCTIONS REGULATIONS Interpretations § 547.409 Credit extended and cards..., including, but not limited to, charge cards, debit cards, or other credit facilities issued by a U.S...
Full Text Available Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one. Due to the increase of credit card usage, the frauds associated with this have also increased. There are a lot of approaches used to detect the frauds. In this paper, behavior based classification approach using Support Vector Machines are employed and efficient feature extraction method also adopted. If any discrepancies occur in the behaviors transaction pattern then it is predicted as suspicious and taken for further consideration to find the frauds. Generally credit card fraud detection problem suffers from a large amount of data, which is rectified by the proposed method. Achieving finest accuracy, high fraud catching rate and low false alarms are the main tasks of this approach.
Porkess, Roger; Mason, Stephen
This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)
Congress passed legislation last week that would shield students and other consumers from sudden spikes in interest rates and fees, but that could make it harder for young people to access credit to pay for college. The legislation would extend broad new consumer protections to all credit-card holders, offering special protections to college…
This understanding gave birth to the Hierarchical Temporal Memory (HTM) which holds a lot of promises in the area of time-series prediction and anomaly detection problems. This paper demonstrates the behaviour of an HTM model with respect to its learning and prediction of online credit card fraud. The model was ...
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.
The fine print in most credit card agreements states that any dispute with a credit card issuer must be resolved through arbitration. The author lays out potential advantages and disadvantages for the consumer.
Akin, Guzin Gulsun; Aysan, Ahmet Faruk; Kara, Gazi Ishak; Yildiran, Levent
The attempts to explain the high and sticky credit card rates have given rise to a vast literature on credit card markets. This paper endeavors to explain the rates in the Turkish market using measures of non-price competition. In this market, issuers compete monopolistically by differentiating their credit card products. The fact that credit cards and all other banking services are perceived as a bundle by consumers allows banks to deploy also bank level characteristics to differentiate thei...
Williams, Rebecca S; Ribisl, Kurt M
Most Internet cigarette sales have violated taxation and youth access laws, leading to landmark 2005 agreements with credit card companies, PayPal, and private shippers (United Parcel Service, Federal Express, DHL) to cease participation in these transactions. Despite their promise at the time, loopholes allowed for check payment and U.S. Postal Service (USPS) shipping. This study assessed actual vendor compliance with the payment and shipping bans using a purchase survey. In late 2007 and early 2008, an adult buyer attempted to order cigarettes from the 97 most popular Internet cigarette vendors (ICVs) using banned payment and shipping methods. When banned payment or shipping methods were unavailable, purchases were attempted with alternate methods (e.g., checks, e-checks, USPS). Twenty-seven of 100 orders were placed with (banned) credit cards; 23 were successfully received. Seventy-one orders were placed with checks (60 successfully received). Four orders were delivered using banned shippers; 79 of 83 successfully received orders were delivered by the USPS. About a quarter of ICVs violated the payment ban, others adapted by accepting checks. Most vendors complied with the shipping ban, perhaps because USPS was an easy substitute shipping option. Better enforcement of the bans is needed; the 2009 Prevent All Cigarette Trafficking Act closed the USPS loophole by making cigarettes nonmailable material; evaluation of enforcement efforts and adaptations by vendors are needed. These sorts of bans are a promising approach to controlling the sale of restricted goods online.
... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... Credit extended and cards issued by U.S. financial institutions. Section 587.201 on dealing in property... institutions from performing under any existing credit agreements, including, but not limited to, charge cards...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... agreements, including, but not limited to, charge cards, debit cards, or other credit facilities issued by a... OF MASS DESTRUCTION PROLIFERATORS SANCTIONS REGULATIONS Interpretations § 544.409 Credit extended and...
The role of credit cards in personal finance has increased dramatically over the past two decades. Complex interest computation methods and additional fees often boost the price of credit card loans and help make credit cards the most profitable type of consumer loan for many lenders. (Author/JOW)
McCall, Michael; Trombetta, Jessica; Gipe, Aimee
Prior research had suggested that individuals would estimate higher product values and even tip more in the presence of credit cues. In the absence of a clear theoretical interpretation of this credit card effect we propose that this tendency is an impression management strategy such that credit cue exposure influences perceptions of the self and focuses attention on individual wealth. Thus, in the presence of others, credit cues serve to enhance images of the self. Preliminary data in support of this alternative theoretical perspective are presented.
Omar, Nor Asiah; Rahim, Ruzita Abdul; Wel, Che Aniza Che; Alam, Syed Shah
Purpose: This study aims to examine the factors that influence credit card misuse among working adults in Klang Valley, Malaysia. The relationship among self-esteem, materialism, impulsive buying, budget constraint, compulsive buying and credit card misuse are explored in this study. Design/methodology/approach: A total of 186 questionnaires was collected via convenience sampling from credit card users of working adults in Malaysia. A structural equation model that assesses the relationship b...
Gulati, Aman; Dubey, Prakash; MdFuzail, C.; Norman, Jasmine; Mangayarkarasi, R.
The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.
Crook, J.; Bellotti, T.
Based on UK data for major retail credit cards, we build several models of Loss Given Default based on account level data, including Tobit, a decision tree model, a Beta and fractional logit transformation. We find that Ordinary Least Squares models with macroeconomic variables perform best for forecasting Loss Given Default at the account and portfolio levels on independent hold-out data sets. The inclusion of macroeconomic conditions in the model is important, since it provides a means to m...
Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan
CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.
Kidwell, Blair; Turrisi, Robert
Examines cognitions relevant to credit card decision making in college-aged participants (N=304). Assesses measures of beliefs, attitudes, and behavioral alternatives toward acquiring a credit card. Identifies a multivariate model predicting college student financial development of the attitudes and behavioral tendencies of acquiring a new card.…
Nor Asiah Omar
Full Text Available Purpose: This study aims to examine the factors that influence credit card misuse among working adults in Klang Valley, Malaysia. The relationship among self-esteem, materialism, impulsive buying, budget constraint, compulsive buying and credit card misuse are explored in this study. Design/methodology/approach: A total of 186 questionnaires was collected via convenience sampling from credit card users of working adults in Malaysia. A structural equation model that assesses the relationship between the proposed variables is tested using AMOS 20. Findings: The findings reveal that budget constraints, impulsive buying and materialism have a statistically significant influence on compulsive buying. In terms of credit card misuse, it is influenced negatively by self-esteem while positively by compulsive buying. Originality/value: Despite vast research on compulsive buying and credit card misuse, very few studies have examined it in the non-Western context.
Full Text Available In this study, we use a measure of financial literacy that includes both a test score of actual financial literacy and a self-rating of perceived financial literacy to investigate how financial literacy affects five credit card behaviors: (1 always paying a credit card balance in full; (2 carrying over a credit card balance and being charged interest; (3 making only a minimum payment on a credit card balance; (4 being charged a fee for a late payment; and (5 being charged a fee for exceeding a credit limit. Probit analysis was used to assess each behavior with a large nationally representative sample of U.S. adults (N = 28,146 divided into groups to reflect the five major decades in the adult life cycle (18–29; 30–39; 40–49; 50–59; and 60–69 and older. Perceived financial literacy was found to be a stronger predictor of less costly practices in credit card use than actual financial literacy for the five credit card behaviors and across each of the five age groups. The study also shows that the combination of the subjective assessment with the objective assessment of financial literacy provides a more comprehensive analysis of how financial literacy affects each credit card behavior. This combined approach to assessment produced the largest estimates of the effects of financial literacy on credit card behavior. The findings hold across the five credit card behaviors and the five age groups.
Full Text Available In this study, the factors related with having credit card in Erzurum have been searched by a logit model. There are demographic, social, cultural, and economic variables in the model. The final model is statistically significant. According to the model, job, average household income per month, payment method at shopping, usefulness of credit card and increasing the shopping tendency are statistically significant on having credit card.
Gary R. Mottola
Full Text Available Data from the FINRA Foundation National Financial Capability Study revealed that women with low levels of financial literacy were more likely to engage in costly credit card behaviors—like incurring late and over-the-limit fees—than men with low financial literacy. There were, however, no differences in behavior between men and women with high financial literacy. Further, women and low financial literacy respondents reported paying higher interest rates on their credit cards. These findings suggest that increasing financial literacy may help reduce some gender-based differences in credit card behavior and lower credit card interest rates for both men and women.
FRANCISCA NONYELUM OGWUELEKA
Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.
Since the late 1990s, lawmakers, college officials, consumer advocacy groups, and higher education practitioners have become increasingly concerned about the rising use of credit cards among college students. Some recent studies have provided information about credit card use among college students. These studies include: (1) a study conducted by…
D'Agostino, Davi M.
In response to a request from the House of Representatives, employees of the General Accounting Office conducted structured interviews with about 100 officials at 12 universities and colleges around the United States about several issues related to college students and credit cards. They also reviewed three studies of credit card use by college…
Full Text Available This study was aimed to gain insights and tested the factors that influence credit cards usage in university community of UPI through Theory of Planned Behavior model approach. Using Path Analysis to explain the direct and indirect influence of attitude, subjective norm and behavioral control to intention and behavior of credit card usage. The results showed all respondents have a positive attitude towards credit cards usage, with high influence of subjective norm, high behavior control, high intention to use credit cards and all respondents used credit cards wisely. There was positive and significant effect either simultaneously or partially between behavioral attitudes, subjective norms, and behavior control toward the intention to use credit card. The partial test results showed behavioral attitude has the greatest influence on the intention to use credit card. There was a positive and significant influence both simultaneously and partially between behavioral attitudes, subjective norms, and behavioral control on default-risk debt behavior. The partial results showed that attitude gives the greatest influence on default debt risk behavior. The result also proved there was a positive and significant influence of the intention to use credit card on default debt risk behavior.
Manning, Robert D.; Kirshak, Ray
Professors John M. Barron and Michael E. Staten's article in Vol. 34, No. 3 of this journal, "Usage of Credit Cards Received through College Student-Marketing Programs," purports to "provide benchmark measures of college student credit card usage." Based on empirical analyses of proprietary industry data, they conclude that "There is no…
Barron, John M.; Staten, Michael E.
This article provides benchmark measures of college student credit card usage by utilizing a pooled sample of over 300,000 recently opened credit card accounts. The analysis compares behavior over 12 months of account history for three groups of accounts: those opened by young adults through college student marketing programs; those opened through…
Hogan, Eileen A.; Bryant, Sarah K.; Overymyer-Day, Leslie E.
The acquisition of credit card debt by college students has long been a topic of concern. This study explores relationships among debt, undesirable academic behaviors and cognitions, and academic performance, through surveys of 338 students in a public university, replicating two past measures of credit card debt and creating new measures of…
Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd S.
Reports on a study that investigated the effect of a university's solicitation policy on students' acquisition and usage of credit cards. Attempts by universities to limit access to and use of credit cards appear to be ineffective. Suggests alternative policies be constructed around teaching students sound money management skills. (Author/JDM)
The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.
Mattson, Lucretia; Sahlhoff, Kathleen; Blackstone, Judith; Peden, Blaine; Nahm, Abraham Y.
This research used a Web-based survey of students at a Midwest regional university to measure the extent of credit card use by first-year students and seniors. The results indicate that the variables influencing credit card use and the carrying of a balance from one month to the next include the number of cards held by the student, the student's…
Project #OA-FY13-0116, December 20, 2012. The U.S. Environmental Protection Agency, Office of Inspector General, plans to begin preliminary research for an audit of the agency’s purchase card and convenience check programs.
Project #OA-FY15-0064, August 26, 2015. The U.S. Environmental Protection Agency (EPA) Office oflnspector General (OIG) plans to begin the preliminary research phase ofauditing the agency's purchase card and convenience check programs.
Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca
Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.
... relating to payment of tax by credit card and debit card. 301.6103(k)(9)-1 Section 301.6103(k)(9)-1... Disclosure of returns and return information relating to payment of tax by credit card and debit card... processing credit card and debit card transactions to effectuate payment of tax as authorized by § 301.6311-2...
Sylva Alif Rusmita
Full Text Available This study aims to analyze the attitudes of consumers towards Islamic and conventional credit cards. Using online questionnaire survey data from 51 respondents in Surabaya, East Java, the study revealed that most consumers possessed credit cards because of their convenience factor, relationship with their existing bank, and card salesmen. Therefore, the sale is the most powerful way to invite the community to have an Islamic credit card. Many customers do not care whether their credit cards are Islamic based or not, as long as the salesman promoted cards to them and the cards are able to meet their personal needs, especially for sales and purchase transactions online, they will utilize the cards. The large number of Muslims in Surabaya should be a share of the lucrative market for Islamic credit cards. Therefore, the education about the Islamic manner of consumption and the dangers of usury should be promoted in Surabaya.DOI: 10.15408/etk.v16i2.5519
Setiono, Rudy; Baesens, Bart; Mues, Christophe
While feedforward neural networks have been widely accepted as effective tools for solving classification problems, the issue of finding the best network architecture remains unresolved, particularly so in real-world problem settings. We address this issue in the context of credit card screening, where it is important to not only find a neural network with good predictive performance but also one that facilitates a clear explanation of how it produces its predictions. We show that minimal neural networks with as few as one hidden unit provide good predictive accuracy, while having the added advantage of making it easier to generate concise and comprehensible classification rules for the user. To further reduce model size, a novel approach is suggested in which network connections from the input units to this hidden unit are removed by a very straightaway pruning procedure. In terms of predictive accuracy, both the minimized neural networks and the rule sets generated from them are shown to compare favorably with other neural network based classifiers. The rules generated from the minimized neural networks are concise and thus easier to validate in a real-life setting.
Mansfield, Phylis M; Pinto, Mary Beth; Parente, Diane H
This study assessed the relationship between self-control and credit-card use with a convenience sample of 165 traditional-age college students of whom 69 (42%) were women. Students' self-control was measured on Grasmick, et al.'s Self-control Scale, which has six subscales, one of which is Impulsivity. Comparisons were made between those students who paid their cards off each month, called convenience users, and those who carried a monthly balance forward on scores on total self-control and impulsivity, and number of credit cards possessed. A significant difference in self-control scores was found between these two groups and also for mean impulsivity scores. Significantly fewer credit cards were possessed by students who paid their cards off each month than by those who carried a monthly balance.
Provides multiple workable solutions financial aid offices can offer students throughout their college experience to deal with debt: preventive solutions for avoiding problems with credit card debt, holistic solutions for other related problems, and remedial solutions for existing problems. (EV)
Aizzat Mohd. Nasurdin
Full Text Available The study is aimed at validating attributes that influence the differences in attitudes among active and inactive cardholders. By focusing on relevant attributes that have been identified, it is believed that credit card issuing banks can position themselves effectively via their marketing strategies to activate their existing cardholders' usage rate as well as to attract new active cardholders. Thirteen important attributes were used to measure credit cardholders' attitude. These attributes include acceptance level, credit limit, interest-free repayment period, annual fee, application approval period, ancillary functions, handling of cardholders' complaints, issuing bank image, gift/bonus to new applicants, card design, leaflet to describe the card,and advertising by the issuing bank. Acceptance level, credit limit, interest free repayment period, ancillary functions, handling of cardholders' complaints, bank image, and bank advertising were found to be the most important attributes that influenced cardholders' attitudes in distinguishing active from inactive cardholders. Based on the results of the study, several suggestions are forwarded to credit card issuing banks as a step to stimulate credit cardholders' usage level. Among these are to work closer with various retailers to promote the credit card payment mode, to provide adequate credit limit to cardholders, to extend interest free repayment period from 20 days to 30 days, to implement strategic alliances with firms involved in travelling, entertainment, insurance, and telecommunications and, to advertise more so as to create a brand name for the issuing bank.
de Montjoye, Yves-Alexandre; Radaelli, Laura; Singh, Vivek Kumar
. We study 3 months of credit card records for 1.1 million people and show that four spatiotemporal points are enough to uniquely reidentify 90% of individuals. We show that knowing the price of a transaction increases the risk of reidentification by 22%, on average. Finally, we show that even data...... sets that provide coarse information at any or all of the dimensions provide little anonymity and that women are more reidentifiable than men in credit card metadata....
Von Solms, S
Full Text Available The use of debit and credit cards has become indispensable to consumers worldwide. This cashless method of payment offers flexibility and convenience. It eliminates the safety risk of carrying large cash amounts in person and cards can be cancelled...
Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).
St. Pierre, Eileen; Shreffler, Karina
The research reported here assessed the financial literacy of older adults living in rural communities, current use of and attitudes towards debt, and debt pressures. Those surveyed exhibit low credit card usage and responsible payment practices. Most never use credit to pay medical expenses. Respondents display a financial literacy level similar…
Fagerstrom, Asle; Hantula, Donald A.
Credit card debt is of increasing concern among college students, but reasons for it are not well understood. In a simulated shopping experiment based on a hyperbolic discounted utility model, 21 participants could either save money for a new model of their favorite mobile phone brand and get it in the future or buy the product on credit and get…
Project #OA-FY16-0229, July 14, 2016. The EPA OIG plans to begin a risk assessment of the EPA’s purchase card and convenience check program with the Office of Acquisition Management (OAM) within the Office of Administration and Resources Management (OARM).
Spangenberg, Eric R
There is a dearth of empirically supported theoretical explanation since its introduction; Feinberg's 1986 credit card effect showed greater product valuations and donation intentions by experimental participants when asked to make such estimates in the presence of credit card stimuli. This comment on McCall, Trombetta, and Gipe (2004) notes potential flaws and adjudged over-interpretation of results in their attempt to replicate successfully and derive theoretical explanation for the credit card effect.
Amira Azmi, Nur; Saifullah Rusiman, Mohd; Khalid, Kamil; Roslan, Rozaini; Sufahani, Suliadi; Mohamad, Mahathir; Salleh, Rohayu Mohd; Hamzah, Nur Shamsidah Amir
Credit card is a convenient alternative replaced cash or cheque, and it is essential component for electronic and internet commerce. In this study, the researchers attempt to determine the relationship and significance variables between credit card debt and demographic variables such as age, household income, education level, years with current employer, years at current address, debt to income ratio and other debt. The provided data covers 850 customers information. There are three methods that applied to the credit card debt data which are multiple linear regression (MLR) models, MLR models with least quartile difference (LQD) method and MLR models with mean absolute deviation method. After comparing among three methods, it is found that MLR model with LQD method became the best model with the lowest value of mean square error (MSE). According to the final model, it shows that the years with current employer, years at current address, household income in thousands and debt to income ratio are positively associated with the amount of credit debt. Meanwhile variables for age, level of education and other debt are negatively associated with amount of credit debt. This study may serve as a reference for the bank company by using robust methods, so that they could better understand their options and choice that is best aligned with their goals for inference regarding to the credit card debt.
Hunter, Jennifer L.; Heath, Claudia J.
This article uses a random digit dial probability sample (N = 328) to examine the relationship between credit card use behaviors and household well-being during a period of severe economic recession: The Great Recession. The ability to measure the role of credit card use during a period of recession provides unique insights to the study of credit…
Ding, Yue; Kobayashi, Kiyoshi; Nishida, Junji; Yoshida, Mamoru
In this paper, the roles of transport-community cards jointly issued by a public transport firm and retails are investigated as a means to vitalize an obsolescence shopping center located in a middle of a city. When both the price of goods supplied by the retails and the transport fares affect the consumers' behavior, there exist pecuniary externality between the behaviors of the retails and transport firms. The introduction of a transport-community cards system enables to integrate a basket of goods and transport service into a single commodity; thus, the pecuniary externality can be internalized by price coordination. In addition, the paper clarifies theoretically that the transport firm initiatively decides the price of the transportation service and the retails transfer their incomes to the transport firm so that they are induced to jointly issue the transport-community cards.
Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas
This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…
Leung, S C; Fung, W K; Wong, K H
The relative bit density variation graphs of 207 specimen credit cards processed by 12 encoding machines were examined first visually, and then classified by means of hierarchical cluster analysis. Twenty-nine credit cards being treated as 'questioned' samples were tested by way of cluster analysis against 'controls' derived from known encoders. It was found that hierarchical cluster analysis provided a high accuracy of identification with all 29 'questioned' samples classified correctly. On the other hand, although visual comparison of jitter graphs was less discriminating, it was nevertheless capable of giving a reasonably accurate result.
田中,武; 大村,道郎; 楠,茂之; 安井,良親; 山田,明宏
Development of the system for checking attendance of the lecture at the university using the card reader was demonstrated. The rate of checking attendance of the lecture was about 4 to 12 students per minute. The break time of lecture at the Hiroshima Institute of Technology was 10 minute. Therefore, it is possible to check about 40 students' attendance of the lecture for the break time. Also, the probability that check exactly attendance was about 50%. The real time system for checking atten...
This study examined attitudinal and behavioral differences between internal and external locus of control (LOC) consumers on credit card misuse, the importance of money, and compulsive buying. Using multiple analysis of variance and separate analyses of variance, internal LOC consumers were found to have lower scores on credit card misuse and…
... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Standard Form 149, U.S. Government National Credit Card. 101-26.4901-149 Section 101-26.4901-149 Public Contracts and Property... 149, U.S. Government National Credit Card. Note: The form illustrated in § 101-26.4901-149 is filed as...
Credit card is one of the most popular e-payment approaches in current online e-commerce. To consolidate valuable customers, card issuers invest a lot of money to maintain good relationship with their customers. Although several efforts have been done in studying card usage motivation, few researches emphasize on credit card usage behavior analysis when time periods change from t to t+1. To address this issue, an integrated data mining approach is proposed in this paper. First, the customer profile and their transaction data at time period t are retrieved from databases. Second, a LabelSOM neural network groups customers into segments and identify critical characteristics for each group. Third, a fuzzy decision tree algorithm is used to construct usage behavior rules of interesting customer groups. Finally, these rules are used to analysis the behavior changes between time periods t and t+1. An implementation case using a practical credit card database provided by a commercial bank in Taiwan is illustrated to show the benefits of the proposed framework.
Robb, Cliff A.; Sharpe, Deanna L.
Analysis of survey data collected from 6,520 students at a large Midwestern University affirmed that financial knowledge is a significant factor in the credit card decisions of college students but not entirely in expected ways. Results of a double hurdle analysis indicated that students with relatively higher levels of financial knowledge were…
D'Souza, W; Crane, J; Burgess, C; Te Karu, H; Fox, C; Harper, M; Robson, B; Howden-Chapman, P; Crossland, L; Woodman, K
Although asthma self-management plans are widely recommended as essential in the long-term treatment of adult asthma, there have been few studies examining their use. Our objective was to assess the effect of a "credit card" adult asthma self-management plan in a community experiencing major health problems from asthma, by means of a before and after intervention trial of the efficacy of the "credit card" plan, when introduced through community-based asthma clinics. The participants were 69 Maori people with asthma. The "credit card" plan consisted of written guidelines for the self-management of asthma, based on self-assessment of asthma severity, printed on a plastic card. On one side, management guidelines were based on the interpretation of peak expiratory flow rate (PEFR) recordings, whilst the reverse side was based on symptoms. The outcome measures used were before and after comparison of markers of asthma morbidity and requirement for acute medical treatment; and a structured questionnaire assessing the acceptability and use of the credit card plan. Following the introduction of the plan, the mean PEFR increased from 347 to 389 l.min-1, the percentage of nights woken fell from 30.4 to 16.9%, and the number of days "out of action" fell from 3.8 to 1.7%. The requirements for acute medical treatment also fell during the intervention period. Most participants commented favourably on the content and usefulness of the plan. In the situation of worsening asthma, 28% of subjects found the peak flow side of the card most helpful, 7% the symptoms side, and 48% found both sides equally helpful.(ABSTRACT TRUNCATED AT 250 WORDS)
K. R. Seeja
Full Text Available This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
Seeja, K R; Zareapoor, Masoumeh
This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
de Montjoye, Yves-Alexandre; Radaelli, Laura; Singh, Vivek Kumar; Pentland, Alex Sandy
Large-scale data sets of human behavior have the potential to fundamentally transform the way we fight diseases, design cities, or perform research. Metadata, however, contain sensitive information. Understanding the privacy of these data sets is key to their broad use and, ultimately, their impact. We study 3 months of credit card records for 1.1 million people and show that four spatiotemporal points are enough to uniquely reidentify 90% of individuals. We show that knowing the price of a transaction increases the risk of reidentification by 22%, on average. Finally, we show that even data sets that provide coarse information at any or all of the dimensions provide little anonymity and that women are more reidentifiable than men in credit card metadata. Copyright © 2015, American Association for the Advancement of Science.
Xu, Yang; Lu, Hong; Kennedy, Jack P; Yan, Xuxia; McAllister, Laura A; Yamamoto, Noboru; Moss, Jason A; Boldt, Grant E; Jiang, Shibo; Janda, Kim D
Protein-protein interactions are of critical importance in biological systems, and small molecule modulators of such protein recognition and intervention processes are of particular interest. To investigate this area of research, we have synthesized small-molecule libraries that can disrupt a number of biologically relevant protein-protein interactions. These library members are designed upon planar motif, appended with a variety of chemical functions, which we have termed "credit-card" structures. From two of our "credit-card" libraries, a series of molecules were uncovered which act as inhibitors against the HIV-1 gp41 fusogenic 6-helix bundle core formation, viral antigen p24 formation, and cell-cell fusion at low micromolar concentrations. From the high-throughput screening assays we utilized, a selective index (SI) value of 4.2 was uncovered for compound 2261, which bodes well for future structure activity investigations and the design of more potent gp41 inhibitors.
Sheshkus, Alexander; Nikolaev, Dmitry P.; Ingacheva, Anastasia; Skoryukina, Natalya
In this paper we consider a task of finding information fields within document with flexible form for credit card expiration date field as example. We discuss main difficulties and suggest possible solutions. In our case this task is to be solved on mobile devices therefore computational complexity has to be as low as possible. In this paper we provide results of the analysis of suggested algorithm. Error distribution of the recognition system shows that suggested algorithm solves the task with required accuracy.
Elizondo, Alan; Seira, Enrique
Consumer protection in financial markets in the form of information disclosure is high on governments agendas, despite the fact that the empirical evidence on its effectiveness is scarce. To measure the impact of Truth-in-Lending-Act-type disclosures on default and indebtedness, as well as of debiasing warning messages and social comparison information, we implement a randomized control trial in the credit card market for a large population of indebted cardholders. We find that providing sali...
Turnpenney, Jackie; Greenhalgh, Sue; Richards, Lena; Crabtree, Annamaria; Selfe, James
To produce a user-friendly list of metastatic spinal cord compression (MSCC) Red Flags for non-specialist 'generalist' front-line clinicians working in primary-care settings. The issue of identifying MSCC early to prevent serious long-term disability was a key theme identified by the Task and Finish Group at Greater Manchester and Cheshire Cancer Network (GMCCN) in 2009. It was this group who initially brokered and then coordinated the current development as part of their strategic approach to improving care for MSCC patients. A consensus-building approach that considered the essential minimum data requirements to raise the index of suspicion suggestive of MSCC was adopted. This followed a model of cross-boundary working to facilitate the mutual sharing of expertise across a variety of relevant clinical specialisms. A guideline aimed at helping clinicians to identify the early signs and symptoms of MSCC was produced in the form of a credit card. This credit card includes key statements about MSCC, signposting to key sources of additional information and a user-friendly list of Red Flags which has been developed into an eight-item Red Flag mnemonic. To date, an excess of 120,000 cards have been printed by a variety of organisations and the distribution of the cards is ongoing across the United Kingdom and the Republic of Ireland.
Antonius Maria Laot Kian
Full Text Available The aims of the study are to determine the legal arrangements and the application of criminal sanctions against the crime of credit/debit card fraud in Indonesia. The type of study was a normative research by classifying the provisions relevant to the crime of credit/debit card fraud is based on Law No. 11 Year 2008 concerning Information and Electronic Transactions; otherwise it is used also Convention on Cyber crime 2001. Analysis of legal materials made through a law (statue approach to create an ius constituendum regarding the application of criminal sanctions against crime credit/debit card fraud. The results of the research indicated that the legal arrangements and criminal sanctions against the crime of credit/debit card fraud in Indonesia is still relatively minimal. First, not integrated article that directly regulates computer related fraud. Second, not arranged in the form of criminal sanctions for actions that are restitution culprit.
Ali, Erden; Kosuge, Dennis; MacDowell, Andrew
Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more
Hodson, Randy; Dwyer, Rachel; Neilson, Lisa
In an era of increased access to credit, it becomes increasingly important to understand the consequences of taking on unsecured consumer debt. We argue that credit can have both positive and negative consequences resulting from its ability to smooth life transitions and difficulties but that this occurs simultaneously with increased financial risks and stress resulting from carrying unsecured debt. We find that those in the middle of the income distribution suffer the greatest disruptions to mental health from carrying debt. Affluent borrowers are relatively unmoved by debt, suggesting the use of short-term debt as a convenience strategy for the financially well-heeled. The least advantaged borrowers are also suffer emotionally less from debt, possibly because securing spendable funds for necessities remains their most pressing concern. The onset of the Great Recession, however, produced increased emotional distress for all classes.
Nelson, Melissa C; Lust, Katherine; Story, Mary; Ehlinger, Ed
To examine cross-sectional associations between credit card debt, stress, and health risk behaviors among college students, focusing particularly on weight-related behaviors. Random-sample, mailed survey. Undergraduate and graduate students (n = 3206) attending a large public university. Self-reported health indicators (e.g., weight, height, physical activity, diet, weight control, stress, credit card debt). More than 23% of students reported credit card debt > or = $1000. Using Poisson regression to predict relative risks (RR) of health behaviors, debt of at least $1000 was associated with nearly every risk indicator tested, including overweight/obesity, insufficient physical activity, excess television viewing, infrequent breakfast consumption, fast food consumption, unhealthy weight control, body dissatisfaction, binge drinking, substance use, and violence. For example, adjusted RR [ARR] ranged from 1.09 (95% Confidence interval [CI]: 1.02-1.17) for insufficient vigorous activity to 2.17 (CI: 0.68-2.82) for using drugs other than marijuana in the past 30 days. Poor stress management was also a robust indicator of health risk. University student lifestyles may be characterized by a variety of coexisting risk factors. These findings indicate that both debt and stress were associated with wide-ranging adverse health indicators. Intervention strategies targeting at-risk student populations need to be tailored to work within the context of the many challenges of college life, which may serve as barriers to healthy lifestyles. Increased health promotion efforts targeting stress, financial management, and weight-related health behaviors may be needed to enhance wellness among young adults.
Daniel Evangelista Régis
Full Text Available Abstract The main interest of this work is to analyze the application of multi-state Markov models to evaluate credit card risk by investigating the characteristics of different state transitions in client-institution relationships over time, thereby generating score models for various purposes. We also used logistic regression models to compare the results with those obtained using multi-state Markov models. The models were applied to an actual database of a Brazilian financial institution. In this application, multi-state Markov models performed better than logistic regression models in predicting default risk, and logistic regression models performed better in predicting cancellation risk.
Fabio M. Manenti; Ernesto Somma
This paper analyses market competition between two different types of credit card platforms: not-for-profit associations and proprietary systems. The main focus is on the role of the interchange fee set by not-for-profit platforms. We show that when the interchange fee is set so as to maximise the sum of issuers' and acquirers' profits, the equilibrium values of platforms' profits, of the sum of the fees charged by each platform and their market shares are independent of the competitive condi...
Friedline, Terri; West, Stacia; Rosell, Nehemiah; Serido, Joyce; Shim, Soyeon
This study examines the extent of emergent, outstanding credit card debt among young adult college students and investigates whether any associations existed between this credit card debt and the characteristics of the communities in which these students grew up or lived. Using data (N = 748) from a longitudinal survey and merging community characteristics measured at the zip code level, we confirmed that a community's unemployment rate, average total debt, average credit score, and number of bank branch offices were associated with a young adult college student's acquisition and accumulation of credit card debt. For example, a community's higher unemployment rate and lower number of bank branches were associated with a young adult college student's greater accumulated debt. Community characteristics had the strongest associations with credit card debt, especially after controlling for individual characteristics (i.e., a young adult college student's race and financial independence) and familial characteristics (i.e., their parents' income and parents' discussions of financial matters while growing up at home). The findings may help to understand the unique roles that communities play in shaping children and young adults' financial capability, and how communities can be better capacitated to support the financial goals of their residents. © Society for Community Research and Action 2017.
Wiener, Richard L; Holtje, Michael; Winter, Ryan J; Cantone, Jason A; Gross, Karen; Block-Lieb, Susan
In response to federal legislative reform aimed, in part, at reducing consumer bankruptcy filings, the authors conducted 2 experiments examining the role of affect in purchasing behavior. In Experiment 1, they examined consumer debtors, and in Experiment 2, they examined nondebtors. In both experiments, they investigated purchasing decisions made during a simulated online shopping trip, with some participants receiving standard disclosures of interest rates and money owed and with other participants receiving information under the new enhanced disclosure regulations. Results demonstrated support for the influence of anticipated affect in credit card use among both debtors and nondebtors and indicated that anticipated emotion may moderate the impact of the enhanced disclosure regulations. ((c) 2007 APA, all rights reserved).
Anderson, Carla; Card, Karen
The purpose of this quasi-experimental nonequivalent control group study was to determine the influence that a financial education intervention administered in First Year Experience courses had on students' perceptions of their financial behavior such as compulsive spending and credit card use. This study utilized the five-point Likert-type…
D'Souza, W; Burgess, C; Ayson, M; Crane, J; Pearce, N; Beasley, R
The "credit card" asthma self-management plan provides the adult asthmatic patient with simple guidelines for the self-management of asthma, which are based on the self-assessment of peak expiratory flow rate recordings and symptoms. The study was a trial of the clinical efficacy of the credit card plan in a high-risk group of asthmatic patients. In this "before-and-after" trial, patients discharged from the emergency department of Wellington Hospital, after treatment for severe asthma were invited to attend a series of hospital outpatient clinics at which the credit card plan was introduced. Questionnaires were used to compare markers of asthma morbidity, requirement for emergency medical care, and medication use during the 6-month period before and after intervention with the credit card plan. Of the 30 patients with asthma who attended the first outpatient clinic, 26 (17 women and 9 men) completed the program. In these 26 participants, there was a reduction in both morbidity and requirement for acute medical services: specifically, the proportion waking with asthma more than once a week decreased from 65% to 23% (p = 0.005) and the proportion visiting the emergency department for treatment of severe asthma decreased from 58% to 15% (p = 0.004). The patients attending the clinics commented favorably on the plan, in particular on its usefulness as an educational tool for monitoring and treating their asthma. Although the interpretation of this study is limited by the lack of a randomized control group, the findings are consistent with other evidence that the credit card asthma self-management plan can be an effective and acceptable system for improving asthma care in a high-risk group of adult patients with asthma.
Ribisl, Kurt M; Williams, Rebecca S; Gizlice, Ziya; Herring, Amy H
Most Internet vendors offer tax-free cigarettes making them cheaper than those sold at stores. This undermines the impact that higher prices have upon reducing consumption. Most Internet tobacco sales have violated taxation and youth access laws, which led to landmark voluntary agreements in 2005 with the major credit card companies and major private shippers to ban payment transactions and shipments for all Internet cigarette sales. To assess whether these bans increased the rate of Internet Cigarette Vendors (ICVs) ceasing online sales, decreased the proportion of vendors offering banned payment and shipping options, and decreased consumer traffic to the most popular ICVs. Websites in a longitudinal study of ICVs were visited in 2003 (n = 338), 2004 (n = 775), 2005 (n = 664), 2006 (n = 762), and 2007 (n = 497) to assess whether they were in business and monitor their advertised sales practices. The number of unique monthly visitors to the 50 most popular ICVs at baseline was examined for the period one year before and two years after the bans to determine whether the bans altered traffic. Following the bans, the rate of ICVs ceasing online sales year to year increased, but due to an influx of new vendors, there was a net increase in ICVs. The proportion of vendors accepting banned payment options dropped from 99.2% to 37.4% after the bans, and the proportion offering banned shipping options dropped from 32.2% to 5.6%, but there was a corresponding increase in vendors offering non-banned payment options (e.g., personal checks) and shipping options (e.g., US Postal Service). Following the bans, there was a 3.5 fold decline in traffic to the most popular ICV websites. This promising approach to controlling the sale of restricted goods online has implications for regulating other products such as alcohol, firearms, quack cures, and medicines sold without a prescription.
Full Text Available The development of the national economy shows the direction that increasingly integrated with the regional and international economy that can support both a negative and positive impacts. Meanwhile the development of national economy continues to move quickly to the increasingly complex challenges therefore necessary adjustments in economic policies including the banking sector which is expected to be able to improve and strengthen the national economy. Bank as a means that ease people with all benefit is also not released from the weakness. The type of this research is normative for making criminal legislation as an object of study while the approach used tends juridical as a point of reference the theories of law and the rules of law in view of the problem. The outcomes of the research indicate that the efforts should be made to address the misuse of credit cards in the enforcement of the Indonesians criminal law is to formulate the rules of criminal law with a comprehensive pattern of expansion of legal subjects the offender is to enter the legal entity recht persoon as the parties may be subject to liability and formulate formulation of criminal in order to reach the entire modus operandi is being or may develop in the future. Besides the expansion of sanctions should be accompanied by sanction renewal that oriented to the cumulative punishment is retaliation deterrence and development.
Zuzack, Christine A.
Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…
Xu, Yang; Shi, Jin; Yamamoto, Noboru; Moss, Jason A; Vogt, Peter K; Janda, Kim D
Protein-protein interfaces are prominent in many therapeutically important targets. Using small organic molecules to disrupt protein-protein interactions is a current challenge in chemical biology. An important example of protein-protein interactions is provided by the Myc protein, which is frequently deregulated in human cancers. Myc belongs to the family of basic helix-loop-helix leucine zipper (bHLH-ZIP) transcription factors. It is biologically active only as heterodimer with the bHLH-ZIP protein Max. Herein, we report a new strategy for the disruption of protein-protein interactions that has been corroborated through the design and synthesis of a small parallel library composed of 'credit-card' compounds. These compounds are derived from a planar, aromatic scaffold and functionalized with four points of diversity. From a 285 membered library, several hits were obtained that disrupted the c-Myc-Max interaction and cellular functions of c-Myc. The IC50 values determined for this small focused library for the disruption of Myc-Max dimerization are quite potent, especially since small molecule antagonists of protein-protein interactions are notoriously difficult to find. Furthermore, several of the compounds were active at the cellular level as shown by their biological effects on Myc action in chicken embryo fibroblast assays. In light of our findings, this approach is considered a valuable addition to the armamentarium of new molecules being developed to interact with protein-protein interfaces. Finally, this strategy for disrupting protein-protein interactions should prove applicable to other families of proteins.
Kurt M Ribisl
Full Text Available Most Internet vendors offer tax-free cigarettes making them cheaper than those sold at stores. This undermines the impact that higher prices have upon reducing consumption. Most Internet tobacco sales have violated taxation and youth access laws, which led to landmark voluntary agreements in 2005 with the major credit card companies and major private shippers to ban payment transactions and shipments for all Internet cigarette sales.To assess whether these bans increased the rate of Internet Cigarette Vendors (ICVs ceasing online sales, decreased the proportion of vendors offering banned payment and shipping options, and decreased consumer traffic to the most popular ICVs.Websites in a longitudinal study of ICVs were visited in 2003 (n = 338, 2004 (n = 775, 2005 (n = 664, 2006 (n = 762, and 2007 (n = 497 to assess whether they were in business and monitor their advertised sales practices. The number of unique monthly visitors to the 50 most popular ICVs at baseline was examined for the period one year before and two years after the bans to determine whether the bans altered traffic.Following the bans, the rate of ICVs ceasing online sales year to year increased, but due to an influx of new vendors, there was a net increase in ICVs. The proportion of vendors accepting banned payment options dropped from 99.2% to 37.4% after the bans, and the proportion offering banned shipping options dropped from 32.2% to 5.6%, but there was a corresponding increase in vendors offering non-banned payment options (e.g., personal checks and shipping options (e.g., US Postal Service. Following the bans, there was a 3.5 fold decline in traffic to the most popular ICV websites.This promising approach to controlling the sale of restricted goods online has implications for regulating other products such as alcohol, firearms, quack cures, and medicines sold without a prescription.
Mohammad Reza Taghva
Full Text Available In parallel to the increasing use of electronic cards, especially in the banking industry, the volume of transactions using these cards has grown rapidly. Moreover, the financial nature of these cards has led to the desirability of fraud in this area. The present study with Map Reduce approach and parallel processing, applied the Kohonen neural network model to detect abnormalities in bank card transactions. For this purpose, firstly it was proposed to classify all transactions into the fraudulent and legal which showed better performance compared with other methods. In the next step, we transformed the Kohonen model into the form of parallel task which demonstrated appropriate performance in terms of time; as expected to be well implemented in transactions with Big Data assumptions.
Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.
Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.
We illustrate the design of an intelligent agent to aid a merchant to limit fraudulent payment card purchases over the Internet. This is important because increasing fraud may limit the rise of e-commerce, and difficult because of the uncertainty in identifying and authenticating people remotely. The agent can advise the merchant what actions to take to reduce risk without complete knowledge of the circumstances. It can also negotiate flexibly to conclude transactions successfully that would otherwise be rejected. We use the Event Calculus to model the transaction system including the participants and their actions. The idea has applications in other distributed systems where incomplete knowledge of a system may be exploited by adversaries to their advantage.
M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...
Saxena, Nitish; Sloan, John. J.; Godbole, Manasvee; Yu, Jun; Cai, Jacinta; Goergescu, Michael; Harper, Olive Nick; Schwebel, David, C.
In recent years, rapidly emerging technology has introduced mobile Point-Of-Sale (MPOS) systems to the North American market. These systems allow merchants to process transactions conveniently and quickly using mobile phones or tablets rather than “traditional” point-of-sale (TPOS) credit card-processing systems. However, the long-term success of these new payment systems relies on consumers perceiving the device to be secure, accurate, and free from criminal activity. We present a case vs. c...
Chin-Chen Chang; Shih-Chang Chang
Nowadays, traveling has become a popular leisure activity in our daily lives. Travelers can either use cash or credit cards to pay their bills. However, there is risk of cash being robbed or credit cards being copied. The traveler’s check, which is a third choice, comes in to get travelers around such risks and to protect their rights. Nevertheless, traditional travelers’ checks cannot keep imposters from forging and cashing them illegally. Hence, we propose a new type of check, called the e-...
林育廷 Yu-Ting Lin
Full Text Available 隨信用卡使用之廣泛與普及，有關競爭法問題也漸受重視。本文擬就其中與成本定價相關之二大議題進行討論，其一為交換費用（Interchange fees）之制訂與衍生相關競爭法議題，其二為禁止特約商店額外收取信用卡使用費（no surcharge rule）之適法性討論，及其分別對經濟體付款制度之影響。 本文主要以澳洲政府近年來有關信用卡支付系統之改革為主要範本，旁及美國、歐盟等檢討現況，並進一步再就相關問題提出個人分析與評論。交換費用之聯合制訂有其必要性，由廠商分別締約反有礙信用卡作業效率，且對市場競爭無益。但於此前提下，適度管制則有其必要。相關計算應有客觀且公正之計算標準，以避免對發卡機構與信用卡組織過度補償（over-compensate）。同時，相關資訊與定價基準應做適當揭露。就禁止特約商店額外收費之限制而言，此一定價限制可能對消費者付款工具之選擇造成錯誤之價格誘因，除有礙付款市場之有效競爭，造成高成本付款工具之普遍使用，影響付款機制之運作效益外，並形成非信用卡使用者對信用卡使用者之不當補貼，並進而造成零售價格之提高，影響社會整體 利益。 This paper first outlines the Australian recently adopted regulatory framework for credit card scheme, highlighting the growing concerns over the possible anti-competitive effects of the setting of interchange fees and the “no-surcharge rule”.The rate of the interchange fees applied to the credit card use nowadays raises the concerns of overcompensating the financial institution as well as the credit card schemes and also, the “no-surcharge rule” restricted the competition and suppressed price signals that guide the efficient allocation of resources. In my opinion, the interchange fee should be decided at a cost-based benchmark
Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...
Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...
Wood, Charles L.
Federal legislation mandates that all students with disabilities have meaningful access to the general education curriculum and that students with and without disabilities be held equally accountable to the same academic standards (IDEIA, 2004; NCLB, 2001). Many students with disabilities, however, perform poorly in academic content courses, especially at the middle and secondary school levels. Previous research has reported increased notetaking accuracy and quiz scores over lecture content when students completed guided notes compared to taking their own notes. This study evaluated the effects of a pre-quiz review procedure and specially formatted guided notes on middle school special education students' learning of science vocabulary. This study compared the effects of three experimental conditions. (a) Own Notes (ON), (b) Own Notes+Random Study Checks (ON+RSC), and (c) Guided Notes Study Cards+Random Study Checks (GNSC+RSC) on each student's accuracy of notes, next-day quiz scores, and review quiz scores. Each session, the teacher presented 12 science vocabulary terms and definitions during a lecture and students took notes. The students were given 5 minutes to study their notes at the end of each session and were reminded to study their notes at home and in study hall period. In the ON condition students took notes on a sheet of paper with numbered lines from 1 to 12. Just before each next-day quiz in the ON+RSC condition students used write-on response cards to answer two teacher-posed questions over randomly selected vocabulary terms from the previous day's lecture. If the answer on a randomly selected student's response card was correct, that student earned a lottery ticket for inexpensive prizes and a quiz bonus point for herself and each classmate. In the GNSC+RSC condition students took notes on specially formatted guided notes that after the lecture they cut into a set of flashcards that could used for study. The students' mean notetaking accuracy was 75
Full Text Available The usage of credit cards as a mean for payment and consumer credits is consistently increasing worldwide and Turkey.In this study, analyzing the factors that affect the expenditures by credit cards is aimed and multiple regression analysis is applied. The model which is gained through this analysis has shaved appropriate results for economic and statistical expectations. It has been realized that, the crisis in November 2000 and February 2001 in Turkey had an important role in the decrease of credit card usage giro. On the other hand, it has been concluded that the gross national product per capita, the number of pos machines and credit cards and the inflation rate increased the card usage giro.
Wierzbicki, Jakub; Zawadzka, Anna Maria
Pro-social behaviours may be prompted or inhibited depending on the situation. Numerous experiments show that, when exposed to the idea of money, people are less willing to help, devote their time or share their resources with others (Vohs et al. Science, 314, 1154-1156, 2006, Current Directions in Psychological Science, 17(3), 208-212, 2008). Conversely, when exposed to the idea of spirituality, they often cheat less and are more willing to help others (Mazar and Ariely Journal of Marketing Research, 45, 633-644, 2008; Randolph-Seng and Nielsen The International Journal for the Psychology of Religion, 17(4), 303-315, 2007). The aim of this article is to present the results of two experiments in which we activated thoughts about money, i.e. both cash and credit cards, and thoughts about spirituality in order to find out in what way these two kinds of activation may influence pro-social behaviours. In experiment 1, participants, when reminded of money, offered lower donations to others whereas those reminded of spirituality offered higher donations. In experiment 2, those participants reminded of money offered to devote less time to help others whereas those reminded of spirituality offered to devote more time to help others.
Ellson, Richard N.; Ray, Lawrence A.
"Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.
...; loans in the nature of overdraft protection; and credit extended in connection with credit cards. ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Consumer credit. 561.12 Section 561.12 Banks... AFFECTING ALL SAVINGS ASSOCIATIONS § 561.12 Consumer credit. The term consumer credit means credit extended...
Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.
A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)
Andrew Ching; Fumiko Hayashi
Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...
Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.
Renata Giovinazzo Spers
Full Text Available O mercado de baixa renda no Brasil apresenta grandes oportunidades para empresas do setor de cartões de crédito com foco em serviços de qualidade, mas por valores compatíveis à renda e necessidades específicas desse segmento. O objetivo central do trabalho é analisar os aspectos críticos e oportunidades para os cartões de crédito no mercado de baixa renda, com a proposição de uma abordagem para aumentar a penetração do produto neste segmento. Para tanto, foram identificadas oito variáveis a partir da literatura e realizadas pesquisa qualitativa com análise documental e entrevistas em profundidade com especialistas do setor de cartões. Os resultados da pesquisa mostram que as empresas devem adotar estratégias para ganhar vantagem competitiva com preços mais baixos, reduzindo custos ao reduzir serviços não relevantes para o segmento. É recomendável que a empresa utilize a mesma marca oferecida às classes A e B e aposte em tecnologia e distribuição aliadas às redes de varejo, para uma maior penetração dos cartões.The low-income market in Brazil presents great opportunities for companies including the credit card sector. Bottom-of-the-pyramid customers look for quality which is, however, compatible with their budgets and needs. For this purpose an analysis was made of the critical aspects and opportunities in question. Literature disclosed eight factors that were analyzed in a qualitative survey and with in depth interviews. Variables relevant to business profitability in general were also presented. Results disclosed the possibility of competitive pricing advantages by offering simpler services and lower cost products. Brands offered to higher income brackets should be adapted with technologies for simplification and more attractive pricing. Partnerships should then be made with retail store networks to increase the use of credit cards.
Ward, Sherry R
Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.
Glaser, I; Green, Shlomo; Dimkov, Ilan
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Adel I. Al-Alawi; Mohammed A. Al-Amer
SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...
U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...
Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses
Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.
Upton, H.A.; Garcia, P.
A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs.
Upton, H.A.; Garcia, P.
A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs
Mehden, P. von der.
The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor
Boden, Lauren J.; Ennis, Robin P.; Jolivette, Kristine
Check in/check out (CICO) is a secondary-tier intervention implemented within the framework of schoolwide positive behavior interventions and supports (SWPBIS) that uses school-based contingencies to encourage positive behavior. CICO is a five-step cycle which uses daily progress report cards (DPR) to monitor progress toward schoolwide or…
van t Hof, C.C.G.; van Est, R.; Daemen, F.
Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are
Hof, van 't C.; Est, van R.; Daemen, F.
Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are
Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.
The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system
Cheng, X.; Degryse, H.A.
We provide the first evidence on how the introduction of information sharing via a public credit registry affects banks’ lending decisions. We employ a unique dataset containing detailed information on credit card applications and decisions from one of the leading banks in China. While we do not
Credit system is an integrated architecture consisted of financial information, credit rating, credit risk management, receivables and credit insurance systems, credit derivative markets and credit guarantee programs. The main purpose of the credit system is to provide the functioning of all credit channels and to make it easy to access of credit sources demanded by all of real and legal persons in any economic system. Credit guarantee program, the one of prominent elements of the credit syst...
Gaston, S; Pucci, J
Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.
Willey, Lorrie; White, Barbara Jo
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Bolt, Wilko; Schmiedel, Heiko
This paper analyzes equilibrium pricing of payment cards and welfare consequences of payment card competition. In particular, we model competition between debit and credit cards. The paper argues that optimal consumer and merchant fees must take safety, income uncertainty, default risk, and the
Goto, Kenya; Satsukawa, Takatoshi; Chiba, Seisho; Ohmori, Takaaki
In order to solve problems in electronic medical records, a new optical card of the digital versatile disk (DVD) type with higher capacity and lower cost than conventional compact disc recording (CD-R)-type cards has been developed, which is thinner, stronger and wearable like a credit card.
... consumer credit card accounts. (a) Limitation for first year. During the first year, a bank must not charge... billing cycle, the bank must not charge to a consumer credit card account security deposits and fees for... for the issuance or availability of credit permitted by paragraph (a) of this section must be charged...
Gicheva, Dora; Ionescu, Felicia; Simpson, Nicole B.
College students now use various forms of unsecured credit such as private student loans and credit cards to finance college. Access to these credit lines and the interest rates charged on these loans can vary significantly across credit scores. In this paper, we analyze if credit status, as measured by self-reported characteristics of an individual's credit standing, affects college investment. Using data from the Survey of Consumer Finances, we study a sample of young high school graduates ...
The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...
van Oort, N.; Brands, Ties; de Romph, E.
Public transport operators are collecting massive amounts of data from smart card systems. In the Netherlands, every passenger checks in and checks out; this system creates detailed records of demand patterns. In buses and trams, users check in and check out in the vehicle; this factor provides good
Division du Personnel
Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683
Human Resources Division
Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.
Mader, Angelika H.
We report on an industrial case study on the synthesis of (close) optimal schedules for a smart card personalisation system. The basic technique used is model checking. In most cases, the pure model checking approach has to be enriched by other techniques to fight the state space explosion. Other
Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.
U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...
Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.
Hoare, Tony; Shankar, Natarajan
In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.
Full Text Available This paper investigates the effect of inflation volatility on private sector credit growth. The results indicate that private sector credit growth is positively linked to the one period lagged inflation volatility. Given that past monetary policy actions continue to affect the targeted variables due to the substantial lags in the transmission mechanism, the positive response of private sector credit growth to past inflation volatility suggests a credible monetary policy regime in Uganda, which has led to a reduction in the level of macroeconomic uncertainty and the restoration of favorable economic conditions and prospects, thus increasing the demand for credit. Further, the study finds that the lagged private sector credit growth, nominal exchange rate, and inflation have a statistically significant effect on private sector credit growth while financial innovation, interest rates, and GDP growth appear not to be important determinants of private sector credit growth. The robustness of our findings is confirmed by sensitivity checks.
Data cards using the sample principles as music compact discs can store 4 MB of digital data. This is sufficient for 4 uncompressed radiographic images or 16 images with 4:1 average compression. Radiograph memory screens (stimulable phosphors) can be scanned at 1023 lines to provide the input signals. A filmless radiographic x-ray system is described which uses digital data cards of the size of common credit cards. These can be used in the same way as films are now used: placed in patient folders, copied, mailed, seen on view boxes, etc. The techniques of data acquisition, processing, compression, storage and display are described. The advantages of the system are explained in terms of economies, elimination of film (chemicals and processing), and compatibility with other data transmission methods. Suggestions are made for standardization of data storage and control so that this method may be used for other medical imaging applications, such as CT and ultrasound
customers . The president of Fuji Bank admitted recently that fear of bad debts had kept banks from vigorously exploiting the consumer market. He called...a lower income, working class shopper to a younger, credit-using customer . In early 1988, Marui had issued 9.6 million credit cards. 16 Its annual...the young consumer . In 1986, 83 percent of sales were to customers in their twenties.’ 7 With nearly 70 percent of its sales made on credit, interest
Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.
This diploma thesis is covering topics of customer's loyalty, loyalty programs in banking and mainly topic is loyalty programs of payment cards in banking industry. First theoretical parts is guiding us though concept of customer's loyalty in banking industry and is describing specifics of this loyalty compared to loyalty to sales businesses. Further, this thesis is trying to show opportunities to be used to support customer's loyalty in bank with participation of credit and debit cards. In t...
Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C
To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....
Adams, Troy; Moore, Monique
The number of students accumulating credit card debt--and the amount of debt itself--on college campuses is increasing. If high-risk credit and health behavior are associated, health behavior interventions might apply to high-risk credit behavior. Objective: The authors' purpose was to examine these possible associations. Participants and Methods:…
Khetagurov G. V.
Full Text Available The article is devoted to basics and the regulation problems of the modern payment cards market. In particular, it addresses the key participants in a payment system, which include the Central Bank, credit organizations, settlement and clearing centers. The paper explores the basic functions of the participants. The author analyzes approaches of card payment systems to development and implementation monitoring of standards and regulations relative to the technology: hardware and software, communication channels, etc. The article contains analysis of information exchange in the framework of payment cards market and specific features of the design and development of a payment infrastructure. It discusses the economic model of the payment cards market, which is based on commission payments. The paper describes the key fees. At the final stage of the study, the author examines the role of different global regulators in the payment card market, conducts an analysis of the foundations of the Russian legislation regulating this market.
This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued
.... Key improvements included reductions in the number of cardholders, an increase in the number of approving officials, an overall decrease in the aggregate monthly credit limits, and a decrease in purchase card usage...
Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.
Jennifer Pate Offenberg
The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...
Chaudhary, Kaylash; Fehnker, Ansgar
Virtual payment systems overcome the drawbacks such as processing and operational cost of the traditional payment system. The main aim of the virtual payment system is to provide efficient services in terms of cost. Online payment using credit card is one of the most expensive of all payment means.
Bergman, Mats; Guibourg, Gabriela; Segendorf, Björn
Despite the central role of payments in theoretical and policy oriented economics, there is surprisingly little known about the costs of different payment instruments. We estimate social and private costs of cash, debit and credit card payments in Sweden in 2002. The combined social cost of providing these payment services is approximately 0.4 per cent of GDP. Debit and credit cards are socially less costly than cash for payments above EURO 8 and EURO 18, respectively. Corresponding threshold...
Adrian Cantemir CALIN; Oana Cristina POPOVICI
Credit risk governs all financial transactions and it is defined as the risk of suffering a loss due to certain shifts in the credit quality of a counterpart. Credit risk literature gravitates around two main modeling approaches: the structural approach and the reduced form approach. In addition to these perspectives, credit risk assessment has been conducted through a series of techniques such as credit scoring models, which form the traditional approach. This paper examines the evolution of...
This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder
Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)
Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.
Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)
Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment
Wölfel, Christiane; Merritt, T.
There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....
Monk-Turner, Elizabeth; Allen, John; Casten, John; Cowling, Catherine; Gray, Charles; Guhr, David; Hoofnagle, Kara; Huffman, Jessica; Mina, Moises; Moore, Brian
The behavior of bouncers at on site establishments that served alcohol was observed. Our aim was to better understand how bouncers went about their job when the bar had a mandatory policy to check identification of all customers. Utilizing an ethnographic decision model, we found that bouncers were significantly more likely to card customers that…
Human Resources Division
The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...
Kaur, Paramjit; Krishan, Kewal; Sharma, Suresh K; Kanchan, Tanuj
With the advent of modern technology, the way society handles and performs monetary transactions has changed tremendously. The world is moving swiftly towards the digital arena. The use of Automated Teller Machine (ATM) cards (credit and debit) has led to a "cash-less society" and has fostered digital payments and purchases. In addition to this, the trust and reliance of the society upon these small pieces of plastic, having numbers engraved upon them, has increased immensely over the last two decades. In the past few years, the number of ATM fraud cases has increased exponentially. With the money of the people shifting towards the digital platform, ATM skimming has become a problem that has eventually led to a global outcry. The present review discusses the serious repercussions of ATM card cloning and the associated privacy, ethical and legal concerns. The preventive measures which need to be taken and adopted by the government authorities to mitigate the problem have also been discussed.
editor handling your paper, to upload your CIF via our web site. PLATON version of 05/02/2014; check.def file version of 05/02/2014. Datablock I - ellipsoid plot http://vm02b.iucr.org/cgi-bin/checkcif_hkl.pl（第 3／4 页）2014-2-12 09:09:12 ...
US Agency for International Development — Credit Management System. Outsourced Internet-based application. CMS stores and processes data related to USAID credit programs. The system provides information...
... complaint. At the end of this process, the issuer reports to Consumer Response how it has addressed the... Proceedings (``OAEP'') discloses every month in its Air Travel Consumer Report.\\11\\ Unlike NHTSA, OAEP does... the OEAP began publishing the Air Travel Consumer Report.\\13\\ Outside reviewers have also publicized...
Eichorn, Robert; Garza, Ruth; Jones, Karre; Sobers, Marie
New Directions Alternative Education Center, Prince William County Public School's (PWCS) alternative high school, serves approximately 1000 students on a rolling-enrollment basis each year. The 2009-2010 school year marks the sixth year of operation for the center. The school program continues to develop and grow in exciting and "new…
.... The implementation of the Federal Acquisition Streamlining Act has placed more emphasis on allowing contracting officers to apply sound business judgment instead of blindly following detailed regulations and procedures...
Clanton, Brandolyn; And Others
Intended for teachers of secondary school students, five lessons on consumer credit are presented. In the first lesson students identify and evaluate sources of credit, compare some of the costs and benefits of credit, and learn to apply criteria used in evaluating applications for credit. In the second lesson, students learn about two basic types…
Congressional Budget Office
In 1975, the first refundable tax credit—the earned income tax credit (EITC)—took effect. Since then, the number and cost of refundable tax credits—credits that can result in net payments from the government—have grown considerably. Those credits will cost $149 billion in 2013, CBO estimates, mostly for the EITC and the child tax credit.
purposes of the National Credit Act; what the definition of a credit guarantee set out ...... Scholtz et al National Credit Act in para 8.2.4; Scott et al Law of Commerce ..... Eitelberg E "Autonomy of Documentary Credit Undertakings in South African.
Discusses the importance of educational facilities conducting "reality check" self-audits to uncover the real truth behind underlying environmental problems. An environmental compliance multimedia checklist is included. (GR)
Calculated. Reported. Volume ... PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density .... 3.24 Report ... checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts ...
Li, Yi; Wang, Lin
This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.
Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen
This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....
We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.
Barslund, Mikkel Christoffer; Tarp, Finn
This paper uses a survey of 932 rural households to uncover how the rural credit market operates in four provinces of Vietnam. Households obtain credit through formal and informal lenders, but formal loans are almost entirely for production and asset accumulation. Interest rates fell from 1997...... to 2002, reflecting increased market integration; but the determinants of formal and informal credit demand are distinct. Credit rationing depends on education and credit history, but we find no evidence of a bias against women. Regional differences are striking, and a ‘one size fits all’ approach...... to credit policy is clearly inappropriate....
National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...
Rebeca Formiga Figueira
Full Text Available Studies in the field of marketing and society that address consumer debt are relevant for helping the consumer to preserve his/her financial health. This manuscript analyzed the antecedents of consumer debt by means of attitude towards money, attitude towards credit card, self-control, compulsive buyings, impulsive buyings, and debt propensity. Data analysis included descriptive statistics and structural equations modeling. The sample consisted of 301 respondents that provided their perceptions through a Google Docs online form. The direct influence of the attitude towards credit card on debt propensity was accepted. Some hypotheses were not confirmed, which can be explained by the specific characteristics of Brazilian consumers. Findings suggest that marketing should pay attention to the actual practices and the legislation about credit card use.
Tudose Geanina - Gabriela
Full Text Available At the same time with the development of market and consumer behavior of Romanians, the growth rate of cards market accelerated. Of course, infrastructure and acceptance network were very important, they are the factors that allowed the widespread use of cards. Currently, any natural person or legal entity is engaged in commercial relationships involving financial transactions, the electronic payments having an important role, representing virtually future transactions, both nationally and across borders. The financial institutions have made a more rapid segmentation of the portfolio of cards and began to focus increasingly on services and benefits situated behind the payment instruments. Meanwhile, cardholders were becoming more educated and sophisticated, knowing what to ask of cards. More, many financial institutions have adapted so that network to accept chip cards. On the Romanian market, the chip cards will increase which are much more effective in terms of security transactions, as well as for co-branded cards, that offers the possibility of the loyalty of the customers. They will try to get as many benefits from different types of cards, but at the same time, they will focus on niche products, business cards, cards for shopping or for payment of public services. The scientific paper aims to capture aspects that emphasize the fact that the permanent market monitoring and the continuous adaptation of it will become necessary for the next period. The current client is more demanding, more educated and less tolerant in the relation to the suppliers of any kind and especially with those of financial services. The tendency to use co-branded cards for everyday payments will increase as merchants and issuing banks will attach more and more benefits on these cards, which will ultimately increase trading volumes on the card to merchants. The bank clients benefited of the cutting - edge technologies, of dual cards functionality - debit and credit.
Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."
In support of the NRC Nuclear Plant Aging Research (NPAR) program, the Oak Ridge National Laboratory (ORNL) has carried out an assessment of several check value diagnostic monitoring methods, in particular, those based on measurements of acoustic emission, ultrasonics, and magnetic flux. The evaluations have focussed on the capabilities of each method to provide information useful in determining check valve aging and service wear effects, check valve failures, and undesirable operating modes. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data, including data obtained from the vendors who recently participated in a comprehensive series of tests directed by a nuclear industry users group. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed that provide several unique capabilities. These methods, based on external ac- an dc-magnetic monitoring are also described. None of the examined methods could, by themselves, monitor both the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information
Department of Homeland Security — The National Credit Union Administration (NCUA) is the independent federal agency that charters and supervises federal credit unions. NCUA, backed of the full faith...
Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.
Rehani, Madan M; Kushi, Joseph F
The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.
Balasubramanyan, Lakshmi; Craig, Ben R.; Thomson, James B.; Zaman, Saeed
We examine how a combination of credit market and asset quality information can jointly be used in assessing bank franchise value. We find that expectations of future credit demand and future asset quality explain contemporaneous bank franchise value, indicative of the feedback in credit market information and its consequent impact on bank franchise value.
We propose an evolutionary model of a credit market. We show that the economy exhibits credit cycles. The model predicts dynamics which are consistent with some evidence about the Great Depression. Real shocks trigger episodes of credit--crunch which are observed in the process of adjustment towards the post shock equilibrium.
Full Text Available Nowadays it is essential to modernize credit relations in the conditions of global economy transformations. This is due to the influence of integration processes on credit relations and transformation of the risks inherent in the credit field. The purpose of this article is to develop measures that help to improve the efficiency of interaction of credit relations’ participants. Modernization of credit relations is based on the interaction of its main and indirect subjects who belong to the subsystems of loans granting, deposits attraction and provision of related services. Its goal is to pass from extensive to intensive model of interaction between the subjects of credit relations. Components of the credit relations modernization are the following: institutional modernization, which is based on the interaction of credit relations’ subjects, and ensures the development of competition in all credit market’s segments, the creation of its corresponding infrastructure, qualitative change in the approaches of regulation and supervision; technological modernization, which involves the formation of joint products on the credit market and the formation of an integrated informational and analytical system. In the result of the credit relations’ modernization it is expected to achieve synergies between the subjects of credit relations, that will lead to changes in the business architecture of the financial market.
Full Text Available After the economic crisis that followed the liquidation of some national private banks in 1997 gave rise to alternative thinking and measures to develop banking activity based on Islamic principles. Islamic principles reflected in the pattern of bamk operating in accordance with Islamic principles, especially regarding the procedures for bermuamalah in Islam. Shar-E Card is one type of credit card services by a bank Muamalat where the balance is outstanding amounts dengam mudaraba principle that no restriction for banks to use the funds raised, bamk shall memberitahukam to the owner of the funds of the ratios and procedures for the provision of benefits and or the calculation of benefit sharing as well as risks that may arise from the storage of funds. Keywords: Shar-E Card, Bank Muamalat
... purposes under an open-end credit plan that is accessed by a credit card or charge card. The terms “open... the requirements of 12 CFR 226.5b that are accessible by a credit or charge card; (2) Overdraft lines of credit tied to asset accounts accessed by check-guarantee cards or by debit cards; (3) Lines of...
The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards
The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.
Hart, Joseph T.
Two basic tests for checking memory skills are included in these appendices. The first, the General Information Test, uses the same 150 items for each of its two versions. One version is a completion-type test which measures recall by requiring the examinee to supply a specific response. The other version supplements each of the 150 items with…
Alter, David; Grenache, David G; Bosler, David S; Karcher, Raymond E; Nichols, James; Rajadhyaksha, Aparna; Camelo-Piragua, Sandra; Rauch, Carol; Huddleston, Brent J; Frank, Elizabeth L; Sluss, Patrick M; Lewandrowski, Kent; Eichhorn, John H; Hall, Janet E; Rahman, Saud S; McPherson, Richard A; Kiechle, Frederick L; Hammett-Stabler, Catherine; Pierce, Kristin A; Kloehn, Erica A; Thomas, Patricia A; Walts, Ann E; Madan, Rashna; Schlesinger, Kathie; Nawgiri, Ranjana; Bhutani, Manoop; Kanber, Yonca; Abati, Andrea; Atkins, Kristen A; Farrar, Robert; Gopez, Evelyn Valencerina; Jhala, Darshana; Griffin, Sonya; Jhala, Khushboo; Jhala, Nirag; Bentz, Joel S; Emerson, Lyska; Chadwick, Barbara E; Barroeta, Julieta E; Baloch, Zubair W; Collins, Brian T; Middleton, Owen L; Davis, Gregory G; Haden-Pinneri, Kathryn; Chu, Albert Y; Keylock, Joren B; Ramoso, Robert; Thoene, Cynthia A; Stewart, Donna; Pierce, Arand; Barry, Michelle; Aljinovic, Nika; Gardner, David L; Barry, Michelle; Shields, Lisa B E; Arnold, Jack; Stewart, Donna; Martin, Erica L; Rakow, Rex J; Paddock, Christopher; Zaki, Sherif R; Prahlow, Joseph A; Stewart, Donna; Shields, Lisa B E; Rolf, Cristin M; Falzon, Andrew L; Hudacki, Rachel; Mazzella, Fermina M; Bethel, Melissa; Zarrin-Khameh, Neda; Gresik, M Vicky; Gill, Ryan; Karlon, William; Etzell, Joan; Deftos, Michael; Karlon, William J; Etzell, Joan E; Wang, Endi; Lu, Chuanyi M; Manion, Elizabeth; Rosenthal, Nancy; Wang, Endi; Lu, Chuanyi M; Tang, Patrick; Petric, Martin; Schade, Andrew E; Hall, Geraldine S; Oethinger, Margret; Hall, Geraldine; Picton, Avis R; Hoang, Linda; Imperial, Miguel Ranoa; Kibsey, Pamela; Waites, Ken; Duffy, Lynn; Hall, Geraldine S; Salangsang, Jo-Anne M; Bravo, Lulette Tricia C; Oethinger, Margaret D; Veras, Emanuela; Silva, Elvia; Vicens, Jimena; Silva, Elvio; Keylock, Joren; Hempel, James; Rushing, Elizabeth; Posligua, Lorena E; Deavers, Michael T; Nash, Jason W; Basturk, Olca; Perle, Mary Ann; Greco, Alba; Lee, Peng; Maru, Dipen; Weydert, Jamie Allen; Stevens, Todd M; Brownlee, Noel A; Kemper, April E; Williams, H James; Oliverio, Brock J; Al-Agha, Osama M; Eskue, Kyle L; Newlands, Shawn D; Eltorky, Mahmoud A; Puri, Puja K; Royer, Michael C; Rush, Walter L; Tavora, Fabio; Galvin, Jeffrey R; Franks, Teri J; Carter, James Elliot; Kahn, Andrea Graciela; Lozada Muñoz, Luis R; Houghton, Dan; Land, Kevin J; Nester, Theresa; Gildea, Jacob; Lefkowitz, Jerry; Lacount, Rachel A; Thompson, Hannis W; Refaai, Majed A; Quillen, Karen; Lopez, Ana Ortega; Goldfinger, Dennis; Muram, Talia; Thompson, Hannis
The following abstracts are compiled from Check Sample exercises published in 2008. These peer-reviewed case studies assist laboratory professionals with continuing medical education and are developed in the areas of clinical chemistry, cytopathology, forensic pathology, hematology, microbiology, surgical pathology, and transfusion medicine. Abstracts for all exercises published in the program will appear annually in AJCP.
Full Text Available This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced with images from the world of Japanese art, history, and popular culture. These substitutions either gloss over the gaps between Western and Japanese world views or meld them into a new form, allowing the tarot entry into a different or hybrid metaphysical culture. Attention to tarot cards is important because of their great economic and cultural impact in contemporary Japan. A widespread love of tarot in Japan provides insight into domains of pleasure, spiritual exploration, and fandom.
This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced wit...
In the framework of a partnership between CERN and the TPG, all active and retired members of the CERN personnel will be able to purchase Unireso travel cards from the CERN Hostel - Building 39 (Meyrin site) from 1 February 2013. At the same time, the CERN Staff Association will stop selling cards to its members. How to order a travel card From 1 February onwards, travel cards can be ordered* directly from the reception of the CERN Hostel (Building 39) between the hours of 7.30 a.m. and 1.00 p.m. Mondays to Fridays: → a digital photograph will be taken when you order your card, → the card must be paid for, by credit card (EuroMaster, Visa or American Express) or in cash (Swiss francs only), when the order is placed. *Please note that cards ordered at CERN will not be valid until at least 8 working days after purchase. No reimbursement will be possible once the order has been placed. Prices Travel cards will be on sale at the following prices (including 8% VAT): Regi...
I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda
Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...
A swing check valve which includes a valve body having an inlet and outlet is described. A recess in the valve body designed to hold a seal ring and a check valve disc swingable between open and closed positions. The disc is supported by a high strength wire secured at one end in a support spacer pinned through bearing blocks fixed to the valve body and at its other end in a groove formed on the outer peripheral surface of the disc. The parts are designed and chosen such to provide a lightweight valve disc which is held open by minimum velocity of fluid flowing through the valve which thus reduces oscillations and accompanying wear of bearings supporting the valve operating parts. (Auth.)
Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas
The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...
Le Guilly, Thibaut; Olsen, Petur; Pedersen, Thomas
This paper presents an offline approach to analyzing feature interactions in embedded systems. The approach consists of a systematic process to gather the necessary information about system components and their models. The model is first specified in terms of predicates, before being refined to t...... to timed automata. The consistency of the model is verified at different development stages, and the correct linkage between the predicates and their semantic model is checked. The approach is illustrated on a use case from home automation....
Morris, Brian G.; Bozeman, Richard J., Jr.
A magnetically operated check valve is disclosed. The valve is comprised of a valve body and a movable poppet disposed therein. A magnet attracts the poppet to hold the valve shut until the force of fluid flow through the valve overcomes the magnetic attraction and moves the poppet to an unseated, open position. The poppet and magnet are configured and disposed to trap a magnetically attracted particulate and prevent it from flowing to a valve seating region.
Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the
Bank for International Settlements
Executive summary Techniques for transferring credit risk, such as financial guarantees and credit insurance, have been a long-standing feature of financial markets. In the past few years, however, the range of credit risk transfer (CRT) instruments and the circumstances in which they are used have widened considerably. A number of factors have contributed to this growth, including: greater focus by banks and other financial institutions on risk management; a more rigorous approach to risk/re...
Full Text Available Credit risk is the most important risk banks have to face with. It occurs due to an obligation created because of debtors' capital and interest rate nonpayment. Debtors obligations non-fulfilment may lead to great losses and insolvency in bank's business. Credit risk is the crucial reason of bank's insolvency. Over 80% of bank's balance sheet is exposed to credit risk.
Chandgadkar, G.M.; Kohli, A.K.; Agarwal, R.G.; Chandra, Rajesh
Fuel handling controls for 235 MWe PHWR make use of Manual and Logic cards (MLCs) for providing safety interlocks. These cards consist of various type of logic blocks. By connecting these logic blocks all the safety interlocks required for fuel handling controls have been provided. Previously trouble shooting of these cards was done by means of logic probe. Since the method was manual, it was laborious and time consuming. PC based test setup has overcome this drawback and detects the fault at the component level within few seconds. It also gives printout of status of faulty MLC cards. Here motherboard has been designed having slots for insertion of MLC cards. The input/output connection of these cards are coming to two 50 pin FRC connectors. PC communicates through 144 line digital input/output card with MLC card under test. Software is user friendly and outputs suitable input patterns to the card under test and checks for output pattern. It compares this output pattern with compare pattern and detects the fault and displays the symptoms. This system is currently in use at test facility for fuelling machine for 235 MWe PHWR reactor at Refuelling Technology Division, Hall-7. This test setup has been proposed for use at NAPP and future reactors. (author). 4 figs., 1 annexure
A card index of coal users-payers was formed on the basis of an existing card file of payers which functions in development of an earlier subsystem of financial accounting of coal users by means of a corresponding reorganization of the available set of data and supplementing it with new data on users. The card index performs a monitor and address function. Checked and refined data are input in subsequent technological cycles of data conversion. The structure of the card file, its functions, realization conditions with output of necessary following results are examined.
Full Text Available Risk management is one of the most important branches of business and finance. Classification models are the most popular and widely used analytical group of data mining approaches that can greatly help financial decision makers and managers to tackle credit risk problems. However, the literature clearly indicates that, despite proposing numerous classification models, credit scoring is often a difficult task. On the other hand, there is no universal credit-scoring model in the literature that can be accurately and explanatorily used in all circumstances. Therefore, the research for improving the efficiency of credit-scoring models has never stopped. In this paper, a hybrid soft intelligent classification model is proposed for credit-scoring problems. In the proposed model, the unique advantages of the soft computing techniques are used in order to modify the performance of the traditional artificial neural networks in credit scoring. Empirical results of Australian credit card data classifications indicate that the proposed hybrid model outperforms its components, and also other classification models presented for credit scoring. Therefore, the proposed model can be considered as an appropriate alternative tool for binary decision making in business and finance, especially in high uncertainty conditions.
Polat, Seda; Gündem, Taflan Imre
In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.
Full Text Available The article examines the strength of laminating plastic cards at different lamination temperatures. For investigation purposes, two types of plastic substrate and films have been used. Laminate strength has been tested (CMYK to establish the impact of colours on the strength of laminate. The paper compares inks supplied by two different producers. The colour characteristics of CIE L*a*b* space before and after the lamination process have been found. According to lamination strength and characteristics of the colours, the most suitable inks, temperature and films have been chosen.
Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...
Mitsunaga, Erin M
During the Korean War, International Business Machines (IBM) punch cards were created for every individual involved in military combat. Each card contained all pertinent personal information about the individual and was utilized to keep track of all soldiers involved. However, at present, all of the information known about these punch cards reveals only their format and their significance; there is little to no information on how these cards were created or how to interpret the information contained without the aid of the computer system used during the war. Today, it is believed there is no one available to explain this computerized system, nor do the original computers exist. This decode strategy is the result of an attempt to decipher the information on these cards through the use of all available medical and dental records for each individual examined. By cross-referencing the relevant personal information with the known format of the cards, a basic guess-and-check method was utilized. After examining hundreds of IBM punch cards, however, it has become clear that the punch card method of recording information was not infallible. In some cases, there are gaps of information on cards where there are data recorded on personal records; in others, information is punched incorrectly onto the cards, perhaps as the result of a transcription error. Taken all together, it is clear that the information contained on each individual's card should be taken solely as another form of personal documentation.
Morris, Brian G.; Bozeman, Richard J., Jr.
Poppet in proposed check valve restored to closed condition by magnetic attraction instead of spring force. Oscillations suppressed, with consequent reduction of wear. Stationary magnetic disk mounted just upstream of poppet, also containing magnet. Valve body nonmagnetic. Forward pressure or flow would push poppet away from stationary magnetic disk so fluid flows easily around poppet. Stop in valve body prevents poppet from being swept away. When flow stopped or started to reverse, magnetic attraction draws poppet back to disk. Poppet then engages floating O-ring, thereby closing valve and preventing reverse flow. Floating O-ring facilitates sealing at low loads.
Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking
In 2015, legislation to improve access to dual-credit programs and to reduce disparities in access and completion--particularly for low income and underrepresented students--was enacted. The new law focused on expanding access to College in the High School but acknowledged issues in other dual-credit programs and reinforced the notion that cost…
Zamore, Stephen; Ohene Djan, Kwame; Alon, Ilan
This article provides a comprehensive review of scholarly research on credit risk measurement during the last 57 years applying bibliometric citation analysis and elaborates an agenda for future research. The bibliography is compiled using the Institute for Scientific Information (ISI) Web...... of Science (WOS) database and includes all articles with citations over the period 1960–2016. Specifically, the review is carried out using 1695 articles across 72 countries published in 442 journals by 2928 authors. The findings suggest that credit risk research is multifaceted and can be classified...... into six streams: (1) defaultable security pricing, (2) default intensity modeling, (3) comparative analysis of credit models, (4) comparative analysis of credit markets, (5) credit default swap (CDS) pricing, and (6) loan loss provisions. The article contributes through synthesizing and identifying...
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system
Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…
Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad
Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.
Natalya P. Anoshkina
Full Text Available The paper is devoted to the problem of credit loss management topical for modern Russian science and banking practice. The bank’s lending activity is an integral and the most profitable sphere of banking activity. Banks need to take credit risks inherent in their core business and minimize their impact through the establishment of advanced risk management systems. The study, reflected in the present paper, has been conducted in order to determine approaches to the organization of credit loss management in banking. Analysis of the system of management of credit risks and credit losses has shown that they have different scope, object and purpose. In this connection, there is an objective necessity to create a special subsystem for the management of credit losses in banks. On the basis of common bank approaches to credit risk management, the paper develops models of credit loss management: a multi-level management model in the area of ‘operational-tactical-strategic management’ and a functional management model in the area of ‘technology-execution-control’. These models are important for the modern theory and practice of banking, as they allow the bank to manage credit losses on the entire time horizon of the management process, thus opening a wide range of opportunities for the creation and implementation of large-scale programs, as well as specific techniques. This study allows drawing a conclusion about the need to consider control credit losses as a strictly regulated multi-level process, in which each division is assigned with specific objectives, tasks, functions, formally enshrined in the relevant lists, job descriptions and other legal documents.
van den Hout, M.; Kindt, M.
This paper attempts to explain why in obsessive-compulsive disorder (OCD) checkers distrust in memory persists despite extensive checking. It is argued that: (1) repeated checking increases familiarity with the issues checked; (2) increased familiarity promotes conceptual processing which inhibits
van de Pol, Jaco; Mousavi, Mohammad Reza; Sgall, Jiri
Model checking is an automated verification procedure, which checks that a model of a system satisfies certain properties. These properties are typically expressed in some temporal logic, like LTL and CTL. Algorithms for LTL model checking (linear time logic) are based on automata theory and graph
A pressurized nuclear reactor having an instrument assembly sheathed in a metallic tube which is extended vertically upward into the reactor core by traversing a metallic guide tube which is welded to the wall of the vessel is described. Sensors in each instrument assembly are connected to instruments outside the vessel to manifest the conditions within the core. Each instrument assembly probe is moved into position within a metallic guide channel. The guide channel penetrates the wall of the vessel and forms part of the barrier to the environment within the pressure vessel. Each channel includes a ball check valve which is opened by the instrument assembly probe when the probe passes through the valve. A ball valve element is moved from its seat by the probe to a position lateral of the bore of the channel and is guided to its seat along a sloped path within the valve body when the probe is removed. 5 claims, 3 figures
The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....
Credit risk is today one of the most intensely studied topics in quantitative finance. This book provides an introduction and overview for readers who seek an up-to-date reference to the central problems of the field and to the tools currently used to analyze them. The book is aimed at researchers...... and students in finance, at quantitative analysts in banks and other financial institutions, and at regulators interested in the modeling aspects of credit risk. David Lando considers the two broad approaches to credit risk analysis: that based on classical option pricing models on the one hand...
Full Text Available This paper follows to highlight the link between the results obtained applying discriminant analysis and lending decision. For this purpose, we have carried out the research on a sample of 24 Romanian private companies, pertaining to 12 different economic sectors, from I and II categories of Bucharest Stock Exchange, for the period 2010-2012. Our study works with two popular bankruptcy risk’s prediction models, the Altman model and the Anghel model. We have double-checked and confirmed the results of our research by comparing the results from applying the two fore-mentioned models as well as by checking existing debt commitments of each analyzed company to credit institutions during the 2010-2012 period. The aim of this paper was the classification of studied companies into potential bankrupt and non-bankrupt, to assist credit institutions in their decision to grant credit, understanding the approval or rejection algorithm of loan applications and even help potential investors in these ompanies.
T. M. Bolotskaya
Full Text Available Application method checking of statistical hypotheses fraud Point of Sale working with purchasing cards and suspected of accomplishment of unauthorized operations is analyzed. On the basis of the received results the algorithm is developed, allowing receive an assessment of works of terminals in regime off-line.
The subject of this diploma thesis is managing credit risk in banks, as the most significant risk faced by banks. The aim of this work is to define the basic techniques, tools and methods that are used by banks to manage credit risk. The first part of this work focuses on defining these procedures and describes the entire process of credit risk management, from the definition of credit risk, describing credit strategy and policy, organizational structure, defining the most used credit risk mi...
Credit Derivatives are securities that offer protection against credit or default risk of bonds or loans. The credit derivatives emerging market has grown rapidly and credit derivatives are widely used. This paper describes the emerging credit derivatives market structure. The current market activity is analyzed through elementary pricing dynamics and the study of the term structure of default risk. Focusing on the performance of credit derivatives in stress situation, including legal and mar...
Crast, J.; Silvis, G.
The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.
Acknowledges the good work of private schools but resists the provision of further direct or indirect government aid to these schools. Argues that tax credits will adversely affect public education and American society. (Author/WD)
Conde, J.M.; Recio, M.
The status of development of burnup credit for criticality safety analyses in Spain is described in this paper. Ongoing activities in the country in this field, both national and international, are resumed. Burnup credit is currently being applied to wet storage of PWR fuel, and credit to integral burnable absorbers is given for BWR fuel storage. It is envisaged to apply burnup credit techniques to the new generation of transport casks now in the design phase. The analysis methodologies submitted for the analyses of PWR and BWR fuel wet storage are outlined. Analytical activities in the country are described, as well as international collaborations in this field. Perspectives for future research and development of new applications are finally resumed. (author)
C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....
So, M.C.; Thomas, L.C.; Seow, H-V; Mues, C.
In consumer lending the traditional approach is to develop a credit scorecard which ranks borrowers according to their risk of defaulting. Bads have a high risk of default and Goods have a low risk. To maximise the profitability of credit card customers, a second classification between revolvers and transactors becomes important. Building a transactor/revolver scorecard together with a Good/Bad scorecard over the revolvers, gives rise to a risk decision system whose ranking of risk is compara...
Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described
The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2. EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...
... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...
... refund check, at the rate of exchange then used for his official disbursements by the disbursing officer... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Refunds and credits in foreign currency. 301....6316-8 Refunds and credits in foreign currency. (a) Refunds. The refund of any overpayment of tax which...
Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683
Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.
Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683
Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.
Human Resources Division; Human Resources Division; Tel. 79494-74683
Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.
Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.
Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683
Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.
Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.
James, Thomas G.; Norwood, Bill R.
This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…
A. Delavarkhalafi; A. Poursherafatan
In this paper we check the credit rating of firms applied for a loan. In this regard we introduce a model, named Dynamic Slack-Based Measure (DSBM) for measuring credit rating of applicant companies. Selection of financial ratios that represent the financial state of a company -in the best possible way- is one of the most challenging parts of any credit rating analysis. At first, ranking needs to identify the appropriate variables. Therefore we introduce five financial variables to provide a ...
Human Resources Division
Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.
We consider the problem of finding an optimal betting strategy for a house-banked casino card game that is played for several coups before reshuffling. The sampling without replacement makes it possible to take advantage of the changes in the expected value as the deck is depleted, making large bets when the game is advantageous. Using such a strategy, which is easy to implement, is known as card counting. We consider the case of a large number of decks, making an approximat...
...) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE...) Receipts for all STRE (actual vendor invoices or restaurant checks, rather than credit card receipts); (ii...
Dr. Otto Majewski, Chief Executive Officer of the Bayernwerk AG utility, in his capacity as Chairman of the European Nuclear Council pointed out at ENC 98 in Nice that national energy policies constituted a major danger to the use of nuclear power. At the same time, he indicated ways and means by which to evade that danger. The decisions taken in Sweden and in the Federal Republic of Germany to opt out of the use of nuclear power show that national energy policies can seriously jeopardize the use of nuclear power. Bayernwerk CEO Dr. Majewski urged nuclear power plant operators to counteract these tendencies by playing the European card. Nuclear power anyway was a classical topic of European cooperation which, in the past, had resulted in higher safety standards and in the development of the EPR. It should also be attempted, by working on European institutions, to strengthen the use of nuclear power, even on a national level. He invoked economic arguments against nuclear opponents, especially the preservation of competitiveness by means of lower electricity prices, and arguments of climate protection. (orig.) [de
Avaliação da aplicabilidade de um modelo de credit scoring com varíaveis sistêmicas e não-sistêmicas em carteiras de crédito bancário rotativo de pessoas físicas An evaluation on the applicability of a credit scoring model, with systemic and non-systemic variables in revolving bank credit portfolio for individuals
José Odálio dos Santos
Full Text Available As concessões de crédito rotativo às pessoas físicas (cheque especial e cartão de crédito vêm crescendo significativamente nos últimos anos, o que, em parte, é explicado pela relativa estabilização da economia, maior geração de empregos e êxito no controle da inflação - fatores que interferem diretamente na capacidade de pagamento dos tomadores. Paralelamente, observa-se uma maior exposição histórica dos Bancos ao risco de inadimplência, ou seja, o do não-recebimento (parcial ou total de créditos rotativos utilizados pelas pessoas físicas. Considerando o tamanho e a importância desse mercado aos grandes Bancos Comerciais e a economia como um todo, direciona-se essa pesquisa para: 1. detalhar os processos de análise subjetiva e objetiva de crédito realizada pelos principais Bancos privados nacionais; 2. abordar a função seletiva das taxas de juros em créditos rotativos; 3. destacar as principais características dos modelos de credit scoring e 4. propor um modelo de credit scoring para créditos rotativos composto por variáveis sistêmicas e não-sistêmicas, direcionado à redução do risco de inadimplência. A aplicabilidade do modelo proposto de credit scoring em uma amostra extraída da carteira de crédito de pessoas físicas de um importante Banco Comercial privado nacional de médio porte (Banco X - nome fictício, apresentou satisfatório índice de acerto na identificação de clientes prospectivos (96% e não-prospectivos (92%, levando à conclusão de que incluía e ponderava, adequadamente, as variáveis representativas da capacidade de pagamento dos tomadores.The concessions of revolving credit to consumers (guaranteed check and credit card have been growing significantly in the last few years, which is in part explained by the relative stabilization of the economy, higher levels of job creation and success in controlling inflation - factors that have a direct influence in the borrowers’ payment
Frandsen, Anne Kathrine; Bertelsen, Niels Haldor; Haugbølle, Kim
During the past two years the Nordic Baltic research project CREDIT (Construction and Real Estate – Developing Indicators for Transparency) has worked with the aim to improve transparency of value creation in building and real estate. One of the central deliverables of the CREDIT project was a fr......During the past two years the Nordic Baltic research project CREDIT (Construction and Real Estate – Developing Indicators for Transparency) has worked with the aim to improve transparency of value creation in building and real estate. One of the central deliverables of the CREDIT project...... was a framework of indicators relevant in building and real estate and applicable in the Nordic and Baltic countries as well as a proposal for a set of key indicators. The study resulting in CREDIT Performance Indicator Framework has been based on 28 case studies of evaluation practises in the building and real...... estate sector each addressing three interlinked levels: building/ projects level, company or enterprise level and benchmarking system level. Additionally it has been based on dialogue with researchers and professional organisation, international research and standardisation work and national building...
Larsen, Kim Guldstrand
This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based...
Ramezani Taghiabadi, E.; Fahland, D.; Aalst, van der W.M.P.
Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing
Ralph, Lisa M.
Access to consumer credit as a means of building wealth is one of the least examined forms of social inequality. The recent economic crisis in the United States has brought attention to the significance of consumer credit in our nation's economy; however, less understood are the specific obstacles and barriers that prevent low-income individuals from reaching the "American Dream." In an exploratory manner, this study compared credit access, credit literacy, and credit experience of low-income...
Michael S. Gibson
The striking growth of credit derivatives suggests that market participants find them to be useful tools for risk management. I illustrate the value of credit derivatives with three examples. A commercial bank can use credit derivatives to manage the risk of its loan portfolio. An investment bank can use credit derivatives to manage the risks it incurs when underwriting securities. An investor, such as an insurance company, asset manager, or hedge fund, can use credit derivatives to align its...
Credit risk is defined as that risk of financial loss caused by failure by the counterparty. According to statistics, for financial institutions, credit risk is much important than market risk, reduced diversification of the credit risk is the main cause of bank failures. Just recently, the banking industry began to measure credit risk in the context of a portfolio along with the development of risk management started with models value at risk (VAR). Once measured, credit risk can be diversif...
Eastern Michigan Univ., Ypsilanti. National Inst. for Consumer Education.
Summaries are provided of 37 projects that address the credit education and information needs of consumers. The projects are supported by AT&T Universal Card Services Corp. through a fund managed by the National Coalition for Consumer Education. Each summary provides a project description, grant recipient, and address/telephone number. The…
Lenderman, Ed; And Others
Following a review of the mathematics topics taught in accounting, electronics, auto, food and clothing, and metals courses at Linn-Benton Community College, Albany, Oregon, recommendations were made to grant one semester of mathematics credit for completing a two-year sequence of these courses. The other required semester of mathematics should be…
F.M. van Oers; R.A. de Mooij (Ruud)
textabstractIn recent policy discussions in the Netherlands, the Earned Income Tax Credit (EITC) has been put forward as an effective instrument to reduce the unemployment rate among low-skilled workers. Using the MIMIC model, this article shows that a targeted EITC at low incomes indeed seems
This article examines the effect of tax credits and related legislation under consideration by Congress on the economics of the renewable energy industry. The topics discussed in the article include conflicting industry opinion on financial incentives, the effectiveness of current incentives, and alternative approaches. The article also includes a sidebar on tax incentives offered by state programs
Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA
A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...
Rodriguez Sacco, Walter.
The equipment described pretends to be a further step to the use of integrated circuits in nuclear instrumentation, considering that this type of control was traditionally carried out on the bases of electromechanical elements. A continuous self-check method has been applied in accordance with the high reliability requiered for this type of equipments. The developed equipment fulfils the condition that any deficiency in its component elements, causes an anormal self-detected operation. The equipment covers two systems: the Scram one, that includes the sequence generator-detector, the rods check and scram chain, and the Check system that uses pulses from the sequence detector. (author) [es
Meltem Gulenay Chadwick
Full Text Available This paper proposes a panel VAR model to uncover the effect of monetary policy and macroprudential tightening probability on general purpose loans, housing loans, vehicle loans, credit cards and their respective volatilities in Turkey. To conduct our analysis, first, we compare a number of stochastic volatility models using our loan and credit card series in a formal Bayesian model comparison exercise, in order to determine the best volatility model for our series. Second we disclose the latent probability of macroprudential tightening from the binary information of policy episodes, using an instrumental variable probit model estimated by conditional maximum likelihood with heteroscedasticity robust standard errors. Lastly we estimate the dynamic impact of monetary policy and macroprudential measures using a panel VAR, incorporating the latent probability of tightening episodes, credit growth, industrial production growth, loan rates, inflation and credit growth volatilities into the endogenous system of equations. We conclude that macroprudential tightening is effective in dampening credit growth, credit growth volatility and reducing consumer price inflation. Besides, this effect is more prominent when macroprudential tools are administered in coordination with monetary policy. Keywords: Consumer loans, Monetary policy, Macroprudential policy, Stochastic volatility models, Credit growth volatility, IV probit model, Panel VAR model, JEL classification: C54, E44, E52
Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683
Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683
Division des Ressources Humaines
Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683
Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of personnel concerned that they are obliged to: • hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; • return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken towards the member of personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide. Users and Unpaid Associates must contact the Users Office HR Department Tel.: 729...
Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of the personnel concerned that they are obliged to: hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken with respect to the member of the personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide: https://cern.ch/admin-eguide/cartes/proc_cartes_home.asp Users and Unpaid Associates must ...
Emission trading is a good concept and approach to tackle global warming. However, what ''currency'' or ''credit'' should be used in the trading has remained a debatable topic. This paper proposed an ''Energy Credit'' concept as an alternative to the ''CO 2 credit'' that is currently in place. From the thermodynamic point of view, the global warming problem is an ''energy balance'' problem. The energy credit concept is thought to be more thermodynamically correct and tackles the core of the global warming problem more directly. The Energy credit concept proposed can be defined as: the credit to offset the extra energy trapped/absorbed in the earth (and its atmosphere) due to the extra anthropogenic emission (or other activities) by a country or company. A couple of examples are given in the paper to demonstrate the concept of the Energy credit and its advantages over the CO 2 credit concept. (author)
The credit derivative market was established at the beginning of the 1990s since the emergence of credit derivatives fits the rapid development of the whole derivatives market. However, compare to other derivative market, this market is still small and incomplete. As with other derivatives, credit derivatives can be used to either take more risk or hedge it, hence various credit derivatives instruments are accepted and widely used by market participants such as banks, insurance companies, etc...
Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...
Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger
Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...
Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A
The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.
Motivation - Under the new upgrade of the CMS detector the working temperature of the trackers had been reduced to -27 Celsius degrees. Though the thermal sensors themselves (Murata and Fenwal thermistors) are effective at these temperatures, the max1542 PLC (programmable logic controller) cards, interpreting the resistance of the thermal sensors into DC counts usable by the DCS (detector control system), are not designed for these temperatures in which the counts exceed their saturation and therefor had to be replaced. In my project I was in charge of handling the emplacement and calibration of the new PLC cards to the TOB (tracker outer barrel) control system.
Penix, John; Visser, Willem; Norvig, Peter (Technical Monitor)
When using model checking to verify programs in practice, it is not usually possible to achieve complete coverage of the system. In this position paper we describe ongoing research within the Automated Software Engineering group at NASA Ames on the use of test coverage metrics to measure partial coverage and provide heuristic guidance for program model checking. We are specifically interested in applying and developing coverage metrics for concurrent programs that might be used to support certification of next generation avionics software.
Board of Governors of the Federal Reserve System, Washington, DC.
The five sections of this consumer handbook are The Cost of Credit, Applying for Credit, Credit Histories and Records, Correcting Credit Mistakes, and Complaining about Credit. Each section discusses relevant legislation: Truth in Lending, the Equal Credit Opportunity Act, and the Fair Credit Reporting Act. Topics discussed in section I include…
Pierce, Gerald A.
An optical-card reader/writer optical and electronic breadboard system, developed by SRI International under contract to Drexler Technology, is described. The optical card, which is the same size as a credit card, can contain more than 2 megabytes of digital user data, which may also include preformatted tracking information and preformatted data. The data layout on the card is similar to that on a floppy disk, with each track containing a header and clocking information. The design of this optical reader/writer system for optical cards is explained. Design of the optical card system entails a number of unique issues: To accommodate both laser-recorded and mass-duplicated information, the system must be compatible with preencoded information, which implies a larger-than-normal spot size (5 gm) and a detection system that can read both types of optical patterns. Cost-reduction considerations led to selection of a birefringent protection layer, which dictated a nonstandard optical system. The non-polarization-sensitive optics use an off-axis approach to detection. An LED illumination system makes it possible to read multiple tracks.
National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...
Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)
Christoffersen, Peter; Jacobs, Kris; Jin, Xisong
We characterize diversification in corporate credit using a new class of dynamic copula models which can capture dynamic dependence and asymmetry in large samples of firms. We also document important differences between credit spread and equity return dependence dynamics. Modeling a decade...... the crisis and remain high as well. The most important shocks to credit dependence occur in August of 2007 and in August of 2011, but interestingly these dates are not associated with significant changes to median credit spreads....
Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei
Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)
Ю. В. Романенкова
Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated
Is it possible to reduce greenhouse gas emissions by assigning a value to CO 2 ? That's the concept behind carbon credits. Their advantage: they set targets but let companies decide how to meet them. Of all the processes that can be used to reduce air pollution, the cap and trade system is the best way to meet global targets on a national or continental scale. The system's efficiency is based on setting a ceiling for emissions: this is the cap. The emissions quotas are negotiable goods that can be traded on a market: this is the 'trade'. No company can exceed its quotas, but it can choose how to meet them: decreasing its emissions by changing its production processes, buying carbon credits sold by companies that have exceeded their targets, or using clean development mechanisms. For a carbon credit system to function correctly on an economic level, it's essential to meet one condition: don't allocate too many emissions quotas to the companies involved. If they receive too many quotas, it's not hard for them to meet their objectives without changing their production processes. The supply of carbon credits currently exceeds demand. The price per ton of CO 2 is collapsing, and companies that have exceeded their targets are not rewarded for their efforts. Efficient though it may be, the cap and trade system cannot be the only way to fight CO 2 emissions. In Europe, it presently covers 40% of the CO 2 emissions by targeting utilities and industries that consume the most fossil fuels. But it cannot be extended to some sectors where pollution is diffuse. In transportation, for example, it's not possible to impose such a requirement. For that sector, as well as for the building sector, a suitable system of taxes might be effective and incentive
Svetlana Andrianova; Badi H. Baltagi; Panicos O. Demetriades; David Fielding
We put forward a plausible explanation of African financial underdevelopment in the form of a bad credit market equilibrium. Utilising an appropriately modified IO model of banking, we show that the root of the problem could be unchecked moral hazard (strategic loan defaults) or adverse selection (a lack of good projects). We provide empirical evidence from a large panel of African banks which suggests that loan defaults are a major factor inhibiting bank lending when the quality of regulatio...
Vojtek, Martin; Kočenda, Evžen
Roč. 56, 3-4 (2006), s. 152-167 ISSN 0015-1920 R&D Projects: GA ČR GA402/05/0931 Institutional research plan: CEZ:AV0Z70850503 Keywords : banking sector * credit scoring * discrimination analysis Subject RIV: AH - Economics Impact factor: 0.190, year: 2006 http://journal.fsv.cuni.cz/storage/1050_s_152_167.pdf
There is continuing controversy over the importance of credit constraints. This paper investigates whether total household expenditure and debt is affected by an exogenous increase in access to credit provided by a credit market reform that enabled Danish house owners to use housing equity...
Pejic, Nicholas G
The author summarizes his experience with palm and Tarot card readers in New Orleans. The history, practice, and psychodynamics of palmistry and Tarot are explored. It's postulated that these practices are forms of archaic psychotherapy, which employ supportive treatment and placebo. These tactics are used to elicit hope for its clients.
Dimitrov, Smilen; Serafin, Stefania
The architecture of a sound card can, in simple terms, be described as an electronic board containing a digital bus interface hardware, and analog-to-digital (A/D) and digital-to-analog (D/A) converters; then, a soundcard driver software on a personal computer's (PC) operating system (OS) can con...
Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.
We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.
Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.
Darko, Robert J.
The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.
Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)
Lydiatt, I. [KeySpan Energy Canada, Calgary, AB (Canada)
This Power Point presentation presented the basics of a credit policy with reference to corporate objectives, governance, credit definitions, subjective/objective elements, quantification of full risk, management, monitoring, reporting and gate-keeping processes. Options for a credit policy were described as being approval authority grids, confidentiality issues, credit scoring, corporate risk levels, follow-up collection calling, and procedures on unapproved exposures. Recommendations for setting risk and credit limits were also presented with a note emphasizing that in the past 6 months credit evaluation processes have had to deal with the media risk, a new risk that has not been seen before. This risk can be addressed by careful monitoring of stock prices. The paper also presented recommendations for what to look for as indicators and how to deal with risk in volatile price periods. Credit tools for volatile times were described. 1 tab.
This Power Point presentation presented the basics of a credit policy with reference to corporate objectives, governance, credit definitions, subjective/objective elements, quantification of full risk, management, monitoring, reporting and gate-keeping processes. Options for a credit policy were described as being approval authority grids, confidentiality issues, credit scoring, corporate risk levels, follow-up collection calling, and procedures on unapproved exposures. Recommendations for setting risk and credit limits were also presented with a note emphasizing that in the past 6 months credit evaluation processes have had to deal with the media risk, a new risk that has not been seen before. This risk can be addressed by careful monitoring of stock prices. The paper also presented recommendations for what to look for as indicators and how to deal with risk in volatile price periods. Credit tools for volatile times were described. 1 tab
Eskridge, R.E.; Polansky, A.C.; Alduchov, O.A. [National Oceanic and Atmospheric Administration, Asheville, NC (United States). National Climatic Data Center] [and others
The possibility of anthropogenic climate change has reached the attention of Government officials and researchers. However, one cannot study climate change without climate data. The CARDS project will produce high-quality upper-air data for the research community and for policy-makers. The authors intend to produce a dataset which is: easy to use, as complete as possible, as free of random errors as possible. They will also attempt to identify biases and remove them whenever possible. In this report, they relate progress toward their goal. They created a robust new format for archiving upper-air data, and designed a relational database structure to hold them. The authors have converted 13 datasets to the new format and have archived over 10,000,000 individual soundings from 10 separate data sources. They produce and archive a metadata summary of each sounding they load. They have researched station histories, and have built a preliminary upper-air station history database. They have converted station-sorted data from their primary database into synoptic-sorted data in a parallel database. They have tested and will soon implement an advanced quality-control procedure, capable of detecting and often repairing errors in geopotential height, temperature, humidity, and wind. This unique quality-control method uses simultaneous vertical, horizontal, and temporal checks of several meteorological variables. It can detect errors other methods cannot.
Full Text Available An efficient system of credit information sharing contributes to solving the problem of information asymmetry on the credit and financial markets in general. The consequences of the global economic and financial crisis revealed an increasing demand for reliable information and data which could close the existing gap in their insufficiency, misuse or inadequate analytical value for the economic and financial policy makers. In that sense, more attention is directed to the usefulness of credit information sharing and the practical value of information and data contained in credit bureau reports for the purposes of achieving the overall economic policy goals. The fulfillment of that role depends mostly on the credit information sharing system and its characteristics, participants, and procedures. A credit bureau report in the best possible manner reflects all advantages and disadvantages of the established credit information exchange system in terms of its analytical value for the purposes of efficient macroeconomic and macrofinancial policies.
Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)
In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)
Quisquater, Jean-Jacques; Samyde, David
In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight
Nelson Camanho; Pragyan Deb; Zijun Liu
In principle, credit rating agencies are supposed to be impartial observers that bridge the gap between private information of issuers and the information available to the wider pool of investors. However, since the 1970s, rating agencies have relied on an issuer-pay model, creating a conflict of interest the largest source of income for the rating agencies are the fees paid by the issuers the rating agencies are supposed to impartially rate. In this paper, we explore the trade-off between re...
Neelam C. Poudyala; Jacek P. Siry; J.M. Bowker
While the urban forest is considered an eligible source of carbon offset credits, little is known about its market potential and the quality aspects of the credits. As credit suppliers increase in number and credit buyers become more interested in purchasing carbon credits, it is unclear whether and how urban forest carbon credits can perform relative to the other...
Fahland, D.; Leoni, de M.; Dongen, van B.F.; Aalst, van der W.M.P.
The usefulness of process models (e.g., for analysis, improvement, or execution) strongly depends on their ability to describe reality. Conformance checking is a technique to validate how good a given process model describes recorded executions of the actual process. Recently, artifacts have been
Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just
This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is still...
Werf, van der J.M.E.M.; Verbeek, H.M.W.; Aalst, van der W.M.P.; Barros, A.; Gal, A.; Kindler, E.
Organizations face more and more the burden to show that their business is compliant with respect to many different boundaries. The activity of compliance checking is commonly referred to as auditing. As information systems supporting the organization’s business record their usage, process mining
Hasling, Karen Marie; Ræbild, Ulla
Product longevity is considered widely as a relevant strategic approach, amongst many, within the field of sustainability. Yet, how to design for increased product lifetime may not be so obvious for practitioners. The complexity of the surrounding issues can constitute a barrier for designers...... for designers and other stakeholders in the design process. The paper is based on a developmental project carried out in the Autumn 2017, within a larger research and collaboration project between raw fur manufacturer Kopenhagen Fur and Design School Kolding investigating sustainability perspectives. The paper...... describes the development of a deck of sustainability cards aiming for product longevity and presents the final deck. Furthermore, the paper contributes with insights on how designers may apply design cards in the design process and how this practice can further sustainable considerations and strategies...
Gingl, Zoltan; Mingesz, Robert; Mellar, Janos; Makra, Peter
Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card - an interface for analogue signals. It is possible to make very simple yet highly accurate photogates for cents, while much more sophisticated solutions are also available at a still very low cost. In our paper we show several experimentally tested ways of implementing sound card photogates in detail, and we also provide full-featured, free, open-source photogate software as a much more efficient experimentation tool than the usually used sound recording programs. Further information is provided on a dedicated web page, www.noise.physx.u-szeged.hu/edudev.
Full Text Available Lending money to different borrowers is profitable, but risky. The profits come from the interest rate and the fees earned on the loans. Banks do not want to make loans to borrowers who cannot repay them. Even if the banks do not intend to make bad loans, over time, some of them can become bad. For instance, as a result of the recent financial crisis, the capability of many borrowers to repay their loans were affected, many of them being on default. That’s why is important for the bank to monitor the loans. The purpose of this paper is to focus on credit scoring main issues. As a consequence of this, we presented in this paper the scoring model of an important Romanian Bank. Based on this credit scoring model and taking into account the last lending requirements of the National Bank of Romania, we developed an assessment tool, in Excel, for retail loans which is presented in the case study.
Simona de Portu
Full Text Available Introduction: cardiovascular diseases (CVD are the major component of premature mortality, generate disability and are a relevant source of cost. The growing incidence of CVD is associated with lifestyle and other modifiable risk factors. Prevention and preclinical detection of CVD reduce morbidity and mortality. Type 2 diabetes is associated with a substantially increased risk of cardiovascular disease. Objective: the aim of the study was to evaluate the health economic consequence of medical therapy with atorvastatin for primary prevention of major cardiovascular events in patients with type 2 diabetes in Italy. Materials and method: in order to reach our objective we drew clinical information from the CARDS study. This economic evaluation was carried out conducting a cost/effectiveness analysis from the perspective of National Health Service (NHS. The analysis was applied to a time horizon in conformity with the observational period adopted in the CARDS study (3.9 years. An incremental cost/effectiveness ratio (ICER was calculated and is expressed as cost per life years gained (LYG. In order to test the robustness of the results, a one-way sensitivity analysis was performed. Results: the total cost of atorvastatin therapy over 3.9 years amounts to around 1.5 million of euros per 1,000 patients. The total cost of adding atorvastatin to standard care in people treated for primary prevention of major cardiovascular events in type 2 diabetes as those involved in the CARDS study would entail an additional cost of about 1,2 million of euros per 1,000 patients treated per 3.9 years, with an incremental cost/effectiveness ratio (ICER equivalent to 36,566 euros per patient per LYG. Discussion: the current study is the first economic evaluation of CARDS study to the Italian situation. The results of the current study show that hypolipemic therapy with atorvastatin 10 mg in diabetic individuals is to be considered cost effective.
Sayag, E; Danon, Y L
The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.
Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert
The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players , i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual
The rh-flash card main purpose is to convert and store the image of the analog data present at input into an output buffer, namely in a given timing window besides a stop signal (like a digital oscilloscope). It is conceived in VME format 1U wide with an additional connector. Novelty of this card is its ability to sample at a high frequency, due to flash coders, and this at a high repetition rate. To do that the card allows the storage of the data considered 'useful' and that is done by storing only the data exceeding a certain threshold. This can be useful for instance for viewing peaks in a spectrum, and obtaining their relative location. The goal is to stock and process the data sampled before and after the arrival of a stop signal (what entails a storage depth). A threshold is defined and any peak exceeding its level will really be stored in the output buffer which is readable through the VME bus. The peak values will be stored as well as m preceding and n subsequent values (both programmable). Obviously, if the threshold is zero the system of data processing is off and all data will be stored. The document is structured on six sections titled: 1. Description; 2. Specifications; 3. Explaining the design of channels; 4. Explaining the shared part of the design; 5. Addressing (→ user guide); 6. Software precautions. (author)
Gustavo L. Knop
Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.
... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Bad checks. 70.101 Section....101 Bad checks. If any check or money order in payment of any amount receivable under Title 26 of the... appropriate TTB officer that such check was tendered in good faith and that such person had reasonable cause...
This dissertation deals with four important aspects of model checking Markov chains: the development of efficient model-checking tools, the improvement of model-checking algorithms, the efficiency of the state-space reduction techniques, and the development of simulation-based model-checking
Boom, Jan-Tjeerd; R. Dijstra, Bouwe
This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...
... Economic Analysis (BEA), U.S. Department of Commerce, would conduct the survey under the International... DEPARTMENT OF COMMERCE Bureau of Economic Analysis 15 CFR Part 801 [Docket No. 110817508-1529-01...-Border Credit, Debit, and Charge Card Transactions AGENCY: Bureau of Economic Analysis, Commerce. ACTION...
Đurđana Ozretić Došen
Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.
Sicking, Joachim; Guhr, Thomas; Schäfer, Rudi
We consider the problem of concurrent portfolio losses in two non-overlapping credit portfolios. In order to explore the full statistical dependence structure of such portfolio losses, we estimate their empirical pairwise copulas. Instead of a Gaussian dependence, we typically find a strong asymmetry in the copulas. Concurrent large portfolio losses are much more likely than small ones. Studying the dependences of these losses as a function of portfolio size, we moreover reveal that not only large portfolios of thousands of contracts, but also medium-sized and small ones with only a few dozens of contracts exhibit notable portfolio loss correlations. Anticipated idiosyncratic effects turn out to be negligible. These are troublesome insights not only for investors in structured fixed-income products, but particularly for the stability of the financial sector. JEL codes: C32, F34, G21, G32, H81.
Nejedla, B; Krotil, J
The light source is designed for calibrating photomultipliers and checking the function of the thermoluminescent dosemeters evaluation equipment. The check light source consists of a polymer material-based (polyvinyl toluene) plastic scintillator and a 2-phenyl-5-(4-bisphenyl)-1,3,4-oxadiazol and/or paraterphenyl activator, and of emission spectrum shifters for response in the green and the blue light regions. The plastic scintillator is sealed in a case to whose bottom a radiation source is fixed, such as a /sup 90/Sr-/sup 90/Y source of an activity of 1.85x10/sup 3/s/sup -1/ to 0.74x10/sup 9/s/sup -1/.
Lam Tak Ming
Full Text Available Octopus cards are an electronic payment system based on a wireless RFID technology developed in Hong Kong. Users simply hold their contactless smartcards over an electronic reader, and the payment is deducted from the card automatically. If users link their cards to their credit card to upload money, there is no cash transaction involved. Launched in 1997, Octopus cards are the world’s most widely accepted contactless RFID electronic payment system. The system generates value for customers, service providers, and societies.This article makes a theoretical and applied contribution to our understanding of strategic information systems. It adopts and modifies Porter’s value chain and develops value‐chain flexibility as a theoretical framework to analyze the Octopus card system. The fast and dramatic changes in customer needs, business competition, and technological innovation are creating an urgent need for flexibility throughout the whole value chain. By looking at order fulfillment as a process, the shop outlet—either online or offline—is only part of the entire flow from customer enquiry to customer receipt. It is clear that no single idea could significantly reduce customer lead time. Only a total effort from organizations to increase flexibility and eliminate bottlenecks can make the kind of difference needed to compete (Day, 1994; Blackburn, 1991; Yusuf, Sarhadi, & Gunasekran, 1999. Therefore, value chain flexibility must be broadly defined, and it should be applied in the service industry. In other words, organizations should be able to deal with the uncertainty along the value chain to meet customer demands. This framework analyzes how the Octopus card system creates value and, in doing so, identifies key implications for customers, service providers, and society
Sharp, Paul Richard; Weisdorf, Jacob Louis
The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negativcorrelation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth cen...... shows that this result is not in fact inconsistent with a stylized Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply...
Weisdorf, Jacob Louis; Sharp, Paul Richard
The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negative correlation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth c...... model shows that this result is not in fact inconsistent with a stylised Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply....
Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine
The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....
Valente, Andrea; Lyon, Kirstin Catherine
Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....
Oz Shy; Zhu Wang
This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...
Stanley J. Sienkiewicz
This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...
Flórez Alarcón, Noel Alberto; Fundación Valle de Lili
Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?
Full Text Available Purpose: The study herein develops and tests a credit scoring model which can help financial institutions in assessing credit requests. Design/methodology/approach: The empirical study has the objective of answering two questions: (1 Which ratios better discriminate the companies based on their being solvent or insolvent? and (2 What is the relative importance of these ratios? To do this, several statistical techniques with a multifactorial focus have been used (Multivariate Analysis of Variance, Linear Discriminant Analysis, Logit and Probit Models. Several samples of companies have been used in order to obtain and to test the model. Findings: Through the application of several statistical techniques, the credit scoring model has been proved to be effective in discriminating between good and bad creditors. Research limitations: This study focuses on manufacturing, commercial and services companies of all sizes in Spain; Therefore, the conclusions may differ for other geographical locations. Practical implications: Because credit is one of the main drivers of growth, a solid credit scoring model can help financial institutions assessing to whom to grant credit and to whom not to grant credit. Social implications: Because of the growing importance of credit for our society and the fear of granting it due to the latest financial turmoil, a solid credit scoring model can strengthen the trust toward the financial institutions assessment’s. Originality/value: There is already a stream of literature related to credit scoring. However, this paper focuses on Spanish firms and proves the results of our model based on real data. The application of the model to detect the probability of default in loans is original.
Byiers, Bruce; Rand, John; Tarp, Finn
This paper uses two industrial firm surveys to identify the key determinants of credit demand in Mozambican manufacturing. We construct five different measures of being credit constrained and estimate desired debt demand. Besides firm size and ownership structure, we find evidence that general...
Augenblick, John; McGuire, Kent
Approaches for using the federal income tax system to aid families of pupils attending private schools include: tax credits, tax deductions, tax deferrals, and education savings incentives. Tax credit structures can be made refundable and made sensitive to taxpayers' income levels, the level of education expenditures, and designated costs.…
This 'report card' provides a summary of actions taken, and progress achieved by the federal government, the provincial government and the City of Toronto, respectively, in response to various previous commitments regarding air quality, sustainable transportation, climate and atmospheric research, investing in green infrastructure (federal government), environmental assessment regulations, transboundary air pollution, improved monitoring and reporting regulations. Ratings also cover efforts in imposing emissions caps on the electric industry, emissions reduction trading system, toll-free public air pollution hotline, regulation of ozone depleting substances (provincial government), public education campaign on smog reduction, energy efficiency initiatives, corporate smog alert response plan, and a number of other environmental issues (City of Toronto)
de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter
To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features
John O' Raw
Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Credit analysis. 703.6 Section 703.6 Banks and... ACTIVITIES § 703.6 Credit analysis. A Federal credit union must conduct and document a credit analysis on an... Federal Deposit Insurance Corporation. A Federal credit union must update this analysis at least annually...
... 7 Agriculture 15 2010-01-01 2010-01-01 false Credit quality. 4280.139 Section 4280.139 Agriculture... Improvements Program Section B. Guaranteed Loans § 4280.139 Credit quality. The lender must determine credit quality and must address all of the elements of credit quality in a written credit analysis, including...
Credit ratings have a key role in modern financial markets as they communicate crucial information on the creditworthiness of a debt issuer to investors and regulators. These credit ratings are mostly determined by three rating agencies, namely Standard & Poor’s, Moody’s and Fitch, even though, the credit rating industry counts a dozen of recognized rating agencies. Indeed, the three agencies have become the market leaders with a market share of 94.3% on the U.S market (Bloomberg, 2015) and 9...
Forde, S E
Scientists require a certain beam quality produced by the accelerator rings at CERN. The discovery potential of LHC is given by the reachable luminosity at its interaction points. The luminosity is maximized by minimizing the beam size. Therefore an accurate beam size measurement is required for optimizing the luminosity. The wire scanner performs very accurate profile measurements, but as it can not be used at full intensity in the LHC ring, it is used for calibrating other profile monitors. As the current wire scanner system, which is used in the present CERN accelerators, has not been made for the required specification of the LHC, a new design of a wire scanner motion control card is part of the LHC wire scanner project. The main functions of this card are to control the wire scanner motion and to acquire the position of the wire. In case of further upgrades at a later stage, it is required to allow an easy update of the firmware, hence the programmable features of FPGAs will be used for this purpose. The...
Boden, Lauren J.; Jolivette, Kristine; Alberto, Paul A.
Check-in/check-out is a secondary-tier intervention within the positive behavior interventions and supports framework. Check-in/check-out pairs the use of an adult mentor with a daily progress report to help students meet individualized behavioral goals. This study adds to the research base by examining the effects of check-in, check-up, check-out…
Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)
Hansen, René Rydhof; Probst, Christian W.
Non-interference is the property of a program not to leak any secret information. In this paper we propose a notion of non-interference for an abstract version of the Java Card bytecode language. Furthermore an information-flow analysis for verifying non-interference is developed and proved sound...... that confidential information is unavailable after a certain point---and that this unavailability is enforced by the system. This is a crucial requirement for systems like e-commerce or e-voting....... and correct with respect to the formal semantics of the language. The information-flow analysis can automatically verify the absence of leaks in a program, thus proving non-interference. Based on the definition of non-interference we propose a notion of simple erasure policies. These allow to statically check...
Bonin, Therese M.; Birckbichler, Diane W.
A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)
Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)
Mohrweis, Lawrence C.; Shinham, Kathe M.
This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…
Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)
Baruni, Kedimotse P
Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...
Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.
The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.
This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...
A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)
... 25 Indians 1 2010-04-01 2010-04-01 false Bad checks. 11.421 Section 11.421 Indians BUREAU OF... Criminal Offenses § 11.421 Bad checks. (a) A person who issues or passes a check or similar sight order for..., and the issuer failed to make good within 10 days after receiving notice of that refusal. ...
Remke, Anne Katharina Ingrid
In the past probabilistic model checking hast mostly been restricted to finite state models. This thesis explores the possibilities of model checking with continuous stochastic logic (CSL) on infinite-state Markov chains. We present an in-depth treatment of model checking algorithms for two special
Robert S. Pindyck
I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...
Millennium Challenge Corporation — The analysis of WtM credit used baseline and final follow-up Farming Practices Survey (FPS) data to summarize beneficiary and loan characteristics, as well as to...
Al-Ayat, R.A.; Judd, B.R.
Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is now focusing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. The authors discuss the general trends in insider protection and the limitations of protection measures currently in use. They also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel
Al-Ayat, R.A.; Judd, B.R.
Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is not focussing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. We discuss the general trends in insider protection and the limitations of protection measures currently in use. We also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel
Mariana Rodica TIRLEA
Full Text Available This type of coin and appeared as a result of the needs for a proper management of the financial resources available in the market, but also to improve the payments system in our country. The card is an alternative to the conventional instruments of payment is a payment instrument with and without cash by means of which the holder disposes of the current account. It is a standardized, secure information and individualized, through which you can perform operations of cash withdrawal, payment for the goods or services purchased, payment obligations by the public administration authorities and funds transfers between accounts, other than those ordered and executed by financial institutions, carried out through the electronic payment instrument.
Smith, Janet Kiholm
Commonly used trade credit terms implicitly define a high interest rate that operates as an efficient screening device where information about buyer default risk is asymmetrically held. By offering trade credit, a seller can identify prospective defaults more quickl y than if financial institutions were the sole providers of short-ter m financing. The information is valuable in cases where a seller has made nonsalvageable investments in buyers since it enables the seller to take actions to pr...
This paper analyzes the trade-off between financial stability and credit rationing that arises when increasing capital requirements. It extends the Stiglitz-Weiss model of credit rationing to allow for bank default. Bank capital structure then matters for lending incentives. With default and rationing endogenous, optimal capital requirements can be analyzed. Introducing bank financiers, the paper also shows that uninsured funding raises the sensitivity of rationing to capital requirements. In...
Adolfo Barajas; Roberto Steiner
This study examines the recent marked slowdown in bank credit to the private sector in Latin America. Based on the study of eight countries (Argentina, Bolivia, Brazil, Chile, Colombia, Peru, Mexico, and Venezuela), the magnitude of the slowdown is documented, comparing it to historical behavior and to slowdown episodes in other regions of the world. Second, changes in bank balance sheets are examined to determine whether the credit slowdown is merely a reflection of a slowdown in bank deposi...
fairness problems can be encoded into ALFP as well. To deal with multi-valued model checking problems, we have proposed multivalued ALFP. A Moore Family result for multi-valued ALFP is also established, which ensures the existence and uniqueness of the least model. When the truth values in multi-valued...... of states satisfying a CTL formula can be characterized as the least model of ALFP clauses specifying this CTL formula. The existence of the least model of ALFP clauses is ensured by the Moore Family property of ALFP. Then, we take fairness assumptions in CTL into consideration and have shown that CTL...... ALFP constitute a nite distributive complete lattice, multi-valued ALFP can be reduced to two-valued ALFP. This result enables to implement a solver for multi-valued ALFP by reusing existing solvers for twovalued ALFP. Our ALFP-based technique developed for the two-valued CTL naturally generalizes...
Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P
The Quebec Health Smart Card Project is advocating the use of a memory card software server (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Qualifications: Check airmen (airplane) and... § 121.411 Qualifications: Check airmen (airplane) and check airmen (simulator). (a) For the purposes of this section and § 121.413: (1) A check airman (airplane) is a person who is qualified, and permitted...
PIC Microcontrollers are a favorite in industry and with hobbyists. These microcontrollers are versatile, simple, and low cost making them perfect for many different applications. The 8-bit PIC is widely used in consumer electronic goods, office automation, and personal projects. Author, Dogan Ibrahim, author of several PIC books has now written a book using the PIC18 family of microcontrollers to create projects with SD cards. This book is ideal for those practicing engineers, advanced students, and PIC enthusiasts that want to incorporate SD Cards into their devices. SD cards are che
La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la en...
La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los betabloqueantes vasodilatadores y los inhibidores de la enzim...
An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.
Loyalty card is one of the most commonly used promotional activities in business. Thus far, there are some research has been done on luxury hotel, but very few researches are on budget hotel. So, the purpose of the thesis is finding out the Swedish customers’ attitude and behavior towards budget hotel’s loyalty card; getting to know what factors influence Swedish customers’ response towards the loyalty card and budget hotels. In the thesis, the main research problem is “How do Swedish custome...
Full Text Available Considering the importance of credit risk management to ensure the financial system stability,the paper presents financial and real sector interaction highlighting that credit growth based on increase of creditdemand, of income, of assets prices, of currency availability, the interest rate differential between countries andrelaxation of regulatory framework, leaves banks more vulnerable to subsequent downturn in economic activity andasset prices. It also outlines the steps taken or those I think that should be implemented in terms of improving creditrisk management, implementation of regulatory measures to limit credit expansion, enforcing the regulatoryrequirements for covering the expected and unexpected losses, introduction of new surveillance tools aimed to leadto a more resilient financial system.
... appropriations, direct payment of a Credit Risk Premium by the Applicant or a non-Federal infrastructure partner... 49 Transportation 4 2010-10-01 2010-10-01 false Credit reform. 260.13 Section 260.13... REHABILITATION AND IMPROVEMENT FINANCING PROGRAM Overview § 260.13 Credit reform. The Federal Credit Reform Act...
... exclude CLF stock subscriptions, based on the asset's negligible credit risk and to facilitate corporate... removing paragraphs (c)(3) and (f)(4) and adding paragraph (h) to read as follows: Sec. 704.6 Credit risk... NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 704 RIN 3133-AD95 Corporate Credit Unions AGENCY...
... OF TRANSPORTATION TRANSFER AND TRADING OF FUEL ECONOMY CREDITS § 536.4 Credits. (a) Type and vintage... category, and model year of origin (vintage). (b) Application of credits. All credits earned and applied are calculated, per 49 U.S.C. 32903(c), in tenths of a mile per gallon by which the average fuel...
Bams, Dennis; Bos, Jaap; Pisa, Magdalena
Firms depend heavily on trade credit. This paper introduces a trade credit network into a structural model of the economy. In an empirical analysis of the model, we find that trade credit is an elusive insurance: as long as a firm is financially unconstrained and times are good, more trade credit
Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...
... cards not marketed or labeled as a gift card or certificate. EFTA Section 920 provides, however, that... cardholder initiates a purchase by providing his or her card or card information to a merchant. In the case... purchases at retailers in the early 1980s. It was not until the mid-1990s, however, that PIN debit became a...
Hoffman, Jonathan; McGuire, Agnes C.
Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…
Sánchez, David; Martínez, Sergio; Domingo-Ferrer, Josep
De Montjoye et al. (Reports, 30 January 2015, p. 536) claimed that most individuals can be reidentified from a deidentified transaction database and that anonymization mechanisms are not effective against reidentification. We demonstrate that anonymization can be performed by techniques well established in the literature. Copyright © 2016, American Association for the Advancement of Science.
Grable, John E.; Joo, So-Hyun
This study expands upon the work of Henry, Weber, and Yarbrough (2001) in examining the money management behaviors and financial outcomes of college students. The analysis was conducted using data from a sample that included an equal mix of African-American and non-Hispanic White students. It was found that African-American students held more…
Over time, we are likely to face increasing challenges in making decisions to sustain and restore our waters and coasts, as pressures increase due to sea level rise and an increasing population, among other changes. Every action costs money, and most choices require giving up som...
Solis, Oscar; Ferguson, Ralph
The cost of higher education at both public and private institutions is increasing and adversely affecting college students (College Board, 2009; Idemudia & Ferguson, 2014a, 2014b, 2015a, 2015b). Utilizing an institutional dataset called Financial Survey of Students 2006 compiled at one of the largest public universities in the southwestern…
de Montjoye, Yves-Alexandre; Pentland, Alex Sandy
Sánchez et al.'s textbook k-anonymization example does not prove, or even suggest, that location and other big-data data sets can be anonymized and of general use. The synthetic data set that they "successfully anonymize" bears no resemblance to modern high-dimensional data sets on which their methods fail. Moving forward, deidentification should not be considered a useful basis for policy. Copyright © 2016, American Association for the Advancement of Science.
Wiener, Richard L.; Holtje, Michael; Winter, Ryan J.; Cantone, Jason A.; Gross, Karen; Block-Lieb, Susan
In response to federal legislative reform aimed, in part, at reducing consumer bankruptcy filings, the authors conducted 2 experiments examining the role of affect in purchasing behavior. In Experiment 1, they examined consumer debtors, and in Experiment 2, they examined nondebtors. In both experiments, they investigated purchasing decisions made…
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Anti-money laundering programs for...-Money Laundering Programs Anti-Money Laundering Programs § 103.135 Anti-money laundering programs for.... Virgin Islands. (b) Anti-money laundering program requirement. Effective July 24, 2002, each operator of...
Full Text Available “degrees”. Librarians have a long history of electronic ordering. Most of them have been placing orders electronically for years: downloading orders from library management systems and transmitting them to main suppliers either as e-mail attachments or in a...
... year. Projected future taxable income should include the estimated effect of tax planning strategies... be included in tangible capital in the same amount. (c) Market valuations. The OTS reserves the authority to require any savings association to perform an independent market valuation of assets subject to...
Full Text Available The results of a bank’s activities depend to a significant extent on the quality of the credit portfolio that it holds, as well as on the credit tracking and control system. The purpose and functioning of such inter-banking systems differs from one bank to another. Loans require an increasingly efficient type of internal surveillance of activity. Following the clients’ behavior and performances, as well as their entire activity is a particularly important phase and absolutely necessary in the course of a loan. The purpose of this activity is, generally, that of identifying, as early as possible, of clues about any problems that may appear during the course of the loan, so as to make possible, as early as can be, the taking of remedial measures with a view to anticipate the deterioration of the loan’s debt. An open communication between the bank and the loan’s beneficiary is an essential condition for an efficient tracking program. Another basic element is the rigorous and complete filling out of the credit papers. The credit files are the backbone of the of the loan monitoring process because these contain all of the documents which may offer to the credit officer, accounting expert, as well as other interested parties a permanent, chronological record of the loan relation.
... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...
Human Resources Division
The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue are available here. Human Resources Division Tel. 74469
Koutchouk, J P
After four years of activity, EuCARD has most of its objectives fulfilled, with some new objectives added and a few others on excellent tracks while requiring additional time. The management has been active in reinforcing the collaborative links between partners and projects, contributing to the preparation of FP7-EuCARD2, initiating FP7-HiLumi-LHC Design Study, to favour sustained collaborations beyond EuCARD. An out-of-contract network has been successfully launched on laser plasma acceleration, to combine forces between accelerator, laser and plasma communities. Communication and dissemination activities have led to two highlights: Accelerating News, an accelerator R&D newsletter initiated by EuCARD and now common to all FP7 accelerator projects (over 1000 subscribers) and a series of monographs on accelerator sciences that is progressively finding its public. The scientific networks have more than fulfilled their initial objectives: roadmaps are defined for neutrino facilities, submitted to the Europe...
Report discusses the dilemma of incorporating consistent, convenient, universal card access (or ''pay-at-the-pump'') systems into alternative fueling stations across the country. The state of California continues to be in the forefront of implementing alternative fuels for transportation applications. Aggressive efforts to deploy alternative fuel vehicles (AFVs) in California have highlighted the need to provide adequate fueling stations and develop appropriate, user-friendly means to purchase fuel at the pump. Since these fuels are not typically provided by petroleum companies at conventional fueling stations, and acceptance of cash is often not an option, a payment method must be developed that is consistent with the way individual AFV operators are accustomed to purchasing automotive fuels--with a credit card. At the same time, large fleets like the California Department of General Services must be able to use a single fuel card that offers comprehensive fleet management services. The Gas Technology Institute's Infrastructure Working Group (IWG) and its stakeholders have identified the lack of a common card reader system as a hurdle to wider deployment of AFVs in California and the United States. In conjunction with the U.S. Department of Energy's (DOE) National Clean Cities Program, the IWG has outlined a multi-phased strategy to systematically address the barriers to develop a more ''open'' architecture that's similar to the way gasoline and diesel are currently dispensed. Under the auspices of the IWG, survey results were gathered (circa 1999) from certain fuel providers, as a means to more carefully study card reader issues and their potential solutions. Pilot programs featuring card reader systems capable of accepting wider payment options have been attempted in several regions of the United States with mixed success. In early 2001, DOE joined the National Renewable Energy Laboratory (NREL), the
Arista Romeu, E. J.; Diaz Garcia, A.; Vela Morales, O.
A software developed in C++ for a multichannel acquisition card is presented. The use of an acquisition add-on card with multiple channels is a suitable solution to substitute several instruments, allowing simultaneous acquisition with each channel. In this work, the limitations of a concrete hardware are discussed and also several different approaches have been suggested. Some preliminary results obtained in laboratory conditions are shown. (Author)
Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon
Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...
Through advertisement, producers send messages for their product strength to consumers. Those messages are conveyed through various kinds of signs either in the form of language, picture, caption, icon, index, or symbol. There is communicative exchange on GC79 PC Card Sony Ericsson advertisement between sender and receiver. Sender (advertisement maker) of this advertisement makes good use of reward polluter style, which is, persuading comsumers to use PC Card Sony Ericsson product.
This circuit board is a prototype 48-channel front end digitizer card for the ALICE time projection chamber (TPC), which takes electrical signals from the wire sensors in the TPC and shapes the data before converting the analogue signal to digital data. A total of 4356 cards will be required to process the data from the ALICE TPC, the largest of this type of detector in the world.
Sánchez, Juan Luis; Martín, Javier; López, Carolina
The classic version of the Wisconsin Card Sorting Test (WCST) consists of correctly sorting 128 cards according to changing sorting criteria. Its application is costly in terms of the time employed, with all the negative consequences this entails (decrease in motivation, frustration, and fatigue). The main objective of this study was to test the usefulness of the shortened version of the WCST as compared to the full test by analyzing the equivalence between the two decks comprising the full 128-card version on a sample of patients diagnosed with sporadic late onset Alzheimer disease (SLOAD) and to check its clinical usefulness. The variables showed equivalence between the two decks and their ability to differentiate between the control group (CG) and the Alzheimer disease (AD) group. The scores obtained suggest equivalence between decks and that the application of only the first deck is sufficient.
Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith
International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...
As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...
Jonathan, Aliponga; Christopher C, Johnston
This paper was written to research and advocate the use of English word cards withregard to vocabulary acquisition and English productive and receptive competency. Also,student perceptions of using and making word cards will be examined to show theimportance of including a word card policy in an EFL classroom. Despite all the positiveresearch done on word cards, it is surprising how many Japanese EFL students do notutilize word cards in their English studies. For this research, 108 students f...
J.F. Slijkerman; D.J.C. Smant (David); C.G. de Vries (Casper)
textabstractBanks provide risky loans to firms which have superior information regarding the quality of their projects. Due to asymmetric information the banks face the risk of adverse selection. Credit Value-at-Risk (CVaR) regulation counters the problem of low quality, i.e. high risk, loans and
Brown, M.; Ongena, S.; Popov, A.; Yesin, P.
Based on survey data covering 8,387 firms in 20 countries we compare the access to bank credit for firms in Eastern Europe to that in selected Western European countries. Our analysis reveals five main results. First, the firm-level determinants of the propensity to apply are similar in Eastern and
Amore, Mario Daniele; Schneider, Cédric; Zaldokas, Alminas
We present evidence that banking development plays a key role in technological progress. We focus on firms’ innovative performance, measured by patent-based metrics, and employ exogenous variations in banking development arising from the staggered deregulation of banking activities across U.S. st...... by a greater ability of deregulated banks to geographically diversify credit risk....
Full Text Available The subject of research presented in this paper refers to the definition of methodology for the development of credit analysis in companies and its application in lending operations in the Republic of Serbia. With the developing credit market, there is a growing need for a well-developed risk and loss prevention system. In the introduction the process of bank analysis of the loan applicant is presented in order to minimize and manage the credit risk. By examining the subject matter, the process of processing the credit application is described, the procedure of analyzing the financial statements in order to get an insight into the borrower's creditworthiness. In the second part of the paper, the theoretical and methodological framework is presented applied in the concrete company. In the third part, models are presented which banks should use to protect against exposure to risks, i.e. their goal is to reduce losses on loan operations in our country, as well as to adjust to market conditions in an optimal way.
I analyze the market for credit ratings with competition between more than two rating agencies. How can honest rating behavior be achieved, and under which conditions can a new honest rating agency successfully invade a market with inflating incumbents? My model predicts cyclic dynamics...
Norden, L.; Wagner, W.B.
This paper examines the relationship between the new markets for credit default swaps (CDS) and the pricing of syndicated loans to U.S. corporates. We find that changes in CDS spreads have a significantly positive coefficient and explain about 25% of subsequent monthly changes in aggregate loan
Alsem, K.J.; Antufjew, J.; Huizingh, K.R.E.; Koning, Ruud H.; Sterken, E.; Woltil, M.
Firms exporting their goods and services abroad face risks that are different from the risks faced by firms who do not engage in international trade. It is common practice to allow the receiving party to pay in instalments. The exporting firm faces credit risk, but as in most countries, Dutch firms
This Brownfi elds Solutions factsheet is intended for brownfields stakeholders interested in how the U.S. Department of the Treasury’s New Markets Tax Credit (NMTC) Program can be used as a financing mechanism in brownfields cleanup and redevelopment.
... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Spot checks. 1421.11 Section 1421.11 Agriculture... ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 General § 1421.11 Spot checks. (a) CCC... CCC access to the farm and storage facility as necessary to conduct collateral inspections, or “spot...
Full Text Available The study has shown that the accuracy of brakes checking by inertial stands depends upon the applied methods of measurement of braking parameters (stand slowing down, braking distance, brakes triggering time, current speed as well as the methods of metrological checking of measuring system canals.
Hansen, Michael Reichhardt
can do model-checking. The subset we consider is expressive enough to formalize the requirements to the gas burner system given by A.P. Ravn (1993); but only for a discrete time domain. Model-checking is done by reducing the correctness problem ℳ|=𝒟 to the inclusion problem of regular...
Thypin, Marilyn; Glasner, Lynne
A short fictional work for limited English speakers is presented that relates a young couple's experience in learning about managing their money more carefully by budgeting and maintaining a checking account. Since the couple did not have a checking account, they had to go to their savings bank in order to pay each bill and they had to keep cash…
Li, H Harold; Wu, Yu; Yang, Deshan; Mutic, Sasa
Physics chart check has long been a central quality assurance (QC) measure in radiation oncology. The purpose of this work is to describe a software tool that aims to accomplish simplification, standardization, automation, and forced functions in the process. Nationally recognized guidelines, including American College of Radiology and American Society for Radiation Oncology guidelines and technical standards, and the American Association of Physicists in Medicine Task Group reports were identified, studied, and summarized. Meanwhile, the reported events related to physics chart check service were analyzed using an event reporting and learning system. A number of shortfalls in the chart check process were identified. To address these problems, a software tool was designed and developed under Microsoft. Net in C# to hardwire as many components as possible at each stage of the process. The software consists of the following 4 independent modules: (1) chart check management; (2) pretreatment and during treatment chart check assistant; (3) posttreatment chart check assistant; and (4) quarterly peer-review management. The users were a large group of physicists in the author's radiation oncology clinic. During over 1 year of use the tool has proven very helpful in chart checking management, communication, documentation, and maintaining consistency. The software tool presented in this work aims to assist physicists at each stage of the physics chart check process. The software tool is potentially useful for any radiation oncology clinics that are either in the process of pursuing or maintaining the American College of Radiology accreditation.
Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen
Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated
Ramezani Taghiabadi, E.; Fahland, D.; Dongen, van B.F.; Aalst, van der W.M.P.
Compliance checking is gaining importance as today’s organizations need to show that operational processes are executed in a controlled manner while satisfying prede¿ned (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing
Dek, E.C.P.|info:eu-repo/dai/nl/313959552; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533
Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den
Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.; Cloth, L.
In this paper algorithms for model checking CSL (continuous stochastic logic) against infinite-state continuous-time Markov chains of so-called quasi birth-death type are developed. In doing so we extend the applicability of CSL model checking beyond the recently proposed case for finite-state
Bouyer, Patricia; Fahrenberg, Uli; Larsen, Kim Guldstrand
This chapter surveys timed automata as a formalism for model checking real-time systems. We begin with introducing the model, as an extension of finite-state automata with real-valued variables for measuring time. We then present the main model-checking results in this framework, and give a hint...
... 32 National Defense 4 2010-07-01 2010-07-01 true Name checks. 635.6 Section 635.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.6 Name checks. (a) Information contained in military police records may be...
... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243 Agriculture... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to inspection and analysis by the dairy plant for quality and condition throughout each processing operation...
A vertical pump is described which has a bottom discharge with a free floating check valve disposed in the outlet plenum thereof. The free floating check valve comprises a spherical member with a hemispherical cage-like member attached thereto which is capable of allowing forward or reverse flow under appropriate conditions while preventing reverse flow under inappropriate conditions
... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Check delivery. 21.4505...) VOCATIONAL REHABILITATION AND EDUCATION Education Loans § 21.4505 Check delivery. (a) General. Education... surviving spouse is enrolled for delivery by the educational institution. (b) Delivery and certification. (1...
Xie Jiachun; Zhao Shouzhi; Sun Zheng; Jia Baoshan
Wrong results may be given when FS card (tally segment card) was used for tally with other tally cards in Monte Carlo code MCNP. According to the comparison of segment tally results which were obtained by FS card of three different models of the same geometry, the tally results of fuel regions were found to be wrong in fill pattern. The reason is that the fuel cells were described by Universe card and FILL card, and the filled cells were always considered at Universe card definition place. A proposed solution was that the segment tally for filled cells was done at Universe card definition place. Radial flux distribution of one example was calculated in this way. The results show that the fault of segment tally with FS card in fill pattern could be solved by this method. (authors)
Full Text Available With the rapid development of rural micro-credit, whether the qagriculture, rural areas and farmersq problems have been effectively solved, whether the credit risk has been effectively controlled, these have become the focus of our attention to the rural economic environment. The main content of this paper contains four aspects: the classification and characteristics of credit risk, the problems and factors of credit risk, the model and evaluation of credit risk, the countermeasures and suggestions of credit risk. This paper reviews the research of credit risk management for rural credit cooperatives from the above four aspects, and makes a brief summary.
Y. Stol (Yrrah); E.C.A. Asscher (Eva); M.H.N. Schermer (Maartje)
markdownabstract__Background:__ Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good'
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Qualifications: Check pilots (aircraft) and check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... RULES Fractional Ownership Operations Program Management § 91.1089 Qualifications: Check pilots...
Naszlady, A; Naszlady, J
A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.
Henke, Sabine; Burghof, Hans-Peter; Rudolph, Bernd
Banks increasingly recognize the need to measure and manage the credit risk of their loans on a portfolio basis. We address the subportfolio "middle market". Due to their specific lending policy for this market segment it is an important task for banks to systematically identify regional and industrial credit concentrations and reduce the detected concentrations through diversification. In recent years, the development of markets for credit securitization and credit derivatives has provided n...
Willis, Peter A.; Greer, Harold F.; Smith, J. Anthony
A simple design concept for check valves has been adopted for microfluidic devices that consist mostly of (1) deformable fluorocarbon polymer membranes sandwiched between (2) borosilicate float glass wafers into which channels, valve seats, and holes have been etched. The first microfluidic devices in which these check valves are intended to be used are micro-capillary electrophoresis (microCE) devices undergoing development for use on Mars in detecting compounds indicative of life. In this application, it will be necessary to store some liquid samples in reservoirs in the devices for subsequent laboratory analysis, and check valves are needed to prevent cross-contamination of the samples. The simple check-valve design concept is also applicable to other microfluidic devices and to fluidic devices in general. These check valves are simplified microscopic versions of conventional rubber- flap check valves that are parts of numerous industrial and consumer products. These check valves are fabricated, not as separate components, but as integral parts of microfluidic devices. A check valve according to this concept consists of suitably shaped portions of a deformable membrane and the two glass wafers between which the membrane is sandwiched (see figure). The valve flap is formed by making an approximately semicircular cut in the membrane. The flap is centered over a hole in the lower glass wafer, through which hole the liquid in question is intended to flow upward into a wider hole, channel, or reservoir in the upper glass wafer. The radius of the cut exceeds the radius of the hole by an amount large enough to prevent settling of the flap into the hole. As in a conventional rubber-flap check valve, back pressure in the liquid pushes the flap against the valve seat (in this case, the valve seat is the adjacent surface of the lower glass wafer), thereby forming a seal that prevents backflow.
...) to diversify, credit unions now have the opportunity to market their services to specific employee groups or industries which can reduce the overall risk to the credit unions' health or solvency...
.... State-owned financial institutions play a major role in financing capital expenditure while working capital requirements are mainly met by informal sources of credit. However, future investment requirements and credit needs are greater than currently available.
Hvam, Lars; Riis, Jesper; Hansen, Benjamin Loer
, transportation, service and decommissioning. A main challenge when building product models is to collect and document the product related data, information and knowledge in a structured way. CRC cards are index cards (or computerized versions of these) which are used to record proposed classes, the behavior......This paper describes the CRC (class, responsibility, collaboration) modelling process for building product models. A product model is normally represented in an IT system which contains data, information and knowledge on industrial products and their life cycle properties e.g. manufacturing...... of the classes, their responsibilities, and their relationship to other classes (collaboration). CRC modelling gives an effective, low-tech method for domain-experts, programmers and users to work closely together to identify, structure, understand and document a product model. CRC cards were originally...
Valente, Andrea; Marchetti, Emanuela
Literature and previous studies show that creative play is easy to emerge when children interact with tangible, low-tech toys and games than with digital games. This paradoxical situation is linked to the long-standing problem of end-users (or players) authoring of digital contents and systems. We...... are to show how card games can represent digital games, how playful play can emerge in card games and digital games, and to begin defining a new way to express game behavior without the use of universal programming languages....... propose a new scenario in which trading card games help making sense and re-design computer games, to support players express themselves aesthetically and in a highly creative way. Our aim is to look for a middle ground between players becoming programmers and simply editing levels. The main contributions...
Midtgaard, Jan; Møller, Anders
A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs...... of a lattice. Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, e.g., monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language...
Midtgaard, Jan; Møller, Anders
A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs....... Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, eg, monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language....
Achenbach, Michael; Ostermann, Klaus
Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...... and implementing abstractions will improve the applicability of model checking in practice....
Christiansen, Henning; Martinenghi, Davide
Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be obtained with respect to given update patterns by exploiting query optimization techniques. By reducing the problem...... to query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...
Rather than in terms of the inevitable demise of a destabilising process of speculation, this article explores the ‘credit crunch’ as a window on the fabrication, and measure of the proportions of a political shift driven by market actors and financial innovation. The Basel process reconceptualised...... banks as risk navigators and generated a competitive hierarchy within the global banking industry determined on a gauge of this capacity. This private regulatory regime promoted market inflation and rendered institutional liquidity and risk transfer definitive of market power. In turn, a ballooning...... credit derivatives market broke the limits of financial production and defined state actions in the face of crisis. A shift from a central concern with solvency to that of liquidity thinly masks a profound redistribution of power from the public to the private. By swapping private assets of uncertain...
Erma Wahdani Permanasari
Full Text Available The purpose of this study is to determine the effect of characteristic of firm to the level of creditrisk. Characteristics of the firm is proxied by size, leverage, spread ownership, net profit margin,return on equity, industry type and scope of the company’s operations. Measurement of level creditrisk uses PT Pefindo bond rating. Annual reports of listed companies in PT Pefindo and IndonesiaStock Exchange (IDX 2010-2011 are collected based on purposive sampling techniques. Thepopulation is 238 companies. Sample used amounted to 84 companies. The analysis model usedin this study is multiple linear regression. Results of this study indicate that the level of corporatecredit risk in Indonesia is high because it is below the 50.00%. The test result of multiple regressionshowed that firm of characteristic affect the level of credit risk. Firm characteristics that affectthe level of credit risk are size, leverage, dispersion of ownership, net profit margin and returnon equity.
Kovalko, N. M.
The article discusses the problematic aspects of credit ratings and ranking. The economic and legal aspects of ranking relations are addressed. It is concluded that a low credit standing of Ukraine is a sign of our country’s low debt sustainability.It is proved that both for Ukraine and for economically developed countries, the issue of credit ratings is quite important, and at times problematic. The issue is related to the development of the national and international financial credit resour...
Eppinger, Peter; Potrafke, Niklas
We investigate whether globalization influenced credit market deregulation over the period 1970-2010. Globalization is measured by the KOF indices of globalization. Credit market deregulation is measured by the credit market freedom indicators of the Fraser Institute. The results from both cross-sectional and panel regressions using ordinary least squares indicate a positive correlation between globalization and credit market deregulation. We account for reverse causality by using predicted t...
The diploma thesis deals with consumer's credit grants of banking and non-banking corporations and comparison of their service quality. The first part of research is dedicated to consumer's knowledge of credit issues. Second describes main difficulties of consumer's credit grants of banking and non-banking corporations and proves their use of unfair manners. The final part of thesis propose improvements, which will boost consumer's protection on field of consumer's credits.
The Texas Air Control Board has begun to develop a system of emission reduction credit training. The system will be developed incrementally over time. The first step, banking of VOC and NO x Emission Reduction Credits, began March 15, 1993. Additional programs under study and development include NO x RACT trading, emission credits for motor vehicle scrappage and alternative fuel conversion, and establishment of community organizations to generate and acquire emission reduction credits for economic development purposes
Lucas Plis Dolce
Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.
Allica, J C; Belohrad, D; Jensen, L; Lenardon, F; SØby, L
At the CERN PS complex, precise fast intensity measurements are very important in order to optimize the transfer efficiencies between the different accelerators. Over the last two years a complete renovation has been ongoing, where the old electronics, based on analogue integrators, have been replaced by a fully digital system enclosed in a single VME based card. This new system called TRIC (Transformer Integration Card) is based on a 12 bit, 212 MS/s ADC and an FPGA for the signal processing. Also located on the same board one finds a 250 V/1.5 W DCDC converter used to generate precise calibration pulses.
An improved beta backscatter instrument for the nondestructive measurement of the thickness of thin coatings on a substrate is described. Included therein is the utilization of a bank of memory stored data representative of isotope, substrate, coating material and thickness range characteristics in association with a control card having predetermined indicia thereon selectively representative of a particular isotope, substrate material, coating material and thickness range for conditioning electronic circuit means by memory stored data selected in accord with the predetermined indicia on a control card for converting backscattered beta particle counts into indicia of coating thickness
Full Text Available Ministério da EducaçãoSecretaria de Educação Profissional e TecnológicaInstituto Federal de Educação, Ciência e Tecnologia Fluminense Reitor Luiz Augusto Caldas Pereira Pró-Reitor de Ensino Carlos Márcio Lima Pró-Reitor de Pesquisa e Inovação José Augusto Ferreira da Silva Pró-Reitora de Extensão Paula Aparecida Martins Borges BastosEditora-Chefe Inez Barcellos de Andrade Coordenação Editorial do Boletim Maria Inês Paes Ferreira Conselho Editorial Conselho Consultivo Edinalda Almeida da SilvaHelvia Pereira Pinto BastosJefferson Manhães de AzevedoLuiz de Pinedo Quinto JuniorMaria Amelia Ayd CorrêaMaria Inês Paes FerreiraPedro de Azevedo Castelo BrancoRegina Coeli Martins AquinoRogério Atem de CarvalhoRomeu e Silva NetoSaid Sérgio Martins AuattSalvador TavaresSergio VasconcelosSilvia Lúcia dos Santos BarretoSynthio Vieira de AlmeidaVania Cristina Alexandrino BernardoVicente de Paulo Santos OliveiraWander Gomes Ney Adalberto Cardoso (IESP/UERJAntonio Carlos Secchin (UFRJAntônio José da Silva Neto (IPRJ/UERJAsterio Kiyoshi Tanaka (UNIRIO e UFRJErica Maria Pellegrini Caramaschi (UFRJFernando Benedicto Mainier (UFFFernando Pruski (UFVFrancisco de Assis Esteves (UFRJGaudêncio Frigotto (UFFHamilton Jorge de Azevedo (UFRRJHelder Gomes Costa (UFFIná Elias de Castro (UFRJJader Lugon Junior (IFF/UERJ/SENAIJanete Bolite Frant (UNIBANJosé Abdallah Helayël-Neto (CBPF/MCTMiriam Fontelle (UNIFLU e UNESARodrigo Valente Serra (ANPRonaldo Pinheiro da Rocha Paranhos (UENFSérgio Arruda de Moura (UENFVera Lucia Marques da Silva (FBPNVirgínia Maria Gomes de Mattos Fontes (UFF Organizadores deste númeroMaria Inês Paes FerreiraJader Lugon JuniorLuiz de Pinedo Quinto JúniorBolsista de Iniciação CientíficaCamilla Cardoso da Costa Revisão de Língua Portuguesa e Inglesa Edson Carlos NascimentoIsabela Bastos de CarvalhoKissila Ferreira de SouzaPriscila Matos MonkenRosângela Caldas Projeto Gráfico André da Silva CruzEric Moreira Carvalho Diagramação Cláudia Marcia Alves FerreiraFernando Prado de Matos BettencourtMariana de Almeida Reis CapaAndré da Silva Cruz Revisão Técnica e Catalogação Inez Barcellos de Andrade Dados de Catalogação na Publicação (CIP B688 Boletim do Observatório Ambiental Alberto Ribeiro Lamego / InstitutoFederal de Educação, Ciência e Tecnologia Fluminense.Observatório Ambiental Alberto Ribeiro Lamego. - Vol. 1, no. 1(jan./jun. 2011 - .- Campos dos Goytacazes (RJ: Essentia Editora,2011- SemestralCentro Federal de Educação Tecnológica de Campos - CEFET Camposaté 2008. Instituto Federal de Educação, Ciência e Tecnologia - IF Fluminense apartir de 2009. ISSN versão impressa 1981-6197ISSN versão eletrônica 2177-4560 1. Engenharia ambiental. I. Instituto Federal de Educação, Ciência eTecnologia Fluminense. II. Observatório Ambiental Alberto Ribeiro Lamego. CDD - 628 Tiragem: 1000 exemplares Impressão: Meneghitti's Gráfica e Editora Ltda. | Tel.: (21 2136-6999