WorldWideScience

Sample records for contactless smart cards

  1. Determinants affecting consumer adoption of contactless credit card: an empirical study.

    Science.gov (United States)

    Wang, Yu-Min

    2008-12-01

    The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.

  2. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  3. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  4. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  5. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  6. STANDARDIZATION AND APPLICATION OF PLASTIC CARDS IN THE EDUCATIONAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Polina V. Baranova

    2015-01-01

    Full Text Available The application of plastic cards has been widely increasing in various fields of life, business and education. They have already become up-to-date and convenient attribute of our daily life. There are emerging more and more areas where they can be used in a convenient and practical way. Contactless smart cards can be used in access control in the educational systems. This article gives an overview of existing standards dealing with contactless identification smart-cards. All standards covered in this article are developed by the Federal State Unitary Enterprise VNIINMASH jointly with TC 22 «Information Technology» based on their own authentic Russian translation of international standards. 

  7. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  8. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  9. Smart practice: smart card design considerations in health care.

    Science.gov (United States)

    Lindley, R A; Pacheco, F

    1995-01-01

    Recent innovations in microelectronics and advances in cryptography are driving the appearance of a new generation of smart cards with wider applications; this has important repercussions for our society in the coming years. Essentially, these breakthroughs include built-in microprocessors capable of generating cryptographic transactions (e.g.,Jelectronic blinded signatures, digital pseudonyms, and digital credentials), developments toward a single electronic card offering multi-access to services such as transport, telecommunications, health, financial, and entertainment (Universal Access Services), and incorporation of personal identification technologies such as voice, eye, or skin pattern recognition. For example, by using electronic representatives or cryptographic blinded signatures, a smart card can be used for multi transactions across different organizations and under different generated pseudonyms. These pseudonyms are capable of recognizing an individual unambiguously, while none of her records can be linked [1]. Moreover, tamper-proof electronic observers would make smart cards a very attractive technology for high-security based applications, such as those in the health care field. New trends in smart card technology offer excellent privacy and confidentiality safeguards. Therefore, smart cards constitute a promising technology for the health sector in Australia and other countries around the world in their pursuit of technology to support the delivery of quality care services. This paper addresses the main issues and the key design criteria which may be of strategic importance to the success of future smart card technology in the health care sector.

  10. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  11. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  12. Smart Card sebagai Pengaman Sepeda Motor Berbasis Mikrokontroler

    OpenAIRE

    Yohanes Chrisostomus Purba; Antonius Wibowo

    2010-01-01

    Pengaman sepeda motor yang berbentuk smart card terdiri dari bagian yang memuat chip EEPROM dan bagian pengaman smart card. Pembacaan smart card didesain dan ditempatkan pada sepeda motor. Untuk pembacaan data chip SLE 4442, dan pembacaan data pengaman smart card digunakan mikrokontroler AT89S51. Untuk pengaturan aktif maupun tidak aktifnya CDI, dan starter juga digunakan mikrokontroler AT89S51. Sistem pengaman sepeda motor akan menjadi aktif bila sepeda motor dalam keadaan mati. Smart car...

  13. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  14. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  15. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  16. Smart Icon Cards

    Science.gov (United States)

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  17. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  18. An overview of smart card technology and markets

    OpenAIRE

    Mark Furletti

    2002-01-01

    As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...

  19. Studi Perkembangan Pasar Smart Card Indonesia Pada Sektor Perbankan

    OpenAIRE

    Onny Rafizan

    2017-01-01

    Smart card merupakan salah satu teknologi yang sudah banyak digunakan di Indonesia di berbagai sektor. Dari sisi teknologi, industri dalam negeri sebenarnya sudah mampu memproduksi smart card, sehingga industri ini sangat potensial untuk dikembangkan menuju kemandirian. Penelitian ini dilakukan sebagai bagian dalam USAha pemerintah untuk mendorong perkembangan industri smart card dalam negeri, dengan tujuan memberikan gambaran kondisi pasar smart card di Indonesia saat ini. Pengumpulan data p...

  20. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  1. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  2. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  3. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  4. Design and implementation of a smart card based billing system for ...

    African Journals Online (AJOL)

    A smart card based billing system for petroleum dispenser is just one of the many ways in which smart cards can be employed to make commerce efficient. It incorporates the use of smart card as its legal tender and a smart card reader embedded into the filling station dispenser design. The smart card reader processes the ...

  5. Design and implementation of a smart card based healthcare information system.

    Science.gov (United States)

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  6. Prevention of Information Leakage by Photo-Coupling in Smart Card

    Science.gov (United States)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  7. Australian healthcare: a smart card for a clever country.

    Science.gov (United States)

    Morris, S; Cooper, J; Bomba, D; Brankovic, L; Miller, M; Pacheco, F

    1995-10-01

    In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone may contain the cardholders name and address. Access to the different zones depends on the level of security of the zone. The higher the security level the more restrictive the access method. Were smart cards adopted for the storage of medical histories it would change the form of medical information recorded, not merely convert paper files to electronic ones. Storage of an individual's medical history on a smart card raises important privacy issues. These privacy issues are discussed particularly as they relate to the Australian community.

  8. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  9. BİYOMETRIC FINGER PRINT USED AND APPLIED ON SMART CARD

    Directory of Open Access Journals (Sweden)

    Makbule KARAKÜLAH

    2004-04-01

    Full Text Available During the last years, the authors are trying to integrate biometrics, inside a smart card. In this study the first step, as in every biometric system is to obtain an image of the user's fingerprint. After this, a preprocessing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae. The minutiae are ridges and valleys of the fingerprint. We researched these minutiae which are used with smart cards. A lot of smart card readers /writers were used for data writing and reading. Fingerprint minutiae and identify information were wrote on smart cards successfully using development kits (smart cards of fingerprint and so were identified.

  10. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  11. On Cyclic Plans for Scheduling a Smart Card Personalisation System

    NARCIS (Netherlands)

    Nieberg, T.

    An industrial case study for scheduling the personalisation of smart cards is presented and analysed. Smart cards are personalised in several machines that are served by an underlying conveyor belt connecting these. As there are usually a very high number of smart cards to be personalised, the focus

  12. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  13. Smart Card Based Integrated Electronic Health Record System For Clinical Practice

    OpenAIRE

    N. Anju Latha; B. Rama Murthy; U. Sunitha

    2012-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Smart cards are used as a Electronic Health Record (EHR) Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in hospitals. In this paper, a smart card based Integrated Electronic health Reco...

  14. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  15. Signal processing for smart cards

    Science.gov (United States)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  16. Towards testability in smart card operating system design

    NARCIS (Netherlands)

    Hartel, Pieter H.; Cordonnier, V.; de Jong, Eduard K.; Quisquater, J.J.

    1994-01-01

    The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the

  17. WWW + smart card: towards a mobile health care management system.

    Science.gov (United States)

    Chan, A T

    2000-07-01

    This paper highlights the benefits of combining the World Wide Web and smart card technologies to support a highly mobile health management framework. In particular, we describe an approach using the SmartCard-Web Gateway Interface (SGI) as a common interface to communicate and access the medical records residing in a smart card. Importantly, by employing HTTP as the baseline protocol to access information on the smart card, SGI promotes the use of de facto standard web browsers as the common client user interface. The initial implementation of the framework has demonstrated the feasibility of the concept in facilitating a truly mobile access of patient's medical records based on SGI.

  18. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  19. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  20. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  1. Selecting e-Purse Smart Card Technology via Fuzzy AHP and ANP

    Directory of Open Access Journals (Sweden)

    Nurgül Demirtaş

    2014-01-01

    Full Text Available Developments in the information technologies provide important advantages to consumers and companies. Nowadays, smart card technology starts to use e-purse applications. The aim of this paper is to identify the most important decision criteria to select the best card technology. In this study, at first smart card and multiple selection techniques were explained. Then the best card technology was selected for an e-purse application. The three types of card technologies were examined and the most important criteria were taken into account by the software developer while they develop card software. Fuzzy analytic hierarchy process (FAHP and analytical network process (ANP techniques were used to compare smart card technologies.

  2. SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

    Directory of Open Access Journals (Sweden)

    _ Sukamto

    2012-01-01

    Full Text Available Dalam penelitian ini, system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data Tujuan dari penelitian ini adalah menerapkan teknologi smart card sebagai sarana atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas yang tinggi, sehingga meningkatkan jaminan ketersediaan data pada sebuah sistem rekam medik.Tahapan pembuatan rancang bangun sistem rekam medis ini meliputi perancangan data flow diagram, rentity relationshipp diagram, database dan program aplikasi. Hasil dari penelitian ini menunjukan bahwa smart card dapat digunakan sebagai sarana atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas yang tinggi.

  3. SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

    Directory of Open Access Journals (Sweden)

    _ Sukamto

    2013-04-01

    Full Text Available Dalam penelitian ini,  system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data  Tujuan dari penelitian ini adalah  menerapkan teknologi smart card sebagai sarana  atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas  yang tinggi, sehingga meningkatkan jaminan ketersediaan data pada sebuah sistem rekam medik.Tahapan pembuatan rancang bangun sistem rekam medis ini meliputi  perancangan data flow diagram, rentity relationshipp diagram, database dan program aplikasi. Hasil dari penelitian ini menunjukan bahwa smart  card dapat digunakan  sebagai sarana  atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas  yang tinggi.

  4. Evaluation of an Electronic Smart-Card Based School Absenteeism Surveillance System

    OpenAIRE

    So, HC; Lam, CK; Tam, YH; Cowling, BJ; Leung, GM; Lau, EHY; Ip, DKM

    2014-01-01

    We evaluated the performance of an electronic smart-card based school absenteeism surveillance system which was initiated in 2008 in Hong Kong. The result demonstrated the feasibility and potential benefit of employing electronic school absenteeism data as captured automatically by a smart card system as an alternative data stream for monitoring influenza activities, and flexibility in establishing surveillance for emerging diseases. The increasing popularity of usage of smart card technology...

  5. Designing minimum data sets of health smart card system

    OpenAIRE

    Mohtaram Nematollahi

    2014-01-01

    Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s ...

  6. Supporting Software Evolution for Open Smart Cards by Security-by-Contract

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gadyatskya, Olga; Massacci, Fabio

    2011-01-01

    Open multi-application smart cards that allow post-issuance evolution (i.e. loading of new applets) are potentially very attractive for both smart card developers and card users. Yet we find only few of them on the market as no satisfactory solution exists for the assurance that these coming...

  7. The suggested system for health insurance Application based on Smart Cards

    OpenAIRE

    Esam Mohamed El Gohary; Mohamed El-Sayed Waheed

    2013-01-01

    This paper concentrates on designing a system for Health insurance using smart card technology .The system is called HISS (Health insurance system using smart card).As we will see the system is web based application based on central database ,uses smart card for two reasons first, as a data carrier for patient and professionals. Second reason is for authentication purposes. There are some figures that describe system architecture and processes then each component well be explained.

  8. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  9. UTILIZAÇÃO DE JAVA CARD COMO PLATAFORMA PARA O DESENVOLVIMENTO DE APLICAÇÕES EM SMART CARD.

    Directory of Open Access Journals (Sweden)

    Lucas Plis Dolce

    2011-12-01

    Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.

  10. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  11. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  12. Telematics and smart cards in integrated health information system.

    Science.gov (United States)

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole

  13. Using Formal Methods to Cultivate Trust in Smart Card Operating Systems

    NARCIS (Netherlands)

    Alberda, Marjan I.; Hartel, Pieter H.; de Jong, Eduard K.

    To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards contain relatively simple computers, and are used only for a specific class of applications, it is feasible to make the language used to program the software components focused and tiny. Formal

  14. 'Smart card' speeds triage, boosts safety.

    Science.gov (United States)

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.

  15. Adoption of smart cards in the medical sector: the Canadian experience.

    Science.gov (United States)

    Auber, B A; Hamel, G

    2001-10-01

    This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.

  16. Chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  17. An Improvement on Remote User Authentication Schemes Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2018-01-01

    Full Text Available In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.

  18. An advanced mutual-authentication algorithm using 3DES for smart card systems

    CSIR Research Space (South Africa)

    Tsague, HD

    2012-11-01

    Full Text Available One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core feature...

  19. Identification of Clusters in Travel Patterns using Smart Card Data

    DEFF Research Database (Denmark)

    Reinau, Kristian Hegner; Harder, Henrik

    2016-01-01

    This article is the first contribution, which explores the potential of smart card data in relation to optimization of public transport in a peripheral monocentric region. A modularity analysis is made using smart card data collected in Northern Jutland in Marts and July 2014, and the analysis...... reveals first, that smart card data can be used to identify clusters within flows of public transport passengers in a peripheral region. Second, that the presence of such clusters suggest that public transport should be planned to give the users the possibility of travelling with good connectivity...... and easiness within these clusters. Third, the presence of such clusters in peripheral areas of the monocentric region suggest, that the overall current focus in public transport planning on transport possibilities to and from the central city in monocentric regions is questionable....

  20. Sample Development on Java Smart-Card Electronic Wallet Application

    OpenAIRE

    Toma Cristian

    2009-01-01

    In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet ...

  1. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    Science.gov (United States)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  2. Clinical information system based on the medical smart card.

    Science.gov (United States)

    Danon, Y L; Saiag, E

    2000-07-01

    Over the last 5 years Israel has implemented a nationwide health insurance plan covering the entire population of the country. We have developed a clinical information system based on electronic-chip health care medical smart cards. Health care cards are used in several European countries and chip smart cards have been successful in many sectors. Our project involves the community use of the MSC, thereby enabling health care professionals to skillfully employ card systems in the health care sector. This system can easily arrange electronic medical charts in clinics, facilitating the confidential sharing of personal health databases among health professionals. To develop an MSC applicable for daily use in the community and hospital system. The MSC project, currently underway in Israel and the USA, will aid in determining the costs, benefits and feasibility of the MSC. Successful implementation of the MSC in chosen clinics will promote a nationwide willingness to adopt this promising technology.

  3. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  4. An Association Rule Based Method to Integrate Metro-Public Bicycle Smart Card Data for Trip Chain Analysis

    Directory of Open Access Journals (Sweden)

    De Zhao

    2018-01-01

    Full Text Available Smart card data provide valuable insights and massive samples for enhancing the understanding of transfer behavior between metro and public bicycle. However, smart cards for metro and public bicycle are often issued and managed by independent companies and this results in the same commuter having different identity tags in the metro and public bicycle smart card systems. The primary objective of this study is to develop a data fusion methodology for matching metro and public bicycle smart cards for the same commuter using historical smart card data. A novel method with association rules to match the data derived from the two systems is proposed and validation was performed. The results showed that our proposed method successfully matched 573 pairs of smart cards with an accuracy of 100%. We also validated the association rules method through visualization of individual metro and public bicycle trips. Based on the matched cards, interesting findings of metro-bicycle transfer have been derived, including the spatial pattern of the public bicycle as first/last mile solution as well as the duration of a metro trip chain.

  5. Managing medical and insurance information through a smart-card-based information system.

    Science.gov (United States)

    Lambrinoudakis, C; Gritzalis, S

    2000-08-01

    The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.

  6. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  7. Developing efficient blinded attribute certificates on smart cards via pairings

    NARCIS (Netherlands)

    Batina, L.; Hoepman, J.H.; Jacobs, B.; Mostowski, W.; Vullers, P.

    2010-01-01

    This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified

  8. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  9. Extended applications with smart cards for integration of health care and health insurance services.

    Science.gov (United States)

    Sucholotiuc, M; Stefan, L; Dobre, I; Teseleanu, M

    2000-01-01

    In 1999 in Romania has initiated the reformation of the national health care system based on health insurance. In 1998 we analyzed this system from the point of view of its IT support and we studied methods of optimisation with relational, distributed databases and new technologies such as Our objectives were to make a model of the information and services flow in a modern health insurance system, to study the smart card technology and to demonstrate how smart card can improve health care services. The paper presents only the smart cards implementations.

  10. Rancang Bangun Sistem Pilkades Menggunakan Teknologi Smart Card Sebagai Kartu Pemilih

    Directory of Open Access Journals (Sweden)

    I Putu Indra Permana

    2016-08-01

    Full Text Available Pemilihan Kepala Desa (Pilkades merupakan proses yang tidak terpisahkan dari Negara Indonesia sebagai negara demokrasi. Pilkades saat ini masih menggunakan sistem pemungutan suara (voting secara konvensional, menggunakan media kertas untuk melakukan proses pemilihan. Pelaksanaan sistem voting konvensional tersebut mempunyai banyak kelemahan seperti menghitung hasil voting relatif lebih lama dan menggunakan perhitungan manual. Perkembangan dan kemajuan teknologi informasi saat ini dapat dimanfaatkan untuk mendukung pelaksanaan voting Pilkades secara lebih baik yang menjadi solusi cerdas akan kemajuan teknologi yang dapat menggantikan sistem voting konvensional, yaitu dengan media sistem elektronik voting (e-voting menggunakan teknologi smart card sebagai kartu pemilih. Sistem dikemas dalam bentuk aplikasi yang dipasang/di-install pada komputer dan reader/writer tools sebagai media untuk membaca/menulis pada smart card. Sistem e-voting Pilkades dengan teknologi smart card telah berhasil dijalankan dan menghasilkan dashboard hasil voting Pilkades dengan menunjukkan jumlah voting dalam bentuk angka, persentase (%, grafik dan diagram.

  11. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  12. The impacts of smart cards on hospital information systems--an investigation of the first phase of the national health insurance smart card project in Taiwan.

    Science.gov (United States)

    Liu, Chien-Tsai; Yang, Pei-Tun; Yeh, Yu-Ting; Wang, Bin-Long

    2006-02-01

    To investigate the impacts of the first phase of Taiwan's Bureau of National Health Insurance (TBNHI) smart card project on existing hospital information systems. TBNHI has launched a nationwide project for replacement of its paper-based health insurance cards by smart cards (or NHI-IC cards) since November 1999. The NHI-IC cards have been used since 1 July 2003, and they have fully replaced the paper-based cards since 1 January 2004. Hospitals must support the cards in order to provide medical services for insured patients. We made a comprehensive study of the current phase of the NHI-IC card system, and conducted a questionnaire survey (from 1 October to 30 November, 2003) to investigate the impacts of NHI-IC cards on the existing hospital information systems. A questionnaire was distributed by mail to 479 hospitals, including 23 medical centers, 71 regional hospitals, and 355 district hospitals. The returned questionnaires were also collected by prepaid mail. The questionnaire return rates of the medical centers, regional hospitals and district hospitals were 39.1, 29.6 and 20.9%, respectively. In phase 1 of the project, the average number of card readers purchased per medical center, regional hospital, and district hospital were 202, 45 and 10, respectively. The average person-days for the enhancement of existing information systems of a medical center, regional hospital and district hospital were 175, 74 and 58, respectively. Three months after using the NHI-IC cards most hospitals (60.6%) experienced prolonged service time for their patients due to more interruptions caused mainly by: (1) impairment of the NHI-IC cards (31.2%), (2) failure in authentication of the SAMs (17.0%), (3) malfunction in card readers (15.3%) and (4) problems with interfaces between the card readers and hospital information systems (15.8%). The overall hospital satisfaction on the 5-point Likert scale was 2.86. Although most hospitals were OK with the project, there was about 22

  13. Health smart cards: differing perceptions of emergency department patients and staff.

    Science.gov (United States)

    Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

    2009-02-01

    An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.

  14. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  15. Smart Card Data Mining of Public Transport Destination: A Literature Review

    Directory of Open Access Journals (Sweden)

    Tian Li

    2018-01-01

    Full Text Available Smart card data is increasingly used to investigate passenger behavior and the demand characteristics of public transport. The destination estimation of public transport is one of the major concerns for the implementation of smart card data. In recent years, numerous studies concerning destination estimation have been carried out—most automatic fare collection (AFC systems only record boarding information but not passenger alighting information. This study provides a comprehensive review of the practice of using smart card data for destination estimation. The results show that the land use factor is not discussed in more than three quarters of papers and sensitivity analysis is not applied in two thirds of papers. In addition, the results are not validated in half the relevant studies. In the future, more research should be done to improve the current model, such as considering additional factors or making sensitivity analysis of parameters as well as validating the results with multi-source data and new methods.

  16. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  17. SMART INTERFACE: FERRAMENTA DE AUXÍLIO AO DESENVOLVIMENTO DE APLICAÇÕES JAVA CARD

    Directory of Open Access Journals (Sweden)

    Leonardo Ataíde Minora

    2008-05-01

    Full Text Available Com a evolução da tecnologia de microprocessadores, hoje é possível colocar um minúsculo chip em um cartão de plástico, nas dimensões de um cartão de crédito convencional. Chip este com capacidade de armazenamento de informação e processamento. Esse tipo de cartão é chamado de Smart Card. É possível desenvolver aplicações para esses cartões utilizando um subconjunto da plataforma Java – Java Card. O subconjunto da plataforma Java para o desenvolvimento de aplicações próprias para executar em Smart Cards é bastante limitado, em virtude das limitações do hardware envolvido. O desenvolvimento deste tipo de aplicação implica invariavelmente em se trabalhar no nível de bytes, pois toda a comunicação com o cartão acontece através de APDUs (Applicaion Protocol Data Unit montadas como uma sequência de bytes. Para auxiliar nesse trabalho, foi desenvolvido o SMART SHELL: ferramenta, modo texto, que interpreta comandos para a interação com a aplicação gerente do cartão – card manager. Os objetivos deste trabalho são: aperfeiçoar as funcionalidades do SMART SHELL e desenvolver uma interface gráfica para o mesmo, denominada de SMART INTERFACE. A aplicação em questão visa oferecer ao desenvolvedor de aplicações Java Card um mecanismo simples e ágil para a realização de atividades comuns de manipulação de um cartão, tais como: (1 realizar o processo de autenticação para operar com o card manager, (2 listar as aplicações – applets Java Card – instalados em um cartão, (3 preparar uma aplicação para ser instalada em um cartão, (4 instalação de uma aplicação no cartão, (5 remoção de uma aplicação instalada no cartão, entre outras. Para a realização do trabalho serão seguida a seguinte metodologia: levantamento bibliográfico sobre o tema; definição dos aperfeiçoamentos necessários ao SMART SHELL; implementação dos aperfeiçoamentos propostos; e implementação da interface gr

  18. A smart-card-enabled privacy preserving E-prescription system.

    Science.gov (United States)

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  19. Patient health record on a smart card.

    Science.gov (United States)

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  20. Using smart card technology to prevent sales of alcohol to underage persons

    Science.gov (United States)

    2001-07-01

    This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...

  1. Deriving Schedules for a Smart Card Personalisation System

    NARCIS (Netherlands)

    Mader, Angelika H.

    We report on an industrial case study on the synthesis of (close) optimal schedules for a smart card personalisation system. The basic technique used is model checking. In most cases, the pure model checking approach has to be enriched by other techniques to fight the state space explosion. Other

  2. Ridership impacts of South Florida's EASY smart card : [summary].

    Science.gov (United States)

    2013-07-01

    Transit agencies across the U.S. increasingly are replacing electronic fare reading systems with Advanced Fare Collection (AFC) or smart card systems. In 2009, Miami-Dade Transit (MDT) was the first Florida transit agency to deploy AFC, branded...

  3. Real Electronic Commerce: Smart Cards on the Superhighway.

    Science.gov (United States)

    Birch, David

    1997-01-01

    Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…

  4. A security review of proximity identification based smart cards

    CSIR Research Space (South Africa)

    Lefophane, S

    2015-03-01

    Full Text Available International Conference on Cyber warfare and Security, Mpumalanga, Kruger National Park, South Africa, 24-25 March 2015 A SECURITY REVIEW OF PROXIMITY IDENTIFICATION BASED SMART CARDS S.Lefophane, J. Van der Merwe Modelling and Digital Science: CSIR...

  5. Interoperable computerized smart card based system for health insurance and health services applied in cardiology.

    Science.gov (United States)

    Cocei, Horia-Delatebea; Stefan, Livia; Dobre, Ioana; Croitoriu, Mihai; Sinescu, Crina; Ovricenco, Eduard

    2002-01-01

    In 1999 Romania started its health care reform by promulgating the Health Insurance Law. A functional and efficient health care system needs procedures for monitoring and evaluation of the medical services, communication between different service providers and entities involved in the system, integration and availability of the information. The final goal is a good response to the needs and demands of the patients and of the real life. For this project we took into account, on one hand, the immediate need for computerized systems for the health care providers and, on the other hand, the large number of trials and experiments with health smart cards across Europe. Our project will implement a management system based on electronic patient records to be used in all cardiology clinics and will experiment the health smart cards, will promote and demonstrate the capabilities of the smart card technology. We focused our attention towards a specific and also critical category of patients, those with heart diseases, and also towards a critical sector of the health care system--the emergency care. The patient card was tested on a number of 150 patients at a cardiology clinic in Bucharest. This was the first trial of a health smart card in Romania.

  6. The Internet and healthcare in Taiwan: value-added applications on the medical network in the National Health Insurance smart card system.

    Science.gov (United States)

    Tsai, Wen-Hsien; Kuo, Hsiao-Chiao

    2007-01-01

    The introduction of smart card technology has ushered in a new era of electronic medical information systems. Taiwan's Bureau of National Health Insurance (BNHI) implemented the National Health Insurance (NHI) smart card project in 2004. The purpose of the project was to replace all paper cards with one smart card. The NHI medical network now provides three kinds of services. In this paper, we illustrate the status of the NHI smart card system in Taiwan and propose three kinds of value-added applications for the medical network, which are electronic exchange of medical information, retrieval of personal medical records and medical e-learning for future development of health information systems.

  7. Can a patient smart card improve decision making in a clinical setting?.

    Science.gov (United States)

    Bérubé, J; Papillon, M J; Lavoie, G; Durant, P; Fortin, J P

    1995-01-01

    In the health field, clinical information is the raw material for the clinician delivering health services. Therefore, the clinical information available to the physician is often incomplete or even non¿existent upon consultation. Furthermore, the reconstruction of the medical history, which is the most important source of data for the clinician to establish a diagnosis and initiate a treatment, suffers from many constraints. The smart card, like the one used in Quebec's project, could ease the physician's decision-making by allowing fast access to accurate and pertinent data. The smart card is a major asset in the present health system.

  8. Constructing activity–mobility trajectories of college students based on smart card transaction data

    Directory of Open Access Journals (Sweden)

    Negin Ebadi

    2017-12-01

    Full Text Available In this research, we use UB card as a convenient source of combined smart transaction data in order to define a campus-wide model for constructing students’ activity–mobility trajectories in time–space dimension. UB Card is a student’s official ID at the University at Buffalo and is used across campus for various activities including Stampedes and Shuttles (on-campus bus system, facilities access, library services, dining, shopping, and etc. Two activity–mobility trajectory construction algorithms are developed. The base algorithm constructs students’ activity–mobility patterns in space–time dimension using a set of smart card transaction data points as the only inputs. The modified individualized algorithm constructs activity–mobility patterns with prior knowledge of students’ previous patterns as they have similar patterns for certain days of the week. A database of 37 students’ travel survey and UB card transactions that contains a period of 5 days have been used to illustrate the results of the study. Three measures of errors have been proposed to capture the time allocation, location deviation, and activity sequences. These errors present an acceptable accuracy (12–25% error ranges for activity types and average 0.04–0.16 miles of error for location predictions and show the potential of inferring activity–mobility behaviors based on smart card transaction type data sets.

  9. Deduction of passengers' route choices from smart card data

    NARCIS (Netherlands)

    van der Hurk, E.; Kroon, L.G.; Maroti, G.; Vervest, P.

    2015-01-01

    Deducing passengers' route choices from smart card data provides public transport operators the opportunity to evaluate and improve their passenger service. Particularly in the case of disruptions, when traditional route choice models may not be valid, this is an advantage. This paper proposes a

  10. Deduction of passengers' route choice from smart card data

    NARCIS (Netherlands)

    Van Der Hurk, Evelien; Kroon, Leo; Maroti, Gabor; Vervest, Peter

    2013-01-01

    Deducing passengers' route choice from smart card data provides public transport operators the opportunity to evaluate passenger service. Especially in case of disruptions when route choice models may not be valid this is an advantage. This paper proposes a method for deducing the chosen route of

  11. A Proposed Solution for Managing Doctor's Smart Cards in Hospitals Using a Single Sign-On Central Architecture

    OpenAIRE

    Mauro, Christian;Sunyaev, Ali;Leimeister, Jan Marco;Schweiger, Andreas;Krcmar, Helmut

    2014-01-01

    This paper describes a single sign-on solution for the central management of health care provider?s smart cards in hospitals. The proposed approach which is expected to be an improvement over current methods is made possible through the introduction of a national healthcare telematics infrastructure in Germany where every physician and every patient will automatically be given an electronic health smart card (for patients) and a corresponding health professional card (for health care provider...

  12. CQL: a database in smart card for health care applications.

    Science.gov (United States)

    Paradinas, P C; Dufresnes, E; Vandewalle, J J

    1995-01-01

    The CQL-Card is the first smart card in the world to use Database Management Systems (DBMS) concepts. The CQL-Card is particularly suited to a portable file in health applications where the information is required by many different partners, such as health insurance organizations, emergency services, and General Practitioners. All the information required by these different partners can be shared with independent security mechanisms. Database engine functions are carried out by the card, which manages tables, views, and dictionaries. Medical Information is stored in tables and views are logical and dynamic subsets of tables. For owner-partners like MIS (Medical Information System), it is possible to grant privileges (select, insert, update, and delete on table or view) to other partners. Furthermore, dictionaries are structures that contain requested descriptions and which allow adaptation to computer environments. Health information held in the CQL-Card is accessed using CQL (Card Query Language), a high level database query language which is a subset of the standard SQL (Structured Query Language). With this language, CQL-Card can be easily integrated into Medical Information Systems.

  13. SC2: Secure Communication over Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Papini, Davide

    2012-01-01

    The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the c...

  14. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  15. Slovene smart card and IP based health-care information system infrastructure.

    Science.gov (United States)

    Trcek, D; Novak, R; Kandus, G; Suselj, M

    2001-04-01

    Slovenia initiated a nation-wide project to introduce smart cards in the health sector in 1995 and its full-scale deployment started in September 2000. Although the basic aim of the project was to support insurance related procedures, the system was designed in a flexible and open manner to present an infrastructure for the whole health sector. The functionality of the current system is described in this paper along with lessons learned so far. The upgrade of the system is outlined, with emphasis on technical details, the objective being to provide a real-time EDI based environment for a general set of applications in the medical sector, supported by the flexibility and security of modern smart card technologies. Integration with similar systems in other EU countries is discussed.

  16. Pressure Sequence - A Novel Method of Protecting Smart Cards

    NARCIS (Netherlands)

    Hartel, Pieter H.; Henderson, N.J.; Domingo-Ferrer, J; Chan, D.; Watson, A.

    If someone knocks on your door, the chances are that you can tell by the sound who it is. This simple idea is the basis of our pressure sequence method, which records the signal arising from a user tapping on a smart card. We have built a prototype, piezoelectric, screen printed pressure sensor on a

  17. Aplikasi Pembayaran Jalan Tol Dengan Smart Card Menggunakan Algoritma Enkripsi Idea Dan 3Des: Studi Kasus Pada PT.Citra Marga Nusaphala Persada

    OpenAIRE

    Elidjen, Elidjen; Budianto, Hendy; Yohanes, Lilyawati; Nugroho, Novianto Wibowo

    2004-01-01

    Salah satu USAha pemerintah untuk mengatasi kemacetan adalah dengan membuatjalan tol, namun cara ini kurang efektif karena kemacetan masih terjadi akibat antrian yangpanjang pada gerbang tol. Oleh sebab itu, penulis berusaha mencari solusi untuk membuatsistem baru yaitu dengan penggunaan smart card. Penggunaan smart card yang memilikitingkat integritas, reliabilitas, dan keamanan yang tinggi diharapkan dapat dijadikan solusiuntuk memecahkan semua masalah tersebut. Dalam penggunaan smart card ...

  18. Aplikasi Pembayaran Jalan Tol dengan Smart Card Menggunakan Algoritma Enkripsi Idea dan 3Des: Studi Kasus pada PT.Citra Marga Nusaphala Persada

    OpenAIRE

    Elidjen, Elidjen; Budianto, Hendy; Yohanes, Lilyawati; Nugroho, Novianto Wibowo

    2009-01-01

    Salah satu usaha pemerintah untuk mengatasi kemacetan adalah dengan membuatjalan tol, namun cara ini kurang efektif karena kemacetan masih terjadi akibat antrian yangpanjang pada gerbang tol. Oleh sebab itu, penulis berusaha mencari solusi untuk membuatsistem baru yaitu dengan penggunaan smart card. Penggunaan smart card yang memilikitingkat integritas, reliabilitas, dan keamanan yang tinggi diharapkan dapat dijadikan solusiuntuk memecahkan semua masalah tersebut. Dalam penggunaan smart card ...

  19. Applying Formal Methods to the Design of Smart Card Software

    NARCIS (Netherlands)

    Butler, Michael; Hartel, Pieter H.; Longley, Mark; de Jong, Eduard

    1997-01-01

    The goal of this work is the design of a language for the implementation of smart card applications, specifically an operating system, as high integrity software. The integrity of a piece of software is demonstrated by proving various properties of the software. The language must therefore exclude

  20. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  1. Comparison of the performance and security of free and open source smart card offcard APIs

    CSIR Research Space (South Africa)

    Chifura, A

    2008-09-01

    Full Text Available . Off card APIs provide a framework for this by providing interfaces that can be implemented to enhance the communication. This study looks at the performance and security comparisons of several free and open source smart card offcard APIs...

  2. A microprocessor card software server to support the Quebec health microprocessor card project.

    Science.gov (United States)

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  3. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  4. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  5. Does Environmental Sustainability Play a Role in the Adoption of Smart Card Technology at Universities in Taiwan: An Integration of TAM and TRA

    Directory of Open Access Journals (Sweden)

    Ching-Wei Ho

    2015-08-01

    Full Text Available Smart cards are able to store and protect relatively large amounts of data. When applied in universities, they can act as multi-purpose, multi-function and smart ID cards. This would avoid the waste of resources and maintain environmental sustainability. This study proposes a model that integrates Technology Acceptance Model and Theory of Reasoned Action into a framework incorporating the notion of environmental concern in order to explore the factors that affect students’ behavioral intention to use University Smart Cards. This study employs a quantitative method for primary data collection via a structured questionnaire for university students. The findings indicated that the perceived usefulness and subjective norm of university smart card systems have the most significant predictive power on potential users’ attitudes and intentions of adopting the card.

  6. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  7. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  8. Towards second-generation smart card-based authentication in health information systems: the secure server model.

    Science.gov (United States)

    Hallberg, J; Hallberg, N; Timpka, T

    2001-01-01

    Conventional smart card-based authentication systems used in health care alleviate some of the security issues in user and system authentication. Existing models still do not cover all security aspects. To enable new protective measures to be developed, an extended model of the authentication process is presented. This model includes a new entity referred to as secure server. Assuming a secure server, a method where the smart card is aware of the status of the terminal integrity verification becomes feasible. The card can then act upon this knowledge and restrict the exposure of sensitive information to the terminal as required in order to minimize the risks. The secure server model can be used to illuminate the weaknesses of current approaches and the need for extensions which alleviate the resulting risks.

  9. Factoring RSA keys from certified smart cards : Coppersmith in the wild

    NARCIS (Netherlands)

    Bernstein, D.J.; Chang, Y.A.; Cheng, C.M.; Chou, L.P.; Heninger, N.; Lange, T.; Someren, van N.

    2013-01-01

    An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by government-issued smart cards that were certified secure. The certificates had all the usual buzzwords:

  10. DIABCARD a smart card for patients with chronic diseases.

    Science.gov (United States)

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  11. A study of smart card for radiation exposure history of patient.

    Science.gov (United States)

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  12. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  13. Patient exposure tracking: the IAEA smart card project.

    Science.gov (United States)

    Rehani, Madan M; Frush, Donald P

    2011-09-01

    The existing approach of radiation protection is largely based on the collective dose to the population with provisions for protection at an individual level through justification and optimisation. With the individual patient dose now exceeding the life-long occupational dose to a worker in a typical radiology practice, there is a need to establish approaches based on the protection of an individual patient. Radiation exposure tracking seems a way forward in this respect. Technological advances in recent years have provided opportunities for tracking to becoming a reality. The IAEA project on Smart Card/SmartRadTrack is described in this paper. The tracking is now a reality in a few dozen centres in many countries connected by picture archiving and communication systems, and there is hope that this will extend to cover other countries and continents.

  14. Patient exposure tracking: The IAEA smart card project

    International Nuclear Information System (INIS)

    Rehani, M. M.; Frush, D. P.

    2011-01-01

    The existing approach of radiation protection is largely based on the collective dose to the population with provisions for protection at an individual level through justification and optimisation. With the individual patient dose now exceeding the life-long occupational dose to a worker in a typical radiology practice, there is a need to establish approaches based on the protection of an individual patient. Radiation exposure tracking seems a way forward in this respect. Technological advances in recent years have provided opportunities for tracking to becoming a reality. The IAEA project on Smart Card/SmartRadTrack is described in this paper. The tracking is now a reality in a few dozen centres in many countries connected by picture archiving and communication systems, and there is hope that this will extend to cover other countries and continents. (authors)

  15. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  16. Using smart card technology to monitor the eating habits of children in a school cafeteria: 1. Developing and validating the methodology.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.

  17. The effect of Health smart cards for Quality Health care services ( doctor martyr Beheshti medical research center in Qom

    Directory of Open Access Journals (Sweden)

    Saeed zarandi

    2016-03-01

    Full Text Available The main objective of this study was to investigate the effect of the use health smart card on the aspects quality of healthcare services in doctor martyr beheshti medical research center in qom . With regard to the measures taken in the context of the establishment of this card in Qom and the lack of previous experience in this province, one of the concerns of the authorities to investigate the performance and capabilities of the card and its effects on the quality of health services is affecting the present study is to respond to this concerns. This research method is descriptive and applied to the target population of physicians, nurses and medical record experts employed at the Medical Center have formed a martyr Beheshti Qom due to more awareness cognitive advantages associated with its use of smart cards have given. The population is equal to the number of 444 and 124 questionnaire for data analysis is used. The sampling method used in this research was stratified random sampling conducted in the respective classes. Spss software for data analysis & exploratory factor analysis & confirmed, Kolmogorov-Smirnov Test, Wilcoxon Test & matrix of factors were used. The analysis results showed that Health Smart Cards for quality of health care services positive and significant effects on Dimension quality of the reliability & Tangibles . Analysis of demographic variables that influence opinions about the quality of health care Health Smart Cards significantly related to gender and education level, and also no experience discussed the variables significantly associated with age.

  18. User Centric Design of an NFC Mobile Wallet Framework

    OpenAIRE

    Kabir, Ziaul

    2011-01-01

    Near Field Communication (NFC) among various other things, allows end-users to enjoy contactless mobile services such as credit cards, transport tickets, office access etc. using NFC mobile phones. Such services are placed as software applications inside the secure-chip hardware of the NFC phone – often termed as a Secure Element (SE). Bringing these contactless smart-card services into mobile phones raises the need to allow the end-users to interact and control the information and the commun...

  19. Short-Term Prediction of Ridership on Public Transport with Smart Card Data

    NARCIS (Netherlands)

    van Oort, N.; Brands, Ties; de Romph, E.

    2015-01-01

    Public transport operators are collecting massive amounts of data from smart card systems. In the Netherlands, every passenger checks in and checks out; this system creates detailed records of demand patterns. In buses and trams, users check in and check out in the vehicle; this factor provides good

  20. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity.../or characteristics of some thing ? This thing can be anything, however in the context of this discussion, this thing could be a person, a network device, or even an identity authentication device itself ? This act or process of verifying these attributes could...

  1. Crowding Valuation in Urban Tram and Bus Transportation based on Smart Card Data

    NARCIS (Netherlands)

    Yap, M.D.; Cats, O.; Yu, S; van Arem, B.

    2017-01-01

    Crowding in public transport can be of major influence on passengers’ travel experience and therefore affect route and mode choice. Therefore, it is important to understand how crowding in urban public transport is perceived by passengers. The availability of individual smart card transactions

  2. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  3. Relationship between Spatio-Temporal Travel Patterns Derived from Smart-Card Data and Local Environmental Characteristics of Seoul, Korea

    Directory of Open Access Journals (Sweden)

    Mi-Kyeong Kim

    2018-03-01

    Full Text Available With the incorporation of an automated fare-collection system into the management of public transportation, not only can the quality of transportation services be improved but also that of the data collected from users when coupled with smart-card technology. The data collected from smart cards provide opportunities for researchers to analyze big data sets and draw meaningful information out of them. This study aims to identify the relationship between travel patterns derived from smart-card data and urban characteristics. Using seven-day transit smart-card data from the public-transportation system in Seoul, the capital city of the Republic of Korea, we investigated the temporal and spatial boarding and alighting patterns of the users. The major travel patterns, classified into five clusters, were identified by utilizing the K-Spectral Centroid clustering method. We found that the temporal pattern of urban mobility reflects daily activities in the urban area and that the spatial pattern of the five clusters classified by travel patterns was closely related to urban structure and urban function; that is, local environmental characteristics extracted from land-use and census data. This study confirmed that the travel patterns at the citywide level can be used to understand the dynamics of the urban population and the urban spatial structure. We believe that this study will provide valuable information about general patterns, which represent the possibility of finding travel patterns from individuals and urban spatial traits.

  4. An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

    OpenAIRE

    Pathan, Al-Sakib Khan; Hong, Choong Seon

    2007-01-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...

  5. Demonstration of holographic smart card system using the optical memory technology

    Science.gov (United States)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  6. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  7. The Danish Rejsekortet (Smart Card for Public Transportation); Project Governance for Failure or Success?

    DEFF Research Database (Denmark)

    Harboe, Peter Georg; Riis, Eva

    The authors examine a project regarded as a major failure in Danish public investments: The Smart Card for Public Transportation whose introduction was delayed for 9 years with an estimated cost overrun of 125 million EURO. After 3 years of operation, the Smart Card system only covers seven...... of the nine Danish regions and the discussion about giving up the system is continuing. The authors explore the overall conditions set up for these types of projects in the project governance - how project governance conditions a major public IT project and forms the success evaluation. The focus...... is on the whole cycle from project initiation to long-term use of the project results. Data collection is through documentation as governmental reports and evaluations, for example (Rigsrevisionen, 2011; The Comptroller and Auditor General, 2006; Transport Committee, 2011)and semi-structured interviews...

  8. The Danish Rejsekortet ( Smart Card for Public Transportation ): Project Governance for Failure or Success ?

    DEFF Research Database (Denmark)

    Harboe, Peter Georg; Riis, Eva

    The authors examine a project regarded as a major failure in Danish public investments: The Smart Card for Public Transportation whose introduction was delayed for 9 years with an estimated cost overrun of 125 million EURO. After 3 years of operation, the Smart Card system only covers seven...... of the nine Danish regions and the discussion about giving up the system is continuing. The authors explore the overall conditions set up for these types of projects in the project governance - how project governance conditions a major public IT project and forms the success evaluation. The focus...... is on the whole cycle from project initiation to long-term use of the project results. Data collection is through documentation as governmental reports and evaluations, for example (Rigsrevisionen, 2011; The Comptroller and Auditor General, 2006; Transport Committee, 2011)and semi-structured interviews...

  9. Security Analysis of a Remote User Authentication Scheme with Smart Cards

    OpenAIRE

    Kumar, Manoj

    2007-01-01

    Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen scheme. This paper reviews Yoon et al. scheme and then proves that the password change phase of Yoon et al. scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.

  10. Fingerprint match-on-card: review and outlook

    CSIR Research Space (South Africa)

    Shabalala, MB

    2015-03-01

    Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...

  11. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  12. A Proposed Smart-Card Solution for Australian Health Services: The Problems Encountered

    OpenAIRE

    Danielle Fowler; Paul Swatman; Tanya Castleman

    2004-01-01

    This case study describes the experience of a state government health department in evaluating the use of smart card technology to redesign health benefits programs for the disabled in Australia. The social and political context of the system is explained in detail, and the potential benefits and risks accruing to the government, health care intermediaries and the community are examined.

  13. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    Science.gov (United States)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  14. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  15. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  16. Protecting Digital Evidence Integrity by Using Smart Cards

    Science.gov (United States)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  17. Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports

    Directory of Open Access Journals (Sweden)

    RIAD, R.

    2016-11-01

    Full Text Available Security checking can be improved by watermarking identity (ID images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter. Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user.

  18. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  19. Spatial-Temporal Similarity Correlation between Public Transit Passengers Using Smart Card Data

    Directory of Open Access Journals (Sweden)

    Hamed Faroqi

    2017-01-01

    Full Text Available The increasing availability of public transit smart card data has enabled several studies to focus on identifying passengers with similar spatial and/or temporal trip characteristics. However, this paper goes one step further by investigating the relationship between passengers’ spatial and temporal characteristics. For the first time, this paper investigates the correlation of the spatial similarity with the temporal similarity between public transit passengers by developing spatial similarity and temporal similarity measures for the public transit network with a novel passenger-based perspective. The perspective considers the passengers as agents who can make multiple trips in the network. The spatial similarity measure takes into account direction as well as the distance between the trips of the passengers. The temporal similarity measure considers both the boarding and alighting time in a continuous linear space. The spatial-temporal similarity correlation between passengers is analysed using histograms, Pearson correlation coefficients, and hexagonal binning. Also, relations between the spatial and temporal similarity values with the trip time and length are examined. The proposed methodology is implemented for four-day smart card data including 80,000 passengers in Brisbane, Australia. The results show a nonlinear spatial-temporal similarity correlation among the passengers.

  20. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zhang

    2015-01-01

    Full Text Available Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.

  1. JPEG2000 vs. full frame wavelet packet compression for smart card medical records.

    Science.gov (United States)

    Leehan, Joaquín Azpirox; Lerallut, Jean-Francois

    2006-01-01

    This paper describes a comparison among different compression methods to be used in the context of electronic health records in the newer version of "smart cards". The JPEG2000 standard is compared to a full-frame wavelet packet compression method at high (33:1 and 50:1) compression rates. Results show that the full-frame method outperforms the JPEG2K standard qualitatively and quantitatively.

  2. SAE for the prediction of road traffic status from taxicab operating data and bus smart card data

    Science.gov (United States)

    Zhengfeng, Huang; Pengjun, Zheng; Wenjun, Xu; Gang, Ren

    Road traffic status is significant for trip decision and traffic management, and thus should be predicted accurately. A contribution is that we consider multi-modal data for traffic status prediction than only using single source data. With the substantial data from Ningbo Passenger Transport Management Sector (NPTMS), we wished to determine whether it was possible to develop Stacked Autoencoders (SAEs) for accurately predicting road traffic status from taxicab operating data and bus smart card data. We show that SAE performed better than linear regression model and Back Propagation (BP) neural network for determining the relationship between road traffic status and those factors. In a 26-month data experiment using SAE, we show that it is possible to develop highly accurate predictions (91% test accuracy) of road traffic status from daily taxicab operating data and bus smart card data.

  3. Electronic Tickets, Smart Cards, and Online Prepayments: When and How to Advance Sell

    OpenAIRE

    Jinhong Xie; Steven M. Shugan

    2001-01-01

    Advance selling occurs when sellers allow buyers to purchase at a time preceding consumption (Shugan and Xie 2000). Electronic tickets, smart cards, online prepayments, and other technological advances make advance selling possible for many, if not all, service providers. These technologies lower the cost of making complex transactions at a greater distance from the seller's site. They also give sellers more control over advance selling by decreasing arbitrage. As technology enhances the capa...

  4. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  5. The Internet- and Digital Signature-Based Prescription Order Communication System Using Synchronized Smart Cards in the 2-Way Type Terminal

    National Research Council Canada - National Science Library

    Song, Won

    2001-01-01

    ...) based on the Internet between the hospital and the pharmacy, on the public-key infrastructure, and on the concurrently parallel co-operation with both medical professional's and patient's smart cards...

  6. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  7. Flow Orientation Analysis for Major Activity Regions Based on Smart Card Transit Data

    Directory of Open Access Journals (Sweden)

    Parul Singh

    2017-10-01

    Full Text Available Analyzing public movement in transportation networks in a city is significant in understanding the life of citizen and making improved city plans for the future. This study focuses on investigating the flow orientation of major activity regions based on smart card transit data. The flow orientation based on the real movements such as transit data can provide the easiest way of understanding public movement in the complicated transportation networks. First, high inflow regions (HIRs are identified from transit data for morning and evening peak hours. The morning and evening HIRs are used to represent major activity regions for major daytime activities and residential areas, respectively. Second, the directional orientation of flow is then derived through the directional inflow vectors of the HIRs to show the bias in directional orientation and compare flow orientation among major activity regions. Finally, clustering analysis for HIRs is applied to capture the main patterns of flow orientations in the city and visualize the patterns on the map. The proposed methodology was illustrated with smart card transit data of bus and subway transportation networks in Seoul, Korea. Some remarkable patterns in the distribution of movements and orientations were found inside the city. The proposed methodology is useful since it unfolds the complexity and makes it easy to understand the main movement patterns in terms of flow orientation.

  8. Using metro smart card data to model location choice of after-work activities : an application to Shanghai

    NARCIS (Netherlands)

    Wang, Y.; Homem de Almeida Correia, G.; de Romph, E.; Timmermans, H.J.P.

    2017-01-01

    A location choice model explains how travellers choose their trip destinations especially for those activities which are flexible in space and time. The model is usually estimated using travel survey data; however, little is known about how to use smart card data (SCD) for this purpose in a public

  9. Using metro smart card data to model location choice of after-work activities: An application to Shanghai

    NARCIS (Netherlands)

    Wang, Y.; Correia, G.H.D.A.; Romph, E. de; Timmermans, H.J.P.H.

    2017-01-01

    A location choice model explains how travellers choose their trip destinations especially for those activities which are flexible in space and time. The model is usually estimated using travel survey data; however, little is known about how to use smart card data (SCD) for this purpose in a public

  10. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Science.gov (United States)

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  11. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2014-01-01

    Full Text Available In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  12. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  13. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  14. User authentication based on the NFC host-card-emulation technology

    Science.gov (United States)

    Kološ, Jan; Kotyrba, Martin

    2017-11-01

    This paper deals with implementation of algorithms for data exchange between mobile devices supporting NFC HCE (Host-Card-Emulation) and a contactless NFC reader communicating in a read/write mode. This solution provides multiplatform architecture for data exchange between devices with a focus on safe and simple user authentication.

  15. Value Chain Flexibility with RFID: A Case Study of the Octopus Card

    Directory of Open Access Journals (Sweden)

    Lam Tak Ming

    2011-02-01

    Full Text Available Octopus cards are an electronic payment system based on a wireless RFID technology developed in Hong Kong. Users simply hold their contactless smartcards over an electronic reader, and the payment is deducted from the card automatically. If users link their cards to their credit card to upload money, there is no cash transaction involved. Launched in 1997, Octopus cards are the world’s most widely accepted contactless RFID electronic payment system. The system generates value for customers, service providers, and societies.This article makes a theoretical and applied contribution to our understanding of strategic information systems. It adopts and modifies Porter’s value chain and develops value‐chain flexibility as a theoretical framework to analyze the Octopus card system. The fast and dramatic changes in customer needs, business competition, and technological innovation are creating an urgent need for flexibility throughout the whole value chain. By looking at order fulfillment as a process, the shop outlet—either online or offline—is only part of the entire flow from customer enquiry to customer receipt. It is clear that no single idea could significantly reduce customer lead time. Only a total effort from organizations to increase flexibility and eliminate bottlenecks can make the kind of difference needed to compete (Day, 1994; Blackburn, 1991; Yusuf, Sarhadi, & Gunasekran, 1999. Therefore, value chain flexibility must be broadly defined, and it should be applied in the service industry. In other words, organizations should be able to deal with the uncertainty along the value chain to meet customer demands. This framework analyzes how the Octopus card system creates value and, in doing so, identifies key implications for customers, service providers, and society

  16. The application of Hough transform-based fingerprint alignment on match-on-card

    CSIR Research Space (South Africa)

    Mlambo, S

    2015-03-01

    Full Text Available of these cards, has led to the need for further improvements on smart cards combined with fingerprint biometrics. Due to the insufficient memory space and few instruction sets in Java smart cards, developers and programmers are faced with implementing efficient...

  17. Comparison of the Effects of SMART Board Technology and Flash Card Instruction on Sight Word Recognition and Observational Learning

    Science.gov (United States)

    Mechling, Linda C.; Gast, David L.; Thompson, Kimberly L.

    2009-01-01

    This study compared the effectiveness of SMART Board, interactive whiteboard technology and traditional flash cards in teaching reading in a small-group instructional arrangement. Three students with moderate intellectual disabilities were taught to read grocery store aisle marker words under each condition. Observational learning (students…

  18. [Smart card systems in health care (protection, key-functions, divided data bases, applications)].

    Science.gov (United States)

    Simon, P

    1999-04-25

    Barely more than 15 years have passed since electronic memory cards appeared, their popularity has grown rapidly (first of all as a cash-saving device and later for other purposes, as well). This is due also to the growing interest towards development of the intelligence of information systems for the follow-up of patients' health condition and medical care in countries with a highly developed health and insurance system (need for the creation of data bases divided for individuals) and also to their commitment towards a better control of the quality and costs of health care. We can come to the conclusion that the aim of research, development and the creation of systems in health informatics is to prevent illness and to give a direct informatic support to medical and nursing activity carried out in the patients' interests. The smart card and the surrounding application systems are certainly the appropriate means for the achievement of these aims.

  19. Improvement of urban passenger transport ticketing systems by deploying intelligent transport systems

    Directory of Open Access Journals (Sweden)

    G. Jakubauskas

    2006-12-01

    Full Text Available The main advantages and disadvantages of conventional and intelligent ticketing systems and possible positive outcomes when introducing intelligent transport solutions – namely smart cards or e‑ticketing instead of conventional ones (paper tickets and magnetic cards are analysed in the paper. Two ideas of creating an intelligent ticketing system in an urban public transport are scrutinized. The first is electronic ticket and related equipment, the second – e-ticket and functional areas of it. In the article analysis has also been made on practical outcomes related with introduction of smart cards and e-ticketing. Practical tests and trials as well as a subsequent implementation of electronic tickets have proved unchallenged advantages of contactless smart cards against the contact ones. Nevertheless, a new age of modern technologies calls even for more effective solutions – namely virtual-ticketing systems that might be achieved through introduction of mobile technologies. Therefore, the main focus in the paper is made on the analysis of e-ticket.

  20. PENGEMBANGAN MODEL MEDIA SMART CARD UNTUK PEMBELAJARAN BOLA BASKET PADA SISWA KELAS IV SDIT PERMATA HATI KECAMATAN MADUKARA KABUPATEN BANJARNEGARA TAHUN 2014

    Directory of Open Access Journals (Sweden)

    Nur’aeni Linda Pratiwi

    2016-02-01

    Full Text Available The purpose of this study is to find out the development product of Smart Card media for basketball learning to the four grade of SDIT Permata Hati Kecamatan Madukara Kabupaten. The study is a research and development. There are procedures of the product development based on this research, they are: (1 Analyse the product of the result of information collected, including field observation and theoritical review, (2 develop the form of the first product ( in form of basketball Smart Card media, (3 expert validation test that is an expert of basketball and an expert of physical learning and try out 1, (4 revision of the first product. This revision is used for an improvement toward the first product that is resulted by the researcher, (5 try out II, (6 revision of the last product that is done according to the result of the field try out, (7 the final result of the model of Smart Card media for basketball learning for the four grade of SDIT Permata Hati.The result of this research in try out I is resulted 85,3% that is categorized as good, and the result of the try out II is resulted 87,7% that is categorized as good, because the students are able to do those three aspects so it is acceptable to be used. So, it can be concluded that there is a difference between try out I and try out II that is 2,44%.

  1. A smart city application: a fully controlled street lighting isle based on Raspberry-Pi card, a ZigBee sensor network and WiMAX.

    Science.gov (United States)

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-12-18

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  2. A Smart City Application: A Fully Controlled Street Lighting Isle Based on Raspberry-Pi Card, a ZigBee Sensor Network and WiMAX

    Directory of Open Access Journals (Sweden)

    Fabio Leccese

    2014-12-01

    Full Text Available A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  3. Improving computer security by health smart card.

    Science.gov (United States)

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  4. On the use of OSL of chip card modules with molding for retrospective and accident dosimetry

    International Nuclear Information System (INIS)

    Woda, Clemens; Fiedler, Irene; Spöttl, Thomas

    2012-01-01

    The potential of optically stimulated luminescence of wire-bond chip card modules with molded encapsulations for retrospective and accident dosimetry is investigated. Contact-based and contactless modules were studied, the latter finding potential use in electronic documents (e.g. electronic passports, electronic identity cards). Investigations were carried out on intact as well as chemically prepared modules, extracting the filler material. Contact-based modules are characterized according to zero dose signal, correlation between OSL and TL, dose response and long-term signal stability. For prepared modules, the minimum detectable dose immediately after irradiation is 3 mGy and between 20 and 200 mGy for contact-based and contactless modules, respectively. Dose recovery tests on contact-based modules indicate that the developed methodology yields results with sufficient accuracy for measurements promptly after irradiation, whereas a systematic underestimation is observed for longer delay times. The reasons for this behaviour are as yet not fully understood.

  5. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment.

    Science.gov (United States)

    Ip, Dennis Km; Lau, Eric Hy; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-10-06

    School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card-based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card-based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. We designed and implemented an ILI surveillance system utilizing smart card-based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. We designed and implemented a novel

  6. The purchase of natural gas using a smart card. Energy company and customer sometimes better off with prepayment

    International Nuclear Information System (INIS)

    Meijerink, R.; Meyer, G.E.

    1997-01-01

    In particular in an open market prepayment systems offer advantages for small-scale and large-scale consumers and energy utilities. The use of prepayment systems makes invoices superfluous and defaulters do not have to disconnected. By means of a smart card it is simple to register who made the purchase and to whom gas is supplied. The Dutch natural gas research institute Gastec plans a project to test the safety of prepayment systems

  7. Unconstrained and contactless hand geometry biometrics.

    Science.gov (United States)

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  8. Unconstrained and Contactless Hand Geometry Biometrics

    Directory of Open Access Journals (Sweden)

    Carmen Sánchez-Ávila

    2011-10-01

    Full Text Available This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM and k-Nearest Neighbour (k-NN. Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  9. Research on Efficiency of Contactless Charging System based on Electromagnetic Induction

    Directory of Open Access Journals (Sweden)

    Chen Jianshu

    2016-01-01

    Full Text Available For the efficiency problem of contactless charging in type of electromagnetic induction, this paper establishes a mathematical model of contactless charging in type of electromagnetic induction and the theoretical derivation. This contactless charging simulation model is founded by Matlab/Simulink, which uses the frequency of PWM generator, the mutual inductance value of the coil and load resistance of RL to simulate some conditions, such as the working frequency in practical work, the distance of coil, whether the coils are directed at the central, and changing of loads. Then through the influence of the changing frequency, load and mutual inductance, contactless charging in type of electromagnetic induction is analyzed. By the whole simulation experiment on contactless charging, the theory deduced from the mathematical model is verified, and the method to improve inductive contactless charging is proved.

  10. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  11. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  12. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  13. Optimized Skip-Stop Metro Line Operation Using Smart Card Data

    Directory of Open Access Journals (Sweden)

    Peitong Zhang

    2017-01-01

    Full Text Available Skip-stop operation is a low cost approach to improving the efficiency of metro operation and passenger travel experience. This paper proposes a novel method to optimize the skip-stop scheme for bidirectional metro lines so that the average passenger travel time can be minimized. Different from the conventional “A/B” scheme, the proposed Flexible Skip-Stop Scheme (FSSS can better accommodate spatially and temporally varied passenger demand. A genetic algorithm (GA based approach is then developed to efficiently search for the optimal solution. A case study is conducted based on a real world bidirectional metro line in Shenzhen, China, using the time-dependent passenger demand extracted from smart card data. It is found that the optimized skip-stop operation is able to reduce the average passenger travel time and transit agencies may benefit from this scheme due to energy and operational cost savings. Analyses are made to evaluate the effects of that fact that certain number of passengers fail to board the right train (due to skip operation. Results show that FSSS always outperforms the all-stop scheme even when most passengers of the skipped OD pairs are confused and cannot get on the right train.

  14. A programming and a modelling perspective on the evaluation of Java Card implementations

    NARCIS (Netherlands)

    Hartel, Pieter H.; de Jong, E.; de Jong, Eduard; Attali, Isabelle; Jensen, Thomas

    Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using

  15. Internet of things technologies in smart cities

    CSIR Research Space (South Africa)

    Dlodlo, N

    2016-05-01

    Full Text Available at exploiting the most advanced technologies to support value-added services for the administration of the city and its citizens (Zanella, 2014). Smart cities worldwide live under a ‘data deluge” in which big data generated by people and sensors are processed... single ticket in the form of a smart card which can be loaded with money and is swiped at any point of entry into a transport system using Near Field Communication (NFC) technology to transmit information from the card to the reading machine and back...

  16. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  17. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    Full Text Available Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  18. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  19. Using smart card technology to monitor the eating habits of children in a school cafeteria: 3. The nutritional significance of beverage and dessert choices.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The consumption patterns of beverages and desserts features highly in the current debate surrounding children's nutrition. The aim of this study was to continuously monitor the choice of beverages and desserts made by nearly 1000 children in a school cafeteria. A newly developed smart card system was used to monitor the food choices of diners (7-16-year-old boys) in a school cafeteria over 89 days. A wide variety of beverages and desserts were on offer daily. Despite coming from an affluent, well-educated demographic group, the boys' choices of beverages and desserts mirrored those of children in general. Buns and cookies were over 10 times more popular than fresh fruits and yogurts. Sugary soft-drinks were over 20 times more popular than fresh fruit drinks and milk combined. Appropriate choices could, over a month, reduce intake of added sugar by over 800 g and fat by over 200 g. The smart card system was very effective at monitoring total product choices for nearly 1000 diners. In agreement with a recent national school meal survey, where choice is extensive, children show a preference for products high in fat and/or sugar. The consequences of these preferences are discussed.

  20. Determining the feasibility of objective adherence measurement with blister packaging smart technology.

    Science.gov (United States)

    van Onzenoort, Hein A; Neef, Cees; Verberk, Willem W; van Iperen, H Peter; de Leeuw, Peter W; van der Kuy, Paul-Hugo M

    2012-05-15

    The results of a feasibility study of blister-pack smart technology for monitoring medication adherence are reported. Research in the area of objective therapy compliance measurement has led to the development of microprocessor-driven systems that record the time a unit dose is removed from blister packaging. One device under development is the Smart Blister-a label imprinted with event-detection circuitry that can be affixed to standard commercial blister cards. In the first trial of the device in actual clinical practice, 115 community-dwelling Dutch patients receiving valsartan maintenance therapy (160 mg once daily) were given 14-day blister packages equipped with the Smart Blister. On the return of empty blister cards to the 20 participating community pharmacies, the stored information was scanned and downloaded for data analysis and patient counseling purposes. A total of 245 Smart Blister-equipped packages were used by valsartan recipients during the eight-month study. The device was largely effective in recording patient and blister-card identification data and other desired information. However, in 17% of cases, the Smart Blister system registered multiple tablet-removal events at the same time, presumably indicating unintentional breakage of nearby conductive circuits and the need for design refinements. The Smart Blister-equipped medication cards were generally well received by patients and pharmacies. An evaluation of the functionality and robustness of the Smart Blister in a real-world clinical practice situation yielded some promising results, but the findings also indicated a need for design refinements and additional performance testing of the device.

  1. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    Science.gov (United States)

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  2. A Load Time Policy Checker for Open Multi-Application Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Gadyatskaya, Olga

    2011-01-01

    , traditional approaches for information flow analysis are not suitable. We suggest the Security-by-Contract approach for loading time application certification on the card, that will enable the stakeholders with the means to ensure the compliance of every update of the card with their security policy. We...... describe an extension of the card security architecture to deal with verification for different types of updates and present a Java Card prototype implementation of the Policy Checker with performance measurements....

  3. A programming and a modelling perspective on the evaluation of Java Card implementations

    OpenAIRE

    Hartel, Pieter H.; de Jong, E.; de Jong, Eduard; Attali, Isabelle; Jensen, Thomas

    2000-01-01

    Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using Java achievable in smartcard programming. In particular, efforts towards evaluating Java Card implementations at a high level of assurance may be hampered by the presence of these differences as wel...

  4. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  5. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  6. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  7. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  8. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  9. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  10. What’s in your smart wallet? Challenges and roadblocks

    OpenAIRE

    Haverila, Mikko

    2015-01-01

    The concept of a digital wallet has been around for a few years. Sometimes the words “digital wallet” and “smart wallet” are used interchangeably. This is not the case in this thesis, however. The smart wallet is more than just an electronic payment card embedded into a smart phone; it truly performs all the functions of the traditional wallet but only in digital format. This thesis will discuss the main challenges and roadblocks that need to be addressed in order to build a successful smart ...

  11. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    Science.gov (United States)

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  12. Contactless Ultrasound Generation in a Crucible

    Science.gov (United States)

    Bojarevics, Valdis; Djambazov, Georgi S.; Pericleous, Koulis A.

    2015-07-01

    Ultrasound treatment is used in light alloys during solidification to refine microstructure, remove gas, or disperse immersed particles. A mechanical sonotrode immersed in the melt is most effective when probe tip vibrations lead to cavitation. Liquid contact with the probe can be problematic for high temperature or reactive melts leading to contamination. An alternative contactless method of generating ultrasonic waves is proposed, using electromagnetic (EM) induction. As a bonus, the EM force induces vigorous stirring distributing the effect to treat larger volumes of material. In a typical application, the induction coil surrounding the crucible—also used to melt the alloy—may be adopted for this purpose with suitable tuning. Alternatively, a top coil, immersed in the melt (but still contactless due to EM force repulsion) may be used. Numerical simulations of sound, flow, and EM fields suggest that large pressure amplitudes leading to cavitation may be achievable with this method.

  13. Design and implementation of a contactless multiple hand feature acquisition system

    Science.gov (United States)

    Zhao, Qiushi; Bu, Wei; Wu, Xiangqian; Zhang, David

    2012-06-01

    In this work, an integrated contactless multiple hand feature acquisition system is designed. The system can capture palmprint, palm vein, and palm dorsal vein images simultaneously. Moreover, the images are captured in a contactless manner, that is, users need not to touch any part of the device when capturing. Palmprint is imaged under visible illumination while palm vein and palm dorsal vein are imaged under near infrared (NIR) illumination. The capturing is controlled by computer and the whole process is less than 1 second, which is sufficient for online biometric systems. Based on this device, this paper also implements a contactless hand-based multimodal biometric system. Palmprint, palm vein, palm dorsal vein, finger vein, and hand geometry features are extracted from the captured images. After similarity measure, the matching scores are fused using weighted sum fusion rule. Experimental results show that although the verification accuracy of each uni-modality is not as high as that of state-of-the-art, the fusion result is superior to most of the existing hand-based biometric systems. This result indicates that the proposed device is competent in the application of contactless multimodal hand-based biometrics.

  14. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  15. Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-01-01

    Full Text Available Remote user authentication is the first step to guarantee the security of online services. Online services grow rapidly and numerous remote user authentication schemes were proposed with high capability and efficiency. Recently, there are three new improved remote user authentication schemes which claim to be resistant to various attacks. Unfortunately, according to our analysis, these schemes all fail to achieve some critical security goals. This paper demonstrates that they all suffer from offline dictionary attack or fail to achieve forward secrecy and user anonymity. It is worth mentioning that we divide offline dictionary attacks into two categories: (1 the ones using the verification from smart cards and (2 the ones using the verification from the open channel. The second is more complicated and intractable than the first type. Such distinction benefits the exploration of better design principles. We also discuss some practical solutions to the two kinds of attacks, respectively. Furthermore, we proposed a reference model to deal with the first kind of attack and proved its effectiveness by taking one of our cryptanalysis schemes as an example.

  16. Contactless conductivity detection for analytical techniques — Developments from 2014 to 2016

    Czech Academy of Sciences Publication Activity Database

    Kubáň, Pavel; Hauser, P.C.

    2017-01-01

    Roč. 38, č. 1 (2017), s. 95-114 ISSN 0173-0835 R&D Projects: GA ČR(CZ) GA16-09135S Institutional support: RVO:68081715 Keywords : capacitively coupled contactless conductivity detection * capillary electrophoresis * contactless conductivity detection * analytical techniques * review Subject RIV: CB - Analytical Chemistry, Separation OBOR OECD: Analytical chemistry Impact factor: 2.744, year: 2016

  17. Contactless Mechanical Components: Gears, Torque Limiters and Bearings

    Directory of Open Access Journals (Sweden)

    Jose Luis Perez-Diaz

    2014-12-01

    Full Text Available Contactless mechanical components are mechanical sets for conversion of torque/speed, whose gears and moving parts do not touch each other, but rather they provide movement with magnets and magnetic materials that exert force from a certain distance. Magneto-mechanical transmission devices have several advantages over conventional mechanisms: no friction between rotatory elements (no power losses or heat generation by friction so increase of efficiency, no lubrication is needed (oil-free mechanisms and no lubrication auxiliary systems, reduced maintenance (no lubricant so no need of oil replacements, wider operational temperature ranges (no lubricant evaporation or freezing, overload protection (if overload occurs magnet simply slides but no teeth brake, through-wall connection (decoupling of thermal and electrical paths and environmental isolation, larger operative speeds (more efficient operative conditions, ultralow noise and vibrations (no contact no noise generation. All these advantages permit us to foresee in the long term several common industrial applications in which including contactless technology would mean a significant breakthrough for their performance. In this work, we present three configurations of contactless mechanical passive components: magnetic gears, magnetic torque limiters and superconducting magnetic bearings. We summarize the main characteristic and range of applications for each type; we show experimental results of the most recent developments showing their performance.

  18. Retention of data in heat-damaged SIM cards and potential recovery methods.

    Science.gov (United States)

    Jones, B J; Kenyon, A J

    2008-05-02

    Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.

  19. FPGA-Based HD Camera System for the Micropositioning of Biomedical Micro-Objects Using a Contactless Micro-Conveyor

    Directory of Open Access Journals (Sweden)

    Elmar Yusifli

    2017-03-01

    Full Text Available With recent advancements, micro-object contactless conveyers are becoming an essential part of the biomedical sector. They help avoid any infection and damage that can occur due to external contact. In this context, a smart micro-conveyor is devised. It is a Field Programmable Gate Array (FPGA-based system that employs a smart surface for conveyance along with an OmniVision complementary metal-oxide-semiconductor (CMOS HD camera for micro-object position detection and tracking. A specific FPGA-based hardware design and VHSIC (Very High Speed Integrated Circuit Hardware Description Language (VHDL implementation are realized. It is done without employing any Nios processor or System on a Programmable Chip (SOPC builder based Central Processing Unit (CPU core. It keeps the system efficient in terms of resource utilization and power consumption. The micro-object positioning status is captured with an embedded FPGA-based camera driver and it is communicated to the Image Processing, Decision Making and Command (IPDC module. The IPDC is programmed in C++ and can run on a Personal Computer (PC or on any appropriate embedded system. The IPDC decisions are sent back to the FPGA, which pilots the smart surface accordingly. In this way, an automated closed-loop system is employed to convey the micro-object towards a desired location. The devised system architecture and implementation principle is described. Its functionality is also verified. Results have confirmed the proper functionality of the developed system, along with its outperformance compared to other solutions.

  20. Study of Contactless Power Supply for Spindle Ultrasonic Vibrator

    Science.gov (United States)

    Chen, T. R.; Lee, Y. L.; Liu, H. T.; Chen, S. M.; Chang, H. Z.

    2017-11-01

    In this study, a contactless power supply for the ultrasonic motor on the spindle is proposed. The proposed power supply is composed of a series-parallel resonant circuit and a cylindrical contactless transformer. Based on the study and rotation experiments, it can be seen that the proposed power supply can both provide a stable ac power with 25 kHz / 70 V to the ultrasonic motor. When the output power is 250 W, the efficiency of the proposed supply is 89.8 % in respectively rotation tests. When the output power is more than 150 W, the efficiency of the proposed supply is higher than 80 % within the rated output power range.

  1. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  2. Proposing a Model for Patient Admission and NFC Mobile Payment by Biometric Identification and Smart Health Card

    Directory of Open Access Journals (Sweden)

    Mahdi Barkhordari Firouzabadi

    2016-02-01

    Full Text Available Abstract Following the advances in mobile communication and information technology, smart phones have been used in a wide variety of commercial, social, entertainment, file sharing and health transactions and applications. The current procedures in healthcare environment for patient registration, appointment scheduling and payment are time consuming and somehow tiresome. Traditionally, patients were supposed to fill out registration forms, wait for being called, and finally stand in long lines for payment procedures. In some places, appointment could be done online via web but still the patient has to walk in with appointment card and in our case, provide the insurance booklet to the front desk personnel to pay for services and receive discounts for insurance. Therefore, the present study intended to propose a model using Near Field Communication-enabled mobile application for a medical clinic which currently offers online and call services for making an appointment, though patient waiting time is still too much in the current process of payment for services.

  3. Ring aggregation pattern of metro passenger trips: A study using smart card data

    Science.gov (United States)

    Wang, Ziyang; Hu, Yuxin; Zhu, Peng; Qin, Yong; Jia, Limin

    2018-02-01

    With the widespread implementation of smart cards and with more travel details being recorded, travel patterns can be studied more precisely and deeply. Although considerable attention has been paid to travel patterns, the relationship between travel patterns and the functional structure of a city is yet to be well understood. In this research, we study this relationship by analysing metro passenger trip data (in Beijing and Shenzhen in China and London in the United Kingdom), and we present two unprecedented findings. First, through averaging, a linear relationship is found to exist between individual travel distance and the distance between the origin and the city centre. The underlying mechanism is a travel pattern we call "ring aggregation", i.e., the daily movement of city passengers is aggregated into a ring (with approximately equal distances to the city centre). Then, for commuting trips, the daily travel pattern can be regarded as switching between the outer residential ring and the inner work ring. Second, this linear relationship and the ring aggregation pattern seem to be exclusive characteristics of metro systems (and may also fit other moderate- and long-distance transportation modes) but do not apply to short-distance transportation modes, such as bicycles and taxis. This finding implies that the ring aggregation pattern is a product of the relationship between travel patterns and the city functional structure at a large scope.

  4. Contactless vector network analysis using diversity calibration with capacitive and inductive coupled probes

    Directory of Open Access Journals (Sweden)

    T. Zelder

    2007-06-01

    Full Text Available Contactless vector network analysis based on a diversity calibration is investigated for the measurement of embedded devices in planar circuits. Conventional contactless measurement systems based on two probes for each measurement port have the disadvantage that the signal-to-noise system dynamics strongly depends on the distance between the contactless probes.

    In order to avoid a decrease in system dynamics a diversity based measurement system is presented. The measurement setup uses one inductive and two capacitive probes. As an inductive probe a half magnetic loop in combination with a broadband balun is introduced. In order to eliminate systematic errors from the measurement results a diversity calibration algorithm is presented. Simulation and measurement results for a one-port configuration are shown.

  5. Vehicle Fault Diagnose Based on Smart Sensor

    Science.gov (United States)

    Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng

    In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.

  6. SIMULASI SISTEM KELISTRIKAN KAMAR HOTEL MENGGUNAKAN SMART RELAY

    Directory of Open Access Journals (Sweden)

    I Nyoman Sukarma

    2018-03-01

    Full Text Available Fungsi dari alat key tag atau hotel switch atau key card adalah memutus atau menyambungkan aliran listrik ke dalam suatu area tertentu atau ruang. Key tag memiliki peran penting pada kamar hotel untuk mencegah pemborosan energi pada saat kamar hotel tidak berpenghuni atau belum tersewakan. Untuk itu, penulis merancang simulasi sistem kelistrikan pada kamar hotel yang dikontrol dengan smart relay. Pada simulasi ini digunakan smart relay Zelio Logic buatan Schneider Electric. Pemrograman smart relay ini menggunakan ladder diagram yang disusun menggunakan perangkat lunak ZelioSoft2 dari Schneider Electric. Smart relay menerima sinyal masukan dari sensor, key tag dan sakelar. Sinyal masukan tersebut selanjutnya diproses agar lampu, kotak-kontak, exhaust fan, dan AC (Air Conditioner pada kamar hotel dapat bekerja.

  7. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System.

    Science.gov (United States)

    Xiao, Changjiang; Chen, Nengcheng; Li, Dandan; Lv, You; Gong, Jianya

    2016-12-30

    Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web-enabled smart cultural relics management system (SCRMS). In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID) is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  8. Laboratory skinpatches and smart cards based on foils.

    Science.gov (United States)

    Ruano-López, Jesús M; Laouenan, Florian; Agirregabiria, Maria; Rodriguez, Sonia; Krüger, Jan; Flavin, Diarmuid

    2011-01-01

    This paper presents: (i) a hand held system consisting of a portable platform and disposable polymeric Lab-on-a-card capable of performing a nucleic acid concentration, amplification and detection with reagents inside; and a (ii) wearable diagnostic Lab-on-a-Paper skinpatch system, capable of performing in-situ sweat sampling, analyte pre-concentration, and immunoassay analysis. The skinpatch works in conjunction with a hand-held optoelectronic reader / micro PC fluorescence analysis interface.

  9. SMART core protection system design

    International Nuclear Information System (INIS)

    Lee, J. K.; Park, H. Y.; Koo, I. S.; Park, H. S.; Kim, J. S.; Son, C. H.

    2003-01-01

    SMART COre Protection System(SCOPS) is designed with real-tims Digital Signal Processor(DSP) board and Network Interface Card(NIC) board. SCOPS has a Control Rod POSition (CRPOS) software module while Core Protection Calculator System(CPCS) consists of Core Protection Calculators(CPCs) and Control Element Assembly(CEA) Calculators(CEACs) in the commercial nuclear plant. It's not necessary to have a independent cabinets for SCOPS because SCOPS is physically very small. Then SCOPS is designed to share the cabinets with Plant Protection System(PPS) of SMART. Therefor it's very easy to maintain the system because CRPOS module is used instead of the computer with operating system

  10. [Electronic medical records in Bosnia-Herzegovina. The electronic card--the medical record of the future in Boznia-Herzegovina].

    Science.gov (United States)

    Masić, I; Pandza, H; Ridanović, Z; Dover, M

    1997-01-01

    The biggest problem in organisation of the effective and rational health care of good quality in Bosnia quality and Herzegovina is a functional and updated Health Information System. In this system, important role play Health Statistic System in which documentation and evidence are very important segment. Developed countries proceeded from the manual and semiautomatic method of medical data processing and system management to the new methods of entering, storage, transfer, searching and protection of data using electronic equipment. Recently, the competition between manufacturers of the Smart Card and Laser Card is reality. Also scientific and professional debate exists about the standard card for storage of medical information in Health Care System. First option is supported by West European countries that developing Smart Card called Eurocard and second by USA and Far East countries. Because the Health Care System and other segments of Society of Bosnia and Herzegovina innovate intensively similar systems, the authors of this article intend to open discussion, and to show advantages and failures of each technological medium.

  11. USING PHOTOPLETHYSMOGRAPHY IMAGING FOR OBJECTIVE CONTACTLESS PAIN ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Marcus Koeny

    2014-08-01

    Full Text Available This work presents an extension to the known Analgesia Nociception Index (ANI, which provides an objective estimation of the current depth of analgesia. An adequate “measure” would facilitate so-called balanced anesthesia. Generally, ANI is computed using heart rate variability or rather beat-to-beat intervals based on an electrocardiogram (ECG. There are clinical situations where no ECG monitoring is available or required, but only photoplethysmography (PPG, e.g., in some cases in postoperative care or pain therapy. In addition, a combination of PPG and ECG for obtaining beat-to-beat intervals may lead to increased robustness and reliability for dealing with artifacts. This work therefore investigates the computation of ANI using standard PPG. In addition, new methods and opportunities are presented using contactless PPG imaging (PPGI. PPGI®enables contactless PPG recordings for deriving beat-to-beat intervals as well as analysis of local perfusion and wounds.

  12. Optimised to Fail: Card Readers for Online Banking

    Science.gov (United States)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  13. The Learning Credit Card: A Tool for Managing Personal Development

    Science.gov (United States)

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  14. Development of a contactless capacitive immunosensor

    OpenAIRE

    Perruche, Brice Emmanuel

    2011-01-01

    In the present work, a label-free, contactless and capacitive immunosensor is developed using impedance spectroscopy, in the aim to perform low-cost immunoassays. Chapter 1 puts this work in perspective with some existing techniques, while a presentation of impedance theory used in this work is carried out in chapter 2. In Chapter 3, numerical simulations using a commercial finite element method software is carried out. The response of coplanar and fa...

  15. Acoustophoretic contactless transport and handling of matter in air.

    Science.gov (United States)

    Foresti, Daniele; Nabavi, Majid; Klingauf, Mirko; Ferrari, Aldo; Poulikakos, Dimos

    2013-07-30

    Levitation and controlled motion of matter in air have a wealth of potential applications ranging from materials processing to biochemistry and pharmaceuticals. We present a unique acoustophoretic concept for the contactless transport and handling of matter in air. Spatiotemporal modulation of the levitation acoustic field allows continuous planar transport and processing of multiple objects, from near-spherical (volume of 0.1-10 μL) to wire-like, without being limited by the acoustic wavelength. The independence of the handling principle from special material properties (magnetic, optical, or electrical) is illustrated with a wide palette of application experiments, such as contactless droplet coalescence and mixing, solid-liquid encapsulation, absorption, dissolution, and DNA transfection. More than a century after the pioneering work of Lord Rayleigh on acoustic radiation pressure, a path-breaking concept is proposed to harvest the significant benefits of acoustic levitation in air.

  16. Distortion analysis on binary representation of minutiae based fingerprint matching for match-on-card

    CSIR Research Space (South Africa)

    Mlambo, CS

    2016-12-01

    Full Text Available The fingerprint matching on the smart card has long been developed and recognized faster method than fingerprint matching on a computer or large capacity systems. There has been much research and activities concerned with improving the accuracy...

  17. Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan.

    Science.gov (United States)

    Hsu, Min-Huei; Yeh, Yu-Ting; Chen, Chien-Yuan; Liu, Chien-Hsiang; Liu, Chien-Tsai

    2011-03-01

    Doctor shopping (or hospital shopping), which means changing doctors (or hospitals) without professional referral for the same or similar illness conditions, is common in Hong Kong, Taiwan and Japan. Due to the lack of infrastructure for sharing health information and medication history among hospitals, doctor-shopping patients are more likely to receive duplicate medications and suffer adverse drug reactions. The Bureau of National Health Insurance (BNHI) adopted smart cards (or NHI-IC cards) as health cards in Taiwan. With their NHI-IC cards, patients can freely access different medical institutions. Because an NHI-IC card carries information about a patient's prescribed medications received from different hospitals nationwide, we used this system to address the problem of duplicate medications for outpatients visiting multiple hospitals. A computerized physician order entry (CPOE) system was enhanced with the capability of accessing NHI-IC cards and providing alerts to physicians when the system detects potential duplicate medications at the time of prescribing. Physician responses to the alerts were also collected to analyze changes in physicians' behavior. Chi-square tests and two-sided z-tests with Bonferroni adjustments for multiple comparisons were used to assess statistical significance of differences in actions taken by physicians over the three months. The enhanced CPOE system for outpatient services was implemented and installed at the Pediatric and Urology Departments of Taipei Medical University Wan-Fang Hospital in March 2007. The "Change Log" that recorded physician behavior was activated during a 3-month study period from April to June 2007. In 67.93% of patient visits, the physicians read patient NHI-IC cards, and in 16.76% of the reads, the NHI-IC card contained at least one prescribed medication that was taken by the patient. Among the prescriptions issued by physicians, on average, there were 2.36% prescriptions containing at least one

  18. Fast Lamb wave energy shift approach using fully contactless ultrasonic system to characterize concrete structures

    Science.gov (United States)

    Ham, Suyun; Popovics, John S.

    2015-03-01

    Ultrasonic techniques provide an effective non-destructive evaluation (NDE) method to monitor concrete structures, but the need to perform rapid and accurate structural assessment requires evaluation of hundreds, or even thousands, of measurement datasets. Use of a fully contactless ultrasonic system can save time and labor through rapid implementation, and can enable automated and controlled data acquisition, for example through robotic scanning. Here we present results using a fully contactless ultrasonic system. This paper describes our efforts to develop a contactless ultrasonic guided wave NDE approach to detect and characterize delamination defects in concrete structures. The developed contactless sensors, controlled scanning system, and employed Multi-channel Analysis of Surface Waves (MASW) signal processing scheme are reviewed. Then a guided wave interpretation approach for MASW data is described. The presence of delamination is interpreted by guided plate wave (Lamb wave) behavior, where a shift in excited Lamb mode phase velocity, is monitored. Numerically simulated and experimental ultrasonic data collected from a concrete sample with simulated delamination defects are presented, where the occurrence of delamination is shown to be associated with a mode shift in Lamb wave energy.

  19. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System

    Directory of Open Access Journals (Sweden)

    Changjiang Xiao

    2016-12-01

    Full Text Available Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web–enabled smart cultural relics management system (SCRMS. In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  20. Optical Fibres Contactless Sensor for Dynamic Testing of Lightweight Structures

    Directory of Open Access Journals (Sweden)

    L. Bregant

    2008-01-01

    Full Text Available With dynamic testing, engineers describe activities focused on the identification of some properties of vibrating structures. This step requires for the measurements of excitations and responses signals, applying appropriate sensors directly on the test article. These instruments modify the system's mass and stiffness distributions and eventually the eigen-properties of the structure. These errors become unacceptable especially when testing lightweight structures. This paper shows the results of some tests performed on a small compressor with the purpose of identifying the blades’ natural frequencies and modes. It compares the acquisitions performed with standard accelerometers and two different contact-less systems using as exciters either a micro-hammer or a micro inertial shaker. The paper shows how the contact-less sensors provide good quality data and consistent results in the mode identification phase.

  1. Time Delay Measurements of Key Generation Process on Smart Cards

    Science.gov (United States)

    2015-03-01

    delve into the meat of the thesis, describing a java program written to test DOD CAC cards that have ECC algorithms implemented. Test data will be...WICOM.2009.5302782 Defense Enterprise Mobility – A game changer for the Department of Defense. (2012, Jan.). , DISA: DOD Mobility Program. Retrieved

  2. Registration system of cloud campus by using android smart tablet.

    Science.gov (United States)

    Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko

    2014-01-01

    Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.

  3. Accurate magnetic field calculations for contactless energy transfer coils

    NARCIS (Netherlands)

    Sonntag, C.L.W.; Spree, M.; Lomonova, E.A.; Duarte, J.L.; Vandenput, A.J.A.

    2007-01-01

    In this paper, a method for estimating the magnetic field intensity from hexagon spiral windings commonly found in contactless energy transfer applications is presented. The hexagonal structures are modeled in a magneto-static environment using Biot-Savart current stick vectors. The accuracy of the

  4. Contactless Diagnostics of Turbine Blade Vibration and Damage

    International Nuclear Information System (INIS)

    Prochazka, Pavel; Vanek, Frantisek

    2011-01-01

    The study deals with the contactless diagnostic method used for the identification of steam turbine blade strain, vibration and damage. The tip-timing method based on the evaluation of time differences of blade passages in different rotor revolutions has been modified and improved to provide more precise and reliable results. A new approach to the analysis of the amplitude and time differences of impulse signals generated by a blade passage has been applied. Amplitudes and frequencies of vibrations and static position of blades ascertained by the diagnostic process are used to establish the state of blade damage. A contactless diagnostic system VDS-UT based on magneto-resistive sensors was developed in the Institute of Thermomechanics Academy of Sciences of the Czech Republic. The system provides on-line monitoring of vibration amplitudes and frequencies of all blades and notification of possible blade damage. Evaluation of the axial and circumferential components of the deflections by measuring the amplitude of blade impulse signals results in an overall improvement of the method. Using magneto-resistive sensors, blade elongation and untwisting can be determined as well.

  5. Formalizing the Safety of Java, the Java Virtual Machine and Java Card

    NARCIS (Netherlands)

    Hartel, Pieter H.; Moreau, Luc

    2001-01-01

    We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smart cards. The conclusion is that while a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine readable

  6. Smart parking barrier

    KAUST Repository

    Alharbi, Abdulrazaq M.

    2016-05-06

    Various methods and systems are provided for smart parking barriers. In one example, among others, a smart parking barrier system includes a movable parking barrier located at one end of a parking space, a barrier drive configured to control positioning of the movable parking barrier, and a parking controller configured to initiate movement of the parking barrier, via the barrier drive. The movable parking barrier can be positioned between a first position that restricts access to the parking space and a second position that allows access to the parking space. The parking controller can initiate movement of the movable parking barrier in response to a positive identification of an individual allowed to use the parking space. The parking controller can identify the individual through, e.g., a RFID tag, a mobile device (e.g., a remote control, smartphone, tablet, etc.), an access card, biometric information, or other appropriate identifier.

  7. Contactless Opto-electronic Area and Their Attainable Measuring Accuracy

    Directory of Open Access Journals (Sweden)

    V. Ricny

    2001-06-01

    Full Text Available This paper deals with the problems of the contactless areameasurement on the principle of video signal processing. This videosignal generates TV camera, which scans the measured object. Basicprinciple of these meters is explained and attainable measurementaccuracy and factors influencing this accuracy are analyzed.

  8. The INCAS Project: An Innovative Contact-Less Angular Sensor

    Science.gov (United States)

    Ghislanzoni, L.; Di Cintio, A.; Solimando, M.; Parzianello, G.

    2013-09-01

    Angular Positions sensors are widely used in all spacecrafts, including re-entry vehicles and launchers, where mechanisms and pointing-scanning devices are required. The main applications are on mechanisms for TeleMeasure (TM) related to the release and deployment of devices, or on rotary mechanisms such as Solar Array Drive Mechanism (SADM) and Antenna Pointing Mechanism (APM). Longer lifetime (up to 7- 10 years) is becoming a new driver for the coming missions and contact technology sensors often incur in limitations due to the wear of the contacting parts [1].A Self-Compensating Absolute Angular Encoder was developed and tested in the frame of an ESA's ARTES 5.2 project, named INCAS (INnovative Contact-less Angular Sensor). More in particular, the INCAS sensor addresses a market need for contactless angular sensors aimed at replacing the more conventional rotary potentiometers, while featuring the same level of accuracy performances and extending the expected lifetime.

  9. Tethered Contactless Mobile Nuclear Environment Monitoring Robot

    International Nuclear Information System (INIS)

    Choi, S. Y.; Lee, E. S.; Lee, Kun J.; Kim, Su H.; Rim, C. T.

    2013-01-01

    In fact, the nuclear environment monitoring is significantly crucial for early detection of NPP accident, radiological emergency, the estimation of radiation exposure to nearby residents as well as the long term radioactivity. In the UAE, the nuclear environment monitoring is, however, quite challenging because sampling locations are far from NPPs and the outdoor temperature and humidity are very high for NPP workers to collect soil, air, and water samples. Therefore, nuclear environment monitoring robots (Nubos) are strongly needed for the NPPs in the UAE. The Nubos can be remotely controlled to collect samples in extreme environment instead of NPP workers. Moreover, the Nubos can be unmanned ground vehicles (UGVs), unmanned aerial vehicles (UAVs) and unmanned marine vehicles (UMVs) to collect soil, air, and water samples, respectively. In this paper, the prototype development of UGV type Nubos using power cable for a long distance power delivery, called Tethered contactless mobile Nubo is introduced and validated by experiments. In this paper, the prototype development of Tethered Contactless Mobile (TeCoM) Nubo, which can be powered continuously within several km distance and avoid tangled cable, and the indoor test are finished. As further works, outdoor demonstration and a grand scale R and D proposal of practical Nubo will be proceeded

  10. Tethered Contactless Mobile Nuclear Environment Monitoring Robot

    Energy Technology Data Exchange (ETDEWEB)

    Choi, S. Y.; Lee, E. S.; Lee, Kun J.; Kim, Su H.; Rim, C. T. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2013-05-15

    In fact, the nuclear environment monitoring is significantly crucial for early detection of NPP accident, radiological emergency, the estimation of radiation exposure to nearby residents as well as the long term radioactivity. In the UAE, the nuclear environment monitoring is, however, quite challenging because sampling locations are far from NPPs and the outdoor temperature and humidity are very high for NPP workers to collect soil, air, and water samples. Therefore, nuclear environment monitoring robots (Nubos) are strongly needed for the NPPs in the UAE. The Nubos can be remotely controlled to collect samples in extreme environment instead of NPP workers. Moreover, the Nubos can be unmanned ground vehicles (UGVs), unmanned aerial vehicles (UAVs) and unmanned marine vehicles (UMVs) to collect soil, air, and water samples, respectively. In this paper, the prototype development of UGV type Nubos using power cable for a long distance power delivery, called Tethered contactless mobile Nubo is introduced and validated by experiments. In this paper, the prototype development of Tethered Contactless Mobile (TeCoM) Nubo, which can be powered continuously within several km distance and avoid tangled cable, and the indoor test are finished. As further works, outdoor demonstration and a grand scale R and D proposal of practical Nubo will be proceeded.

  11. E-COMMERCE WITH ONLINE PAYMENT THROUGH BANK CARD

    Directory of Open Access Journals (Sweden)

    OANA ŞEITAN

    2010-01-01

    Full Text Available The e-commerce has become a routine part of human life because it offers major advantages: convenience (it’s no longer necessary to visit a store to be able to shop, efficiency (the buyer can visit several virtual shops in a very short time, the crowd of shops and the frustration caused by the lack of parking spaces available can be avoided, the customer can choose and compare the desired products taking in consideration a set of characteristics such as price, grammage, color, delivery dat, etc. and the development of secure solutions for online payment (through: bank cards, ePay, cybercash, SmartCard, electronic funds transfer, Ecash. In the last decade, the electronic payment systems have been improved, reaching high levels of security and speed, acquiring a private, confidential, decentralization and internationalization character.

  12. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  13. Centrifugal turbocompressor with contactless sealing for H-2 S

    International Nuclear Information System (INIS)

    Peculea, M.; Balint, I.; Hirean, I.; Dumitrescu, C.; Pitigoi, Gh.; Balanuca, C.

    1995-01-01

    This paper reports the development of a centrifugal turbocompressor with contactless sealing for H 2 S specially designed for the ROMAG Drobeta heavy water plant. The bench-scale experiments are described and the resulted main characteristics are given. For this equipment an asymmetric automatic anti-pumping protection system has been developed and patented

  14. The effect of using the health smart card vs. CPOE reminder system on the prescribing practices of non-obstetric physicians during outpatient visits for pregnant women in Taiwan.

    Science.gov (United States)

    Long, An-Jim; Chang, Polun

    2012-09-01

    There is an evidence that pregnant women have been prescribed a significant number of improper medications that could lead to potential damage for a developing fetus due to discontinuity of care. The safety of pregnant women raises public concern and there is a need to identify ways to prevent potential adverse events to the pregnant woman. This study used a health smart card with a clinical reminder system to keep continuous records of general outpatient visits of pregnant women to protect them from potential adverse events caused by improper prescription. The health smart card, issued to all 23 million citizens in Taiwan, was used to work with a Computerized Physician Order Entry (CPOE) implemented at a 700-bed teaching medical center in Taipei to provide the outpatient information of pregnant women. FDA pregnancy risk classification was used to categorize the risk of pregnant women. The log file, combined with the physicians' and patients' profiles, were statistically examined using the Mantel-Haenszel technique to evaluate the impact of system in changing physician's prescription behavior. A total of 441 patients ranged in age from 15 to 50 years with 1114 prescriptions involved in FDA pregnancy risk classification C, D, and X during the study period. 144 reminders (13.1%) were accepted by physicians for further assessment and 100 (69.4%) of them were modified. Non-obstetric physicians in non-emergency setting were more intended to accept reminders (27.8%, 4.9 folds than obstetricians). Reminders triggered on patients in second trimester (15.5%) were accepted by all physicians more than third trimester (OR 1.52, psmart card armed with CPOE reminder system and well-defined criteria had the potential to decrease harmful medication prescribed to pregnant patients. The results show better conformance for non-obstetric physicians (26%) and when physicians accepted the alerts they are more likely to went back and review their orders (69%). In sum, reminder criteria

  15. Development of a contactless DC current sensor with high linearity and sensitivity based on the magnetoelectric effect

    Science.gov (United States)

    Castro, N.; Reis, S.; Silva, M. P.; Correia, V.; Lanceros-Mendez, S.; Martins, P.

    2018-06-01

    The magnetoelectric (ME) effect is increasingly being considered an attractive alternative for magnetic field and smart current sensing, being able to sense static and dynamic magnetic fields. This work reports on a contactless DC current sensor device based on a ME PVDF/Metglas composite, a solenoid and the corresponding electronic instrumentation. The ME sample shows a maximum resonant ME coefficient (α 33) of 34.48 V cm‑1 Oe‑1, a linear response (R 2 = 0.998) and a sensitivity of 6.7 mV A‑1. With the incorporation of a charge amplifier, an AC-RMS converter and a microcontroller the linearity is maintained (R 2 = 0.997), the ME output voltage increases to a maximum of 2320 mV and the sensitivity rises to 476.5 mV A‑1. Such features allied to the highest sensitivity reported in the literature on polymer-based ME composites provide to the reported ME sensing device suitable characteristics to be used in non-contact electric current measurement, motor operational status checking, and condition monitoring of rechargeable batteries, among others.

  16. Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens.

    Science.gov (United States)

    Lai, Jiun-Tze; Hou, Ting-Wei

    2008-04-01

    An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.

  17. Slovenian national health insurance card: the next step.

    Science.gov (United States)

    Kalin, T; Kandus, G; Trcek, D; Zupan, B

    1999-01-01

    The Slovenian national health insurance company started a full-scale deployment of the insurance smart card that is at the present used for insurance data and identification purpose only. There is ample capacity on the cards that were selected, to contain much more data than needed for the purely administrative and charging purposes. There are plans to include some basic medical information, donor information, etc. On the other hand, there are no firm plans to use the security infrastructure and the extensive network, connecting the insurance company with the more than 200 self service terminals positioned at the medical facilities through the country to build an integrated medical information system that would be very beneficial to the patients and the medical community. This paper is proposing some possible future developments and further discusses on the security issues involved with such countrywide medical information system.

  18. Investigating the Activities of Children toward a Smart Storytelling Toy

    Science.gov (United States)

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2013-01-01

    This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…

  19. CAC on a MAC: Setting up a DOD Common Access Card Reader on the Macintosh OS X Operating System

    National Research Council Canada - National Science Library

    Hopfner, Phil

    2006-01-01

    .... The CAC readers in conjunction with the user's Smart Card enables access to DoD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DoD Public Key Infrastructure (PKI...

  20. Contactless, photoinitiated snap-through in azobenzene-functionalized polymers.

    Science.gov (United States)

    Shankar, M Ravi; Smith, Matthew L; Tondiglia, Vincent P; Lee, Kyung Min; McConney, Michael E; Wang, David H; Tan, Loon-Seng; White, Timothy J

    2013-11-19

    Photomechanical effects in polymeric materials and composites transduce light into mechanical work. The ability to control the intensity, polarization, placement, and duration of light irradiation is a distinctive and potentially useful tool to tailor the location, magnitude, and directionality of photogenerated mechanical work. Unfortunately, the work generated from photoresponsive materials is often slow and yields very small power densities, which diminish their potential use in applications. Here, we investigate photoinitiated snap-through in bistable arches formed from samples composed of azobenzene-functionalized polymers (both amorphous polyimides and liquid crystal polymer networks) and report orders-of-magnitude enhancement in actuation rates (approaching 10(2) mm/s) and powers (as much as 1 kW/m(3)). The contactless, ultra-fast actuation is observed at irradiation intensities focusing on isolating the role of sample geometry, mechanical properties of the materials, and photomechanical strain. Using light to trigger contactless, ultrafast actuation in an otherwise passive structure is a potentially versatile tool to use in mechanical design at the micro-, meso-, and millimeter scales as actuators, as well as switches that can be triggered from large standoff distances, impulse generators for microvehicles, microfluidic valves and mixers in laboratory-on-chip devices, and adaptive optical elements.

  1. AKILLI KARTLAR İLE YAPILAN MAL VE HİZMET SATIŞLARININ TMS-18 HASILAT STANDARDI ÇERÇEVESİNDE MUHASEBELEŞTİRİLMESİ-RECOGNITION OF SOLD GOODS AND SERVICES BY SMART CARDS WITHIN TMS-18 REVENUE STANDARD

    Directory of Open Access Journals (Sweden)

    Abitter ÖZULUCAN

    2012-06-01

    Full Text Available Bu çalışmada;, önce akıllı kart / yemek çekleri sistemi tanıtılmakta, tarafların sağladıkları fayda ve maliyetler belirtilmekte ve gerçekleşen satış işleminin taraflarca kayda geçirilmesi hususu TMS 18 Hasılat standardı kapsamında ele alınmaktadır. Elde edilen hasılatın ölçümünde, sistemin işleyişinde temel unsur olan ve üye iş yeri tarafından yemek kartı tedavül eden işletmeye hizmet faturası karşılığında ödenen komisyonların, hasılatla doğrudan ilişkilendirilebilen bir gider niteliği taşıyıp taşımaması; bu türden giderlerin Tekdüzen Muhasebe Sistemi’nden farklı olarak, TMS 18 kapsamındaki ölçümünün ve muhasebeleştirilmesinin farklı olup olmadığının belirlenmesi amacıyla kaleme alınan bu çalışma, giriş ve sonuç bölümlerinin dışında dört bölümden oluşmaktadır.-The main part of the smart card system is sellers and while they are measuring of their revenue, they should associate the commissions with revenues to record at inception. So in this paper, after the smart card system is introduced, the advantages and disadvantages of this system are exposed and then how to recognise of the selling is considered within TMS 18, Revenues Standard. In other words, the reason that we conduct this paper can be expressed that the expense of the selling commissions which arise from the selling products with smart card whether should or should not deduct to revenue while the revenue is been measured.

  2. The biometric recognition on contactless multi-spectrum finger images

    Science.gov (United States)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  3. Authenticated, private, and secured smart cards (APS-SC)

    Science.gov (United States)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  4. PENGARUH PEMBELAJARAN TEAM ASSISTED INDIVIDUALIZATION (TAI BERBANTUAN MEDIA SMART AND INTERESTING CARD (SIC TERHADAP HASIL BELAJAR SISWA

    Directory of Open Access Journals (Sweden)

    Kun Khuriya Pratiwi

    2015-11-01

    Full Text Available This experiment aimed to determine the influence of student’s learning outcomes of Senior High School (SHS in Parakan through the application of TAI (Team Assisted Individualization assisted of SIC (Smart and Interesting Card media on the subject of redox reaction. The population in this experiment were X grade students Senior High School (SHS in Parakan of the school year 2011/2012. Determination of the sample used cluster random sampling system that obtained two classes where X-3 as an experimental group that was treated by using TAI method assisted by SIC media and X-4 as a control group that was treated conventional methods. The research data was obtained by the method of documentation, testing, questionnaire and observation. The final analysis methods are normalization test, the similarity of two varians test, difference of two average test, gain test, biserial correlation, determination coefficient and analysis of questionnaire and observation sheet. The results showed that experiment class better than the control class. The results of study obtained results of the experimental group had an average 76,78 and a control group had an average of 67,82. TAI method assisted by SIC media give contribution to the learning outcome as 30%.Key words: TAI learning, SIC media 

  5. Mapping and navigational control for a “smart” wheelchair.

    Science.gov (United States)

    Schultz, Dana L; Shea, Kathleen M; Barrett, Steven F

    2012-01-01

    A “smart” wheelchair is in development to provide mobility to those unable to control a traditional wheelchair. A “smart” wheelchair is an autonomous machine with the ability to navigate a mapped environment while avoiding obstacles. The flexibility and complex design of “smart” wheelchairs have made those currently available expensive. Ongoing research at the University of Wyoming has been aimed at designing a cheaper, alternative control system that could be interfaced with a typical powered wheelchair. The goal of this project is to determine methods for mapping and navigational control for the wheelchair. The control system acquires data from eighteen sensors and uses the data to navigate around a pre-programmed map which is stored on a micro SD card. The control system also provides a user interface in the form of a touchscreen LCD. The designed system will be an easy-to-use and cost effective alternative to current “smart” wheelchair technology.

  6. Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals

    Science.gov (United States)

    Houdeau, Detlef

    The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.

  7. Charge It Right. FDIC Money Smart Financial Education Curriculum = Uso Correcto de su Tarjeta de Credito. FDIC Money Smart Plan de Education para Capacitacion en Finanzas.

    Science.gov (United States)

    Federal Deposit Insurance Corp., Washington, DC.

    This module on managing a credit card is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to describe the costs and benefits of…

  8. Investigation of contactless detection using a giant magnetoresistance sensor for detecting prostate specific antigen.

    Science.gov (United States)

    Sun, Xuecheng; Zhi, Shaotao; Lei, Chong; Zhou, Yong

    2016-08-01

    This paper presents a contactless detection method for detecting prostate specific antigen with a giant magnetoresistance sensor. In contactless detection case, the prostate specific antigen sample preparation was separated from the sensor that prevented the sensor from being immersed in chemical solvents, and made the sensor implementing in immediately reuse without wash. Experimental results showed that applied an external magnetic field in a range of 50 Oe to 90 Oe, Dynabeads with a concentration as low as 0.1 μg/mL can be detected by this system and could give an approximate quantitation to the logarithmic of Dynabeads concentration. Sandwich immunoassay was employed for preparing PSA samples. The PSA capture was implemented on a gold film modified with a self-assembled monolayer and using biotinylated secondary antibody against PSA and streptavidinylated Dynabeads. With DC magnetic field in the range of 50 to 90 Oe, PSA can be detected with a detection limit as low as 0.1 ng/mL. Samples spiked with different concentrations of PSA can be distinguished clearly. Due to the contactless detection method, the detection system exhibited advantages such as convenient manipulation, reusable, inexpensive, small weight. So, this detection method was a promising candidate in biomarker detection, especially in point of care detection.

  9. Palmprint and Palmvein Recognition Based on DCNN and A New Large-Scale Contactless Palmvein Dataset

    Directory of Open Access Journals (Sweden)

    Lin Zhang

    2018-03-01

    Full Text Available Among the members of biometric identifiers, the palmprint and the palmvein have received significant attention due to their stability, uniqueness, and non-intrusiveness. In this paper, we investigate the problem of palmprint/palmvein recognition and propose a Deep Convolutional Neural Network (DCNN based scheme, namely P a l m R CNN (short for palmprint/palmvein recognition using CNNs. The effectiveness and efficiency of P a l m R CNN have been verified through extensive experiments conducted on benchmark datasets. In addition, though substantial effort has been devoted to palmvein recognition, it is still quite difficult for the researchers to know the potential discriminating capability of the contactless palmvein. One of the root reasons is that a large-scale and publicly available dataset comprising high-quality, contactless palmvein images is still lacking. To this end, a user-friendly acquisition device for collecting high quality contactless palmvein images is at first designed and developed in this work. Then, a large-scale palmvein image dataset is established, comprising 12,000 images acquired from 600 different palms in two separate collection sessions. The collected dataset now is publicly available.

  10. Model-based security analysis of the German health card architecture.

    Science.gov (United States)

    Jürjens, J; Rumm, R

    2008-01-01

    Health-care information systems are particularly security-critical. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such systems. This work presents the experiences and results from the security analysis of the system architecture of the German Health Card, by making use of an approach to model-based security engineering that is based on the UML extension UMLsec. The focus lies on the security mechanisms and security policies of the smart-card-based architecture which were analyzed using the UMLsec method and tools. Main results of the paper include a report on the employment of the UMLsec method in an industrial health information systems context as well as indications of its benefits and limitations. In particular, two potential security weaknesses were detected and countermeasures discussed. The results indicate that it can be feasible to apply a model-based security analysis using UMLsec to an industrial health information system like the German Health Card architecture, and that doing so can have concrete benefits (such as discovering potential weaknesses, and an increased confidence that no further vulnerabilities of the kind that were considered are present).

  11. Using Contactless Scanners for Quality Inspection

    Directory of Open Access Journals (Sweden)

    Mendřický Radomír

    2017-01-01

    Full Text Available The article presents the research of use of modern 3D measurement contactless methods for quality inspection in automotive industry production. The experience with measuring functional assemblies and parts of complex shapes as well as advantages of optical measurement methods are shown on practical research example, whose aim was to find effective procedures and methods of obtaining 3-dimensional high-definition models of measured components. The obtained models were then subjected to inspection of their dimensional and shape accuracy, which was performed by means of comparison with the nominal CAD model, as well as to analyses of the assembly functionality by searching or collision situations of the movable parts of this mechanism.

  12. Morphing Surfaces Enable Acoustophoretic Contactless Transport of Ultrahigh-Density Matter in Air

    Science.gov (United States)

    Foresti, Daniele; Sambatakakis, Giorgio; Bottan, Simone; Poulikakos, Dimos

    2013-01-01

    The controlled contactless transport of heavy drops and particles in air is of fundamental interest and has significant application potential. Acoustic forces do not rely on special material properties, but their utility in transporting heavy matter in air has been restricted by low power and poor controllability. Here we present a new concept of acoustophoresis, based on the morphing of a deformable reflector, which exploits the low reaction forces and low relaxation time of a liquid with enhanced surface tension through the use of thin overlaid membrane. An acoustically induced, mobile deformation (dimple) on the reflector surface enhances the acoustic field emitted by a line of discretized emitters and enables the countinuos motion of heavy levitated samples. With such interplay of emitters and reflecting soft-structure, a 5 mm steel sphere (0.5 grams) was contactlessly transported in air solely by acoustophoresis. PMID:24212104

  13. Modeling the Hourly Distribution of Population at a High Spatiotemporal Resolution Using Subway Smart Card Data: A Case Study in the Central Area of Beijing

    Directory of Open Access Journals (Sweden)

    Yunjia Ma

    2017-04-01

    Full Text Available The accurate estimation of the dynamic changes in population is a key component in effective urban planning and emergency management. We developed a model to estimate hourly dynamic changes in population at the community level based on subway smart card data. The hourly population of each community in six central districts of Beijing was calculated, followed by a study of the spatiotemporal patterns and diurnal dynamic changes of population and an exploration of the main sources and sinks of the observed human mobility. The maximum daytime population of the six central districts of Beijing was approximately 0.7 million larger than the night-time population. The administrative and commercial districts of Dongcheng and Xicheng had high values of population ratio of day to night of 1.35 and 1.22, respectively, whereas Shijingshan, a residential district, had the lowest value of 0.84. Areas with a high population ratio were mainly concentrated in Dongcheng, Xicheng, West Chaoyang, and Southeast Haidian. The daytime population distribution showed a hierarchical spatial pattern of planar centers and second scattered centers as opposed to multiple scattered centers during the night-time. This was because most people moved inward from the areas with a low–high to high–low population ratio of day to night from night-time to daytime, which can be explained by the process of commuting between residential areas and workplaces. Several distinctive phenomena (e.g., the distribution of new industrial parks, the so-called old residential areas, and colleges and universities in the development of China are reflected by the spatiotemporal pattern of the distribution of population. The general consistency of the population ratios of day to night, population distribution, population variation of typical communities, and population mobility pattern with previous research suggests that the subway smart card data has potential in analyzing dynamic diurnal

  14. Accurate magnetic field calculations for contactless energy transfer coils

    OpenAIRE

    Sonntag, C.L.W.; Spree, M.; Lomonova, E.A.; Duarte, J.L.; Vandenput, A.J.A.

    2007-01-01

    In this paper, a method for estimating the magnetic field intensity from hexagon spiral windings commonly found in contactless energy transfer applications is presented. The hexagonal structures are modeled in a magneto-static environment using Biot-Savart current stick vectors. The accuracy of the models are evaluated by mapping the current sticks and the hexagon spiral winding tracks to a local twodimensional plane, and comparing their two-dimensional magnetic field intensities. The accurac...

  15. Inferring Social Functions Available in the Metro Station Area from Passengers’ Staying Activities in Smart Card Data

    Directory of Open Access Journals (Sweden)

    Yang Zhou

    2017-12-01

    Full Text Available The function of a metro station area is vital for city planners to consider when establishing a context-aware Transit-Oriented Development policy around the station area. However, the functions of metro station areas are hard to infer using the static land use distribution and other traditional survey datasets. In this paper, we propose a method to infer the functions occurring around the metro station catchment areas according to the patterns of staying activities derived from smart card data. We first define the staying activities by the spatial and temporal constraints of the two consecutive alighting and boarding records from the individual travel profile. Then we cluster and label the whole staying activities by considering the features of duration, frequency, and start time. By analyzing the percentage of different types of aggregated activities happening around each metro station, we cluster and explore the functions of the metro station area. Taking Wuhan as a case study, we analyze the results of Wuhan metro systems and discuss the similarities and differences between the functions and the land use distribution around the station area. The results show that although there exist some agreements, there is also a gap between the human activities and the land uses around the station area. These findings could give us deeper insight into how people act around the stations by metro systems, which will ultimately benefit the urban planning and policy development.

  16. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  17. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  18. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    Science.gov (United States)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  19. SMART PHONE USER ASSISTANCE APPLICATION FOR ANDROID

    Directory of Open Access Journals (Sweden)

    P. PRABHAVATHY

    2015-09-01

    Full Text Available Nowadays people seem to be more dependent on smart phones rather than any other electronic devices. Smart phones act like mini laptops with the mobilecommunication facility. Moreover, people possess more than one SIM card/Smart phone for many purposes. So non-ambiguity between various roles performed by them is crucial. For an example, person can have smart phone for his personal use at the residence and another phone for his official use. Consider a scenario: person at the residence urgently needs the official contact information available on the phone at his office (remote place. This application plays major dual role by acting as Server (official Smart phone and Client (personal Smart phone. Irrespective of geographic area, the server smart phone (SSP provides various services based on the request received from the client smart phone (CSP. The CSP send various requests through the SMS communication. Various requests can be fetching information from SSP such as log for unread messages and missed calls, unread message content, contact numbers, SIM and IMEI numbers. When the SSP is on silent mode and got misplaced, the CSP can be used to change the sound profile of SSP from silent to ringing mode by sending a request through SMS. If the SSP is in audible distance, then a phone call to it will help us to find the misplaced phone. Besides, the CSP can delete secret data available in the SSP’s memory. This application is different from other applications because it provides User Interface having options to send request through SMS and web database login through internet connectivity for phone’s data backup to provide unlimited memory. Upload any information such as contacts and messages from the smart phone into web database and save phone’s memory space. This application will upload the information in encoded format over the internet, which can be decoded using the application’s login password for security purpose.

  20. Smart-card-based automatic meal record system intervention tool for analysis using data mining approach.

    Science.gov (United States)

    Zenitani, Satoko; Nishiuchi, Hiromu; Kiuchi, Takahiro

    2010-04-01

    The Smart-card-based Automatic Meal Record system for company cafeterias (AutoMealRecord system) was recently developed and used to monitor employee eating habits. The system could be a unique nutrition assessment tool for automatically monitoring the meal purchases of all employees, although it only focuses on company cafeterias and has never been validated. Before starting an interventional study, we tested the reliability of the data collected by the system using the data mining approach. The AutoMealRecord data were examined to determine if it could predict current obesity. All data used in this study (n = 899) were collected by a major electric company based in Tokyo, which has been operating the AutoMealRecord system for several years. We analyzed dietary patterns by principal component analysis using data from the system and extracted 5 major dietary patterns: healthy, traditional Japanese, Chinese, Japanese noodles, and pasta. The ability to predict current body mass index (BMI) with dietary preference was assessed with multiple linear regression analyses, and in the current study, BMI was positively correlated with male gender, preference for "Japanese noodles," mean energy intake, protein content, and frequency of body measurement at a body measurement booth in the cafeteria. There was a negative correlation with age, dietary fiber, and lunchtime cafeteria use (R(2) = 0.22). This regression model predicted "would-be obese" participants (BMI >or= 23) with 68.8% accuracy by leave-one-out cross validation. This shows that there was sufficient predictability of BMI based on data from the AutoMealRecord System. We conclude that the AutoMealRecord system is valuable for further consideration as a health care intervention tool. Copyright 2010 Elsevier Inc. All rights reserved.

  1. Consumers' Interest In Provider Ratings Grows, And Improved Report Cards And Other Steps Could Accelerate Their Use.

    Science.gov (United States)

    Findlay, Steven D

    2016-04-01

    Encouraging patients and consumers to use data and other information in choosing health care providers is an important way to enhance patient engagement and improve the quality of care. The growing use of technology, including smart phones and near-ubiquitous Internet access, provides consumers with easy access to websites that collect and report assessments and ratings of providers, primarily physicians and hospitals. In addition to new technology, recent laws and changes in society and the delivery of care are laying the foundation for greater use by consumers of provider performance report cards. Such use could be accelerated if the shortcomings of current report card efforts were addressed. Recommendations include making online report cards easier to use and more understandable, engaging, substantive, and relevant to consumers' health and medical concerns and choices. Project HOPE—The People-to-People Health Foundation, Inc.

  2. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  3. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  4. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  5. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  6. Proposal of an innovative benchmark for comparison of the performance of contactless digitizers

    International Nuclear Information System (INIS)

    Iuliano, Luca; Minetola, Paolo; Salmi, Alessandro

    2010-01-01

    Thanks to the improving performances of 3D optical scanners, in terms of accuracy and repeatability, reverse engineering applications have extended from CAD model design or reconstruction to quality control. Today, contactless digitizing devices constitute a good alternative to coordinate measuring machines (CMMs) for the inspection of certain parts. The German guideline VDI/VDE 2634 is the only reference to evaluate whether 3D optical measuring systems comply with the declared or required performance specifications. Nevertheless it is difficult to compare the performance of different scanners referring to such a guideline. An adequate novel benchmark is proposed in this paper: focusing on the inspection of production tools (moulds), the innovative test piece was designed using common geometries and free-form surfaces. The reference part is intended to be employed for the evaluation of the performance of several contactless digitizing devices in computer-aided inspection, considering dimensional and geometrical tolerances as well as other quantitative and qualitative criteria

  7. Proposal of an innovative benchmark for comparison of the performance of contactless digitizers

    Science.gov (United States)

    Iuliano, Luca; Minetola, Paolo; Salmi, Alessandro

    2010-10-01

    Thanks to the improving performances of 3D optical scanners, in terms of accuracy and repeatability, reverse engineering applications have extended from CAD model design or reconstruction to quality control. Today, contactless digitizing devices constitute a good alternative to coordinate measuring machines (CMMs) for the inspection of certain parts. The German guideline VDI/VDE 2634 is the only reference to evaluate whether 3D optical measuring systems comply with the declared or required performance specifications. Nevertheless it is difficult to compare the performance of different scanners referring to such a guideline. An adequate novel benchmark is proposed in this paper: focusing on the inspection of production tools (moulds), the innovative test piece was designed using common geometries and free-form surfaces. The reference part is intended to be employed for the evaluation of the performance of several contactless digitizing devices in computer-aided inspection, considering dimensional and geometrical tolerances as well as other quantitative and qualitative criteria.

  8. 20th anniversary of axial capacitively coupled contactless conductivity detection in capillary electrophoresis

    Czech Academy of Sciences Publication Activity Database

    Kubáň, Pavel; Hauser, P.C.

    2018-01-01

    Roč. 102, MAY (2018), s. 311-321 ISSN 0165-9936 R&D Projects: GA ČR(CZ) GA16-09135S Institutional support: RVO:68081715 Keywords : contactless conductivity detection * analytical techniques * review Subject RIV: CB - Analytical Chemistry , Separation OBOR OECD: Analytical chemistry Impact factor: 8.442, year: 2016

  9. 20th anniversary of axial capacitively coupled contactless conductivity detection in capillary electrophoresis

    Czech Academy of Sciences Publication Activity Database

    Kubáň, Pavel; Hauser, P.C.

    2018-01-01

    Roč. 102, MAY (2018), s. 311-321 ISSN 0165-9936 R&D Projects: GA ČR(CZ) GA16-09135S Institutional support: RVO:68081715 Keywords : contactless conductivity detection * analytical techniques * review Subject RIV: CB - Analytical Chemistry, Separation OBOR OECD: Analytical chemistry Impact factor: 8.442, year: 2016

  10. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  11. Design of Contactlessly Powered and Piezoelectrically Actuated Tools for Non-Resonant Vibration Assisted Milling

    Directory of Open Access Journals (Sweden)

    Martin Silge

    2018-04-01

    Full Text Available This contribution presents a novel design approach for vibration assisted machining (VAM. A lot of research has already been done regarding the influence of superimposed vibrations during a milling process, but there is almost no information about how to design a VAM tool where the tool is actually rotating. The proposed system consists of a piezoelectric actuator for vibration excitation, an inductive contactless energy transfer system and an electronic circuit for powering the actuated tool. The main benefit of transferring the required power without mechanical contact is that the maximum spindle speed is no longer restricted by friction of slip rings. A detailed model is shown that enables for preliminary estimation of the system’s response to different excitation signals. Experimental data are provided to validate the model. Finally, some parts are shown that have been manufactured using the contactlessly actuated milling tool.

  12. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  13. Analysis of arecoline in Semen Arecae decoction pieces by microchip capillary electrophoresis with contactless conductivity detection

    Directory of Open Access Journals (Sweden)

    Zi-You Cai

    2012-10-01

    Full Text Available A new method for the determination of arecoline in Semen Arecae decoction pieces by microchip capillary electrophoresis with contactless conductivity detection (MCE-CCD was proposed. The effects of various electrophoretic operating parameters on the analysis of arecoline were studied. Under the optimal conditions, arecoline was rapidly separated and detected in 1 min with good linearity over the concentration range of 20–1500 μM (r2=0.9991 and the detection limit of 5 μM (S/N=3. The method was used for the analysis of arecoline satisfactorily with a recovery of 96.8–104%. Keywords: Microchip capillary electrophoresis, Contactless conductivity detection, Arecoline, Semen Arecae

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  15. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    Science.gov (United States)

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable.

  16. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data

    Science.gov (United States)

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable. PMID:26872333

  17. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    Directory of Open Access Journals (Sweden)

    Chen Zhong

    Full Text Available To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more

  18. New possibilities of complex "Thermodyn" application for contactless remote diagnostics in medical practice

    Science.gov (United States)

    Belov, M. Ye.; Shayko-Shaykovskiy, O. G.; Makhrova, Ye. G.; Kramar, V. M.; Oleksuik, I. S.

    2018-01-01

    We represent here the theoretical justifications, block scheme and experimental sample of a new automated complex "Thermodyn" for remote contactless diagnostics of inflammatory processes of the surfaces and in subcutaneous areas of human body. Also we described here the methods and results of diagnostic measurements, and results of practical applications of this complex.

  19. Formalising the Safety of Java, the Java Virtual Machine and Java Card

    OpenAIRE

    Hartel, Pieter H.; Moreau, Luc

    2001-01-01

    We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smart cards. The conclusion is that while a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine readable formal models of the whole of Java and its implementation. This is a formidable task but we believe it is essential to building trust in Java safety, and thence to achieve ITSEC level 6 or Common C...

  20. Contactless Stimulation and Control of Biomimetic Nanotubes by Calcium Ion Gradients.

    Science.gov (United States)

    Kirejev, Vladimir; Ali Doosti, Baharan; Shaali, Mehrnaz; Jeffries, Gavin D M; Lobovkina, Tatsiana

    2018-04-17

    Membrane tubular structures are important communication pathways between cells and cellular compartments. Studying these structures in their native environment is challenging, due to the complexity of membranes and varying chemical conditions within and outside of the cells. This work demonstrates that a calcium ion gradient, applied to a synthetic lipid nanotube, triggers lipid flow directed toward the application site, resulting in the formation of a bulge aggregate. This bulge can be translated in a contactless manner by moving a calcium ion source along the lipid nanotube. Furthermore, entrapment of polystyrene nanobeads within the bulge does not tamper the bulge movement and allows transporting of the nanoparticle cargo along the lipid nanotube. In addition to the synthetic lipid nanotubes, the response of cell plasma membrane tethers to local calcium ion stimulation is investigated. The directed membrane transport in these tethers is observed, but with slower kinetics in comparison to the synthetic lipid nanotubes. The findings of this work demonstrate a novel and contactless mode of transport in lipid nanotubes, guided by local exposure to calcium ions. The observed lipid nanotube behavior can advance the current understanding of the cell membrane tubular structures, which are constantly reshaped during dynamic cellular processes. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Contactless multiple wavelength photoplethysmographic imaging: a first step toward "spO2 camera" technology

    NARCIS (Netherlands)

    Wieringa, F.P.; Mastik, F.; Steen, A.F.W. van der

    2005-01-01

    We describe a route toward contactless imaging of arterial oxygen saturation (SpO2) distribution within tissue, based upon detection of a two-dimensional matrix of spatially resolved optical plethysmographic signals at different wavelengths. As a first step toward SpO 2-imaging we built a monochrome

  2. Contactless Investigations of Yeast Cell Cultivation in the 7 GHz and 240 GHz Ranges

    International Nuclear Information System (INIS)

    Wessel, J; Schmalz, K; Meliani, C; Gastrock, G; Cahill, B P

    2013-01-01

    Using a microfluidic system based on PTFE tubes, experimental results of contactless and label-free characterization techniques of yeast cell cultivation are presented. The PTFE tube has an inner diameter of 0.5 mm resulting in a sample volume of 2 μ1 for 1 cm sample length. Two approaches (at frequencies around 7 GHz and 240 GHz) are presented and compared in terms of sensitivity and applicability. These frequency bands are particularly interesting to gain information on the permittivity of yeast cells in Glucose solution. Measurements from 240 GHz to 300 GHz were conducted with a continuous wave spectrometer from Toptica. At 7 GHz band, measurements have been performed using a rat-race based characterizing system realized on a printed circuit board. The conducted experiments demonstrate that by selecting the phase as characterization parameter, the presented contactless and label-free techniques are suitable for cell cultivation monitoring in a PTFE pipe based microfluidic system.

  3. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  4. AN ANALYSIS ON THE DECISION MODEL OF SMART PLUS INSURANCE PRODUCT PURCHASE

    Directory of Open Access Journals (Sweden)

    Fitry Primadona

    2016-09-01

    Full Text Available The purposes of this study were 1 to analyze the decision model of Smart Plus insurance product purchase and 2 to determine the criteria, sub-criteria, and alternative priorities in Smart Plus purchase decision model. The methods utilized in the study included a survey and interview (in-depth interview by using an AHP analysis (Analytical Hierarchy Process and processing software of "Expert Choice". The result of the first analysis indicated the four marketing mixes that had been performed (Price, Product, Process, and Place; while the second one showed that the purchase of Smart Plus product is based on the factors with the level of interest as follow: benefit (36.3%, premium (35.7%, membership process (14.6%, and provider (13.4%. The result of the second analysis revealed the important sub-criteria including premium offer, additional benefits, membership card, and temporary certificate from the medical specialist.Keywords: AHP, life insurance, marketing mix, purchase decision

  5. Design of a variable-phase contactless energy transfer platform using air-cored planar inductor technology

    NARCIS (Netherlands)

    Sonntag, C.L.W.

    2010-01-01

    Contactless Energy Transfer (CET) describes the process in which electrical energy is transferred among two or more galvanically isolated electrical circuits or devices by means of magnetic induction (magnetic energy). The potential applications can range from the transfer of energy between low

  6. Design and Fabrication of 3D-Structured Contactless Capacitive-Type Detector for Capillary Electrophoresis Microchip

    International Nuclear Information System (INIS)

    Lee, C-Y; Lin, C-H; Fu, L-M

    2006-01-01

    Using simple and reliable microfabrication techniques, this study develops a capillary electrophoresis (CE) microchip with 3-dimensional-structured (3D-structured) contactless capacitive detector electrodes mounted parallel to the separation channel. The offchannel electrodes are deposited by Au sputtering and patterned using a standard 'lift-off' process. A vacuum fusion bonding process is employed to seal the lower substrate containing the microchannels and electrodes to an upper glass cover plate. The variation in the capacitance between the electrodes in the side channels is measured as different samples and ions pass through the detection region of the CE separation channel. Samples of Rhodamine B and a commercial sports drink are mixed in different buffer solutions and successfully separated and detected using the developed device. The 3D-structured contactless capacitive-type detection device has microscale dimensions and provides a valuable contribution to the realization of the lab-on-a-chip concept

  7. Express method for contactless measurement of parameters of thermoelectric materials

    Directory of Open Access Journals (Sweden)

    Ashcheulov A. A.

    2015-08-01

    Full Text Available The paper presents an original method for contactless express measurement of parameters of thermoelectric materials. The presence of a combination of AC and DC magnetic fields in the gap of the oscillating circuit, where the monitored sample of the thermoelectric material is located, leads — due to Ampere force — to delamination of geometric regions of the occurrence of half-cycles of Foucault current. This in turn causes the appearance of additional heat losses in the oscillating circuit caused by Peltier effect. Computer modeling of these processes with the use of the software package ComsolFenlab 3.3 allowed determining the nature and magnitude of the electric currents in oscillating circuit, the range of operating frequencies, and the ratio of amplitudes of the variable and fixed components of the magnetic field. These components eventually cause a certain temperature difference along the controlled sample, which difference is proportional to the thermoelectric figure of merit Z of the material. The basic expressions are obtained for determining the value of the Seebeck coefficient a, thermal conductivity ?, electrical conductivity ? and thermoelectric figure of merit Z. A description is given to the design of the device for contactless express measurement of parameters of thermoelectric materials based on Bi—Te—Se—Sb solid solutions. Its distinctive feature is the ability to determine the symmetric and asymmetric components of the electric conductivity of the material values. The actual error in parameter measurement in this case is 2%.

  8. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  9. Médicarte software developed for the Quebec microprocessor health card project.

    Science.gov (United States)

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the

  10. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  11. Urban Analysis and Smart Communities: An Approach to the Use of Technology in Everyday Mobility

    Directory of Open Access Journals (Sweden)

    Zurisaddai De la Cruz Severiche Maury

    2015-01-01

    Full Text Available Concentration of population in urban centers is a global problem for which different strategies in order to organize different processes in cities and improve the quality of life are required. The creation of smart communities is shown as a sustainable solution since they deal with various key aspects, such as traffic management and mobility, through the use of information technologies (ITs. This work presents a review of recent studies using information technologies for urban analysis and mobility in cities. A descriptive analysis of automated methods for collecting and analyzing citizens’ mobility patterns is performed; it is centered in smart card use, geolocation and geotagging. It is concluded that a robust communication infrastructure, supported by an efficient computational platform allowing big data management and ubiquitous computing, is a crucial aspect for urban management in a smart community

  12. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  13. Study of the determination of inorganic arsenic species by CE with capacitively coupled contactless conductivity detection

    Czech Academy of Sciences Publication Activity Database

    Nguyen, H. T. A.; Kubáň, Pavel; Pham, V. H.; Hauser, P.C.

    2007-01-01

    Roč. 28, č. 19 (2007), s. 3500-3506 ISSN 0173-0835 Institutional research plan: CEZ:AV0Z40310501 Keywords : capillary electrophoresis * arsenic speciation * contactless conductivity detection Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 3.609, year: 2007

  14. Contactless respiratory monitoring system for magnetic resonance imaging applications using a laser range sensor

    Directory of Open Access Journals (Sweden)

    Krug Johannes W.

    2016-09-01

    Full Text Available During a magnetic resonance imaging (MRI exam, a respiratory signal can be required for different purposes, e.g. for patient monitoring, motion compensation or for research studies such as in functional MRI. In addition, respiratory information can be used as a biofeedback for the patient in order to control breath holds or shallow breathing. To reduce patient preparation time or distortions of the MR imaging system, we propose the use of a contactless approach for gathering information about the respiratory activity. An experimental setup based on a commercially available laser range sensor was used to detect respiratory induced motion of the chest or abdomen. This setup was tested using a motion phantom and different human subjects in an MRI scanner. A nasal airflow sensor served as a reference. For both, the phantom as well as the different human subjects, the motion frequency was precisely measured. These results show that a low cost, contactless, laser-based approach can be used to obtain information about the respiratory motion during an MRI exam.

  15. Integrative solutions for intelligent energy management. Smart metering, smart home, smart grid; Integrative Loesungsansaetze fuer ein intelligentes Energiemanagement. Smart Metering, Smart Home and Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Jungfleisch, Achim [Hager Vertriebsgesellschaft mbH und Co. KG, Blieskastel (Germany). Marketing

    2011-07-01

    Smart Metering, Smart Home, Smart Grid - these key words significantly determine the current debate about intelligent energy management, or new energy concepts. The author of the contribution under consideration describes the interactions between Smart Metering, Smart Home and Smart Grids and the technical connection of these interactions. Thus, the compact tebis KNX demovea server connects Windows computer and the Internet with the building automation based on KNX. The technically simple combination of smart metering and smart home via Hager radio tower of the building automation provides an access to key energy data for an intelligent load management.

  16. Integrity mechanism for eHealth tele-monitoring system in smart home environment.

    Science.gov (United States)

    Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos

    2009-01-01

    During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.

  17. NOD1CARD Might Be Using Multiple Interfaces for RIP2-Mediated CARD-CARD Interaction: Insights from Molecular Dynamics Simulation.

    Directory of Open Access Journals (Sweden)

    Jitendra Maharana

    Full Text Available The nucleotide-binding and oligomerization domain (NOD-containing protein 1 (NOD1 plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2 for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2 helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs. The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface, respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes.

  18. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  19. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  20. 3D cellular structures and co-cultures formed through the contactless magnetic manipulation of cells on adherent surfaces.

    Science.gov (United States)

    Abdel Fattah, Abdel Rahman; Mishriki, Sarah; Kammann, Tobias; Sahu, Rakesh P; Geng, Fei; Puri, Ishwar K

    2018-02-27

    A magnet array is employed to manipulate diamagnetic cells that are contained in paramagnetic medium to demonstrate for the first time the contactless bioprinting of three-dimensional (3D) cellular structures and co-cultures of breast cancer MCF-7 and endothelial HUVEC at prescribed locations on tissue culture treated well plates. Sequential seeding of different cell lines and the spatial displacement of the magnet array creates co-cultured cellular structures within a well without using physically intrusive well inserts. Both monotypic and co-culture experiments produce morphologically rich 3D cell structures that are otherwise absent in regular monolayer cell cultures. The magnetic contactless bioprinting of cells provides further insight into cell behaviour, invasion strategies and transformations that are useful for potential applications in drug screening, 3D cell culture formation and tissue engineering.

  1. Feasible approach of contactless power transfer technology combined with HTS coils based on electromagnetic resonance coupling

    International Nuclear Information System (INIS)

    Chang, Yoon Do; Yim, Seong Woo; Hwang, Si Dole

    2013-01-01

    The contactless power transfer (CPT) systems have been recently gaining popularity widely since it is an available option to realize the power delivery and storage with connector-free devices across a large air gap. Especially, the CPT with electromagnetic resonance coupling method is possible to exchange energy within 2 m efficiently. However, the power transfer efficiency of CPT in commercialized products has been limited because the impedance matching of coupled coils is sensitive. As a reasonable approach, we combined the CPT system with HTS wire technology and called as, superconducting contactless power transfer (SUCPT) system. Since the superconducting coils have an enough current density, the superconducting antenna and receiver coils at CPT system have a merit to deliver and receive a mass amount of electric energy. In this paper, we present the feasibility of the SUCPT system and examine the transmission properties of SUCPT phenomenon between room temperature and very low temperature at 77 K as long as the receiver is within 1.0 m distance.

  2. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    Science.gov (United States)

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  3. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  4. Thermorewritable card by using dyes; Senryo wo mochiita kakikae kanona card

    Energy Technology Data Exchange (ETDEWEB)

    Muto, Y.

    1998-06-01

    Described herein are thermorewritable cards which use dyes. Rewritable cards, mainly used for membership and point cards, are themselves used repeatedly and required to be rewritable repeatedly for information they carry. The dyes and developers used for the conventional heat- and pressure-sensitive papers are colorless, leuco-dye precursors and acidic compounds with a phenolic hydroxyl group or the like. They transfer electrons to each other, opening the lactone ring of the dye precursor to develop the color. Developing and erasing the color are reversible chemical reactions, where the color is developed under heat and maintained by quenching. For erasing the color, it is heated and then slowly cooled to separate the precursor and developer phases from each other. A printer (thermal head) is required for developing and erasing a color. Durability under various conditions is another requirement of the card; it must be adaptable to weather conditions and resistant to sweat. The new thermorewritable card is protected from various adverse effects on its chemical reactions, and made as durable as the conventional cards. 3 refs., 5 figs., 1 tab.

  5. Smart Grid: Smart Customer Policy Needs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    In September 2010, the International Energy Agency (IEA) held a workshop on the regulatory, market and consumer policies necessary to ensure that smart grids are deployed with adequate consideration of their risks and benefits to all stakeholders. This was one of several workshops that brought together energy providers, network operators, technology developers, regulators, customers and government policy makers to discuss smart grid technology and policy. The Smart Grid - Smart Customer Policies workshop allowed stakeholders to: gain a perspective on key issues and barriers facing early deployment of smart grids; hear expert opinion on regulatory, consumer and market challenges to smart grids; discuss smart grid-smart customer policy priorities; and build consensus on the technology and policy ingredients needed for customer-friendly smart grid deployments. Drawing on workshop discussions, the following paper lays out a logical framework to maximise the benefits and minimise the risks that smart grids pose for customers. The paper also describes key policy research questions that will guide future IEA research on this topic.

  6. Development of smart nuclear instrumentation for reactors

    International Nuclear Information System (INIS)

    Chaganty, S.P.; Das, D.; Bhatnagar, P.V.; Das, A.; Sreedharan, Preetha; Kataria, S.K.

    2001-01-01

    Variety of nuclear instruments are required for different applications in reactors such as reactor start-up, reactor protection and regulating system, area monitoring, failed fuel detection, stack monitoring etc. Attempts are made to develop a standardized microcomputer based hardware for configuring different types of instruments. PC architecture is chosen due to easy availability of components/boards and software. These instruments have dual redundant Network Interface Cards for connecting to a Primary Radiation Data LAN which in turn can be connected to Plant Information Bus through Gateways. These SMART instruments can be tested/calibrated through specific commands from remote computers connected over the LAN. This paper describes the various issues involved and the design details. (author)

  7. "Smart pebble" designs for sediment transport monitoring

    Science.gov (United States)

    Valyrakis, Manousos; Alexakis, Athanasios; Pavlovskis, Edgars

    2015-04-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions.

  8. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  9. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  10. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  11. Multi-operation cryptographic engine: VLSI design and implementation

    International Nuclear Information System (INIS)

    Selimis, George; Koufopavlou, Odysseas

    2005-01-01

    The environment of smart card lacks of system resources but the commercial and economic transactions via smart cards demand the use of certificated and secure cryptographic methods. In this paper a cryptographic approach in hardware for smart cards is proposed. The proposed system supports two basic operations of cryptography, authentication and encryption. The basic component of system is the one round of DES algorithm which supports the DES, Triple DES and the ANSI X9.17 standards. The proposed system is efficient in terms of area resources and techniques for low power consumption have applied. Due to the fact that the system is for smart card applications the overall throughput outperforms the typical smart card throughput standards

  12. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  13. An Efficient Authentication Method For Smart Card Verification In Online

    Directory of Open Access Journals (Sweden)

    Kanamarlapudi Venkata Srinivasa Rao

    2017-08-01

    Full Text Available The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and managing here we have tendency to are presenting the three level confirmations. In arranged approach there are two stages i.e. Enlistment and login. All through enlistment part control the word which can figure and separated into two segments i.e. parcel one can keep inside the client or customer viewpoint, segment a couple of can keep in server perspective. Next level is to exchange the client icon which can figure and split into two shares each are keep severally. In the end zero information code will be get refreshed and it’s furthermore get keep as two components. All through the login part before starting the managing the client and server ought to uncover their three-genuine data offers if each stacked data got coordinate then the client is legitimate and server isn’t a phishing site.

  14. "Smart pebble" design for environmental monitoring applications

    Science.gov (United States)

    Valyrakis, Manousos; Pavlovskis, Edgars

    2014-05-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, while focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions. "Smart pebble" allows for a wider range of environmental sensors (e.g. for environmental/pollutant monitoring) to be incorporated so as to extend the range of its application, enabling accurate environmental monitoring which is required to ensure infrastructure resilience and preservation of ecological health.

  15. Combined Simulation of a Micro Permanent Magnetic Linear Contactless Displacement Sensor

    Directory of Open Access Journals (Sweden)

    Jing Gao

    2010-09-01

    Full Text Available The permanent magnetic linear contactless displacement (PLCD sensor is a new type of displacement sensor operating on the magnetic inductive principle. It has many excellent properties and has already been used for many applications. In this article a Micro-PLCD sensor which can be used for microelectromechanical system (MEMS measurements is designed and simulated with the CST EM STUDIO® software, including building a virtual model, magnetostatic calculations, low frequency calculations, steady current calculations and thermal calculations. The influence of some important parameters such as air gap dimension, working frequency, coil current and eddy currents etc. is studied in depth.

  16. Determination of gamma-hydroxybutyric acid in clinical samples using capillary electrophoresis with contactless conductivity detection

    Czech Academy of Sciences Publication Activity Database

    Gong, X.Y.; Kubáň, Pavel; Scholer, A.; Hauser, P.C.

    2008-01-01

    Roč. 1213, 1-2 (2008), s. 100-104 ISSN 0021-9673 R&D Projects: GA AV ČR IAA400310609; GA AV ČR IAA400310703; GA ČR GA203/08/1536 Institutional research plan: CEZ:AV0Z40310501 Keywords : clinical samples * capillary electrophoresis * contactless conductivity detection Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 3.756, year: 2008

  17. Smart grid

    International Nuclear Information System (INIS)

    Choi, Dong Bae

    2001-11-01

    This book describes press smart grid from basics to recent trend. It is divided into ten chapters, which deals with smart grid as green revolution in energy with introduction, history, the fields, application and needed technique for smart grid, Trend of smart grid in foreign such as a model business of smart grid in foreign, policy for smart grid in U.S.A, Trend of smart grid in domestic with international standard of smart grid and strategy and rood map, smart power grid as infrastructure of smart business with EMS development, SAS, SCADA, DAS and PQMS, smart grid for smart consumer, smart renewable like Desertec project, convergence IT with network and PLC, application of an electric car, smart electro service for realtime of electrical pricing system, arrangement of smart grid.

  18. Big Data in Transport Geography

    DEFF Research Database (Denmark)

    Reinau, Kristian Hegner; Agerholm, Niels; Lahrmann, Harry Spaabæk

    for studies that explicitly compare the quality of this new type of data to traditional data sources. With the current focus on Big Data in the transport field, public transport planners are increasingly looking towards smart card data to analyze and optimize flows of passengers. However, in many cases...... it is not all public transport passengers in a city, region or country with a smart card system that uses the system, and in such cases, it is important to know what biases smart card data has in relation to giving a complete view upon passenger flows. This paper therefore analyses the quality and biases...... of smart card data in Denmark, where public transport passengers may use a smart card, may pay with cash for individual trips or may hold a season ticket for a certain route. By analyzing smart card data collected in Denmark in relation to data on sales of cash tickets, sales of season tickets, manual...

  19. Smart mobility in smart cities

    Energy Technology Data Exchange (ETDEWEB)

    Baucells, Aleta N.

    2016-07-01

    Cities are currently undergoing a transformation into the Smart concept, like Smartphones or SmartTV. Many initiatives are being developed in the framework of the Smart Cities projects, however, there is a lack of consistent indicators and methodologies to assess, finance, prioritize and implement this kind of projects. Smart Cities projects are classified according to six axes: Government, Mobility, Environment, Economy, People and Living. (Giffinger, 2007). The main objective of this research is to develop an evaluation model in relation to the mobility concept as one of the six axes of the Smart City classification and apply it to the Spanish cities. The evaluation was carried out in the 62 cities that made up in September 2015 the Spanish Network of Smart Cities (RECI- Red Española de Ciudades Inteligentes). This research is part of a larger project about Smart Cities’ evaluation (+CITIES), the project evaluates RECI’s cities in all the axes. The analysis was carried out taking into account sociodemographic indicators such as the size of the city or the municipal budget per inhabitant. The mobility’s evaluation in those cities has been focused in: sustainability mobility urban plans and measures to reduce the number of vehicles. The 62 cities from the RECI have been evaluated according to their degree of progress in several Smart Cities’ initiatives related to smart mobility. The applied methodology has been specifically made for this project. The grading scale has different ranks depending on the deployment level of smart cities’ initiatives. (Author)

  20. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  1. Contactless grasp of a magnetic particle in a fluid and its application to quantifications of forces affecting its behavior

    International Nuclear Information System (INIS)

    Tokura, S.; Hara, M.; Kawaguchi, N.; Amemiya, N.

    2014-01-01

    In this study, the contactless grasp of a magnetic particle suspended in a fluid at rest or in motion by coil current control, and a method for estimating these forces quantitatively were developed. Four electromagnets were used to apply magnetic fields to magnetic ferrite particles (diameter, 300 nm–300 µm) in a fluid in a vessel. Particle-tracking velocimetry with high-speed image processing was used to visualize the behavior of the magnetic particles in the fluid. In addition, contactless grasp of a magnetic particle using the feedback control was accomplished. Furthermore, by making the magnetic force and the resultant force of the other forces affecting a magnetic particle be in balance, the vertical and horizontal forces affecting the minute magnetic particle, such as the viscous force or the magnetic force between magnetized particles, could be estimated quantitatively from the current in the coil of each electromagnet, without any physical contact with the particle itself. These results constitute useful information for studies on the issues in the handling of micro- or nano-particles. - Highlights: • Four electromagnets are used to apply magnetic field to magnetic ferrite particles. • Motion of magnetic particles suspended in a resting or flowing fluid is visualized. • Contactless grasp of a magnetic particle using feedback control was accomplished. • Vertical and horizontal forces affecting a particle can be estimated quantitatively. • Force between magnetized particles which approach to each other was measured

  2. Smart assistants for smart homes

    OpenAIRE

    Rasch, Katharina

    2013-01-01

    The smarter homes of tomorrow promise to increase comfort, aid elderly and disabled people, and help inhabitants save energy. Unfortunately, smart homes today are far from this vision – people who already live in such a home struggle with complicated user interfaces, inflexible home configurations, and difficult installation procedures. Under these circumstances, smart homes are not ready for mass adoption. This dissertation addresses these issues by proposing two smart assistants for smart h...

  3. Analysis of ecstasy tablets using capillary electrophoresis with capacitively coupled contactless conductivity detection.

    Science.gov (United States)

    Porto, Suely K S S; Nogueira, Thiago; Blanes, Lucas; Doble, Philip; Sabino, Bruno D; do Lago, Claudimir L; Angnes, Lúcio

    2014-11-01

    A method for the identification of 3,4-methylenedioxymethamphetamine (MDMA) and meta-chlorophenylpiperazine (mCPP) was developed employing capillary electrophoresis (CE) with capacitively coupled contactless conductivity detection (C(4) D). Sample extraction, separation, and detection of "Ecstasy" tablets were performed in fenproporex, caffeine, lidocaine, and cocaine. Separation was performed in <90 sec. The advantages of using C(4) D instead of traditional CE-UV methods for in-field analysis are also discussed. © 2014 American Academy of Forensic Sciences.

  4. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  5. Diseño de una Guía para la Implementación del Proyecto de Tarjetas Inteligentes Aplicado en el Sector Financiero del Ecuador, Basada en el Estándar de Administración de Proyectos Desarrollado por el “Project Management Institute”

    OpenAIRE

    Vera Toscano, Claudia Gabriela

    2015-01-01

    This paper is intended to be guide towards the implementation of smart card technology by Ecuadorian financial institutions. Smart Card project will increase customers information security for both credit and debit card transactions. Smart cards contain an integrated circuit, which can include embedded applications that allow information stored in it to be encrypted, making more difficult to apply unauthorized cloning procedures. This reduces cloning and improves control and risk management w...

  6. Smart energy and smart energy systems

    DEFF Research Database (Denmark)

    Lund, Henrik; Østergaard, Poul Alberg; Connolly, David

    2017-01-01

    In recent years, the terms “Smart Energy” and “Smart Energy Systems” have been used to express an approach that reaches broader than the term “Smart grid”. Where Smart Grids focus primarily on the electricity sector, Smart Energy Systems take an integrated holistic focus on the inclusion of more...... sectors (electricity, heating, cooling, industry, buildings and transportation) and allows for the identification of more achievable and affordable solutions to the transformation into future renewable and sustainable energy solutions. This paper first makes a review of the scientific literature within...... the field. Thereafter it discusses the term Smart Energy Systems with regard to the issues of definition, identification of solu- tions, modelling, and integration of storage. The conclusion is that the Smart Energy System concept represents a scientific shift in paradigms away from single-sector thinking...

  7. Point card compatible automatic vending machine for canned drink; Point card taio kan jido hanbaiki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)

  8. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  9. Synergisms between smart metering and smart grid; Synergien zwischen Smart Metering und Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Maas, Peter [IDS GmbH, Ettlingen (Germany)

    2010-04-15

    With the implementation of a smart metering solution, it is not only possible to acquire consumption data for billing but also to acquire relevant data of the distribution grid for grid operation. There is still a wide gap between the actual condition and the target condition. Synergies result from the use of a common infrastructure which takes account both of the requirements of smart metering and of grid operation. An open architecture also enables the future integration of further applications of the fields of smart grid and smart home. (orig.)

  10. Smart Cities for Smart Children

    DEFF Research Database (Denmark)

    Rehm, Matthias; Jensen, Martin Lynge; Wøldike, Niels Peter

    This position paper presents the concept of smart cities for smart children before highlighting three concrete projects we are currently running in order to investigate different aspects of the underlying concept like social-relational interaction and situated and experiential learning.......This position paper presents the concept of smart cities for smart children before highlighting three concrete projects we are currently running in order to investigate different aspects of the underlying concept like social-relational interaction and situated and experiential learning....

  11. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  12. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  13. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  14. 78 FR 31523 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2013-05-24

    ... of a letter to the Speaker of the House of Representatives, Transmittals 13-07 with attached... Units, Multi-role Electro-Optic End-to-End test set, Card Memory, Smart Cards, and Support Equipment..., Card Memory, Smart Cards, and Support Equipment, Consumables, and Flight Test/Certification. Also...

  15. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  16. Event building in an intelligent network interface card for the LHCb readout network

    CERN Document Server

    Dufey, J P; Neufeld, N; Zuin, M

    2001-01-01

    LHCb is an experiment being constructed at CERN's LHC accelerator for the purpose of studying precisely the CP violation parameters in the B-B system. Triggering poses special problems since the interesting events containing B-mesons are immersed in a large background of inelastic p-p reactions. Therefore, a 4 Level Triggering scheme (Level 0 to Level 3) has been implemented. Powerful embedded processors, used in modern intelligent Network Interface Cards (smart NICs), make it attractive to use them to handle the event building protocol in the high-speed data acquisition system of the LHCb experiment. The implementation of an event building algorithm developed for a specific Gigabit Ethernet NIC is presented and performance data are discussed. 5 Refs.

  17. Authentication Using Mobile Phones

    OpenAIRE

    Fusek, Z.

    2015-01-01

    This project deals with authentication by a mobile device. The mobile device with the operating system Android 5.0 was chosen as authentication device. The user can perform authentication with emulation of contactless chip cards by using Host-based Card Emulation, which runs via Near Field Communication, where cryptographic keys are stored in a secure environment KeyStore. The project continues with implementation of authentication via Bluetooth LE and describes application for authentization...

  18. Approaches to contactless optical thermometer in the NIR spectral range based on Nd{sup 3+} doped crystalline nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Kaldvee, K.; Nefedova, A.V. [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Fedorenko, S.G. [Voevodsky Institute of Chemical Kinetics and Combustion SB RAS, Novosibirsk 630090 (Russian Federation); Vanetsev, A.S. [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation); Orlovskaya, E.O. [Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation); Puust, L.; Pärs, M.; Sildos, I. [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Ryabova, A.V. [Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation); National Research Nuclear University Moscow Engineering Physics Institute, Kashirskoe Highway, 31, Moscow 115409 (Russian Federation); Orlovskii, Yu.V., E-mail: orlovski@Lst.gpi.ru [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation)

    2017-03-15

    The fluorescence kinetics and spectral intensity ratio (FIR) methods for contactless optical temperature measurement in the NIR spectral range with Nd{sup 3+} doped YAG micro- and YPO{sub 4} nanocrystals are considered and the problems are revealed. The requirements for good temperature RE doped crystalline nanoparticles sensor are formulated.

  19. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  20. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  1. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    Science.gov (United States)

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  2. 10 kW Contactless Power Transfer System for Rapid Charger of Electric Vehicle

    OpenAIRE

    Yamanaka, Tomohiro; Kaneko, Yasuyoshi; Abe, Shigeru; Yasuda, Tomio

    2012-01-01

    A contactless power transfer system for charging electric vehicles requires a high efficiency, a large air gap, and a good tolerance to lateral misalignment and needs to be compact and lightweight. A double-sided winding 10 kW transformer based on a 1.5 kW H-shaped core transformer was developed for a rapid charger. Even though the transformer capacity was increased, the dimensions of the 10 kW transformer were almost the same as those of the 1.5 kW transformer. In this paper, the design conc...

  3. Contactless ignition device for an internal combustion engine. Kontaktfreie Zuendanlage fuer eine Brennkraftmaschine

    Energy Technology Data Exchange (ETDEWEB)

    Ohki, Y; Komiya, H

    1980-01-16

    The invention deals with the design of a contactless ignition device with semiconductor elements of the induction discharge type, provided with a self actuator. A short circuit current of the primary transformer coil flows through the transistor system. The emitter is capacitively connected with the primary transformer coil. When the primary short circuit current reaches its maximum, the circuit is interrupted and the ignition begins. Changes of the short circuit current are monitored. The ignition time can be pre-selected. The ignition process is independent from the engine speed.

  4. Contactless sub-millimeter displacement measurements

    Science.gov (United States)

    Sliepen, Guus; Jägers, Aswin P. L.; Bettonvil, Felix C. M.; Hammerschlag, Robert H.

    2008-07-01

    Weather effects on foldable domes, as used at the DOT and GREGOR, are investigated, in particular the correlation between the wind field and the stresses caused to both metal framework and tent clothing. Camera systems measure contactless the displacement of several dome points. The stresses follow from the measured deformation pattern. The cameras placed near the dome floor do not disturb telescope operations. In the set-ups of DOT and GREGOR, these cameras are up to 8 meters away from the measured points and must be able to detect displacements of less than 0.1 mm. The cameras have a FireWire (IEEE1394) interface to eliminate the need for frame grabbers. Each camera captures 15 images of 640 × 480 pixels per second. All data is processed on-site in real-time. In order to get the best estimate for the displacement within the constraints of available processing power, all image processing is done in Fourier-space, with all convolution operations being pre-computed once. A sub-pixel estimate of the peak of the correlation function is made. This enables to process the images of four cameras using only one commodity PC with a dual-core processor, and achieve an effective sensitivity of up to 0.01 mm. The deformation measurements are well correlated to the simultaneous wind measurements. The results are of high interest to upscaling the dome design (ELTs and solar telescopes).

  5. Hydrodynamics during melting of an electroconductive sample in microgravity conditions under contactless positioning by electromagnetic forces

    Science.gov (United States)

    Korovin, V. M.

    MHD-flow during melting of a spherical metal sample under contactless positioning by alternating magnetic field produced by two circular turns with currents, is investigated. It is shown that when the currents supplying the turns are opposite in direction, electromagnetic forces, originating from the interaction of the Foucault currents with alternating magnetic field, induce two torus-like eddies in the interior of the molten metal drop.

  6. 78 FR 68981 - Electronic Retirement Processing

    Science.gov (United States)

    2013-11-18

    .... Digitized signature means a graphical image of a handwritten signature usually created using a special... document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or ``chip'' that can generate, store, or process data. A smart card can be used to...

  7. 78 FR 30896 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2013-05-23

    ... following is a copy of a letter to the Speaker of the House of Representatives, Transmittals 13-08 with... Electro-Optic End-to-End test set, Card Memory, Smart Cards, and Support Equipment, Consumables, and...-Optic End- to-End test set, Card Memory, Smart Cards, and Support Equipment, Consumables, and Flight...

  8. Online Behavior and Loyalty Program Participation-parameters Influencing the Acceptance of Contactless Payment Devices

    OpenAIRE

    Martin Fiedler; Ali Öztüren

    2014-01-01

    This study explores the central perceptions of consumers influencing the decision to use contactless payment instruments. Aim is to define a customer core group narrowed down by several variables and to find a basis for a purposeful communication of advantages of the new payment process, as investment into this technology bears the risk of total loss if the customer group is declining acceptance and the image of a company might be excessively damaged. External variables in context with the us...

  9. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  10. A simple contactless impedance probe for determination of ethanol in gasoline

    International Nuclear Information System (INIS)

    Opekar, F.; Cabala, R.; Kadlecova, T.

    2011-01-01

    A contactless impedance probe with either a planar or a tubular detection cell has been developed and tested for rapid determination of the ethanol content in gasoline. The probe cell is connected as a capacitor determining the frequency of an electronic astable multivibrator. The multivibrator frequency depends on the permittivity of the test gasoline in the detection cell which is strongly influenced by the ethanol content as one of the major polar additives. The ethanol concentrations obtained with the impedance probe agree, within the reliability interval, with those obtained by GC-MS measurements and fall into the limits recommended by the appropriate European Standard. The gasoline samples are analyzed without any pretreatment.

  11. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  12. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  13. Multifunction system service students and staff of higher education institutions by the example of ENGECON based on solutions IT -Card

    Directory of Open Access Journals (Sweden)

    Kulakova Ekaterina Yurevna

    2011-03-01

    Full Text Available This work is devoted to the creation of multifunctional system service students and staff of universities based on smart card using the concept of electronic "purse." Experience of other countries with a similar solution shows that the system allows the university to significantly reduce maintenance costs of its activities and at the same time improve the quality of services provided. Also in this paper present my vision of the problem and its solution in our university - ENGECON.

  14. 5 CFR 850.103 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... graphical image of a handwritten signature, usually created using a special computer input device, such as a... recipients of the electronic document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or “chip” that can generate, store, or process data. A smart card...

  15. 78 FR 14233 - Electronic Retirement Processing

    Science.gov (United States)

    2013-03-05

    ... as the private key, is used to verify the signature. Digitized signature means a graphical image of a... recipients of the electronic document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or ``chip'' that can generate, store, or process data. A smart card...

  16. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  17. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  18. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  19. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.

  20. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    OpenAIRE

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  1. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  2. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  3. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    Science.gov (United States)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  4. Contactless graphene conductance measurements: the effect of device fabrication on terahertz time-domain spectroscopy

    DEFF Research Database (Denmark)

    Mackenzie, David; Buron, Jonas Christian Due; Bøggild, Peter

    2016-01-01

    We perform contactless full-wafer maps of the electrical conductance of a 4-inch wafer of single-layer CVD graphene using terahertz time-domain spectroscopy both before and after deposition of metal contacts and fabrication of devices via laser ablation. We find that there is no significant change...... in the measured conductance of graphene before and after device fabrication. We also show that precise terahertz time-domain spectroscopy can be performed when the beam spot is at sufficient distance (>1.2 mm) from metal contacts....

  5. Clearing and settlement of interbank card transactions: a MasterCard tutorial for Federal Reserve payments analysts

    OpenAIRE

    Susan Herbst-Murphy

    2013-01-01

    The Payment Cards Center organized a meeting at which senior officials from MasterCard shared information with Federal Reserve System payments analysts about the clearing and settlement functions that MasterCard performs for its client banks. These functions involve the transfer of information pertaining to card-based transactions (clearing) and the exchange of monetary value (settlement) that takes place between the banks whose customers are cardholders and those banks whose customers are ca...

  6. A contactless positioning system for monitoring discontinuities in three dimensions with geological and geotechnical applications

    Czech Academy of Sciences Publication Activity Database

    Rinaldi-Montes, N.; Rowberry, Matthew David; Frontera, C.; Baroň, I.; Garcés, G.; Blahůt, Jan; Pérez-López, R.; Pennos, C.; Martí, Xavier

    2017-01-01

    Roč. 88, č. 7 (2017), č. článku 074501. ISSN 0034-6748 R&D Projects: GA MŠk LM2010008 Institutional support: RVO:67985891 ; RVO:68378271 Keywords : mechanical discontinuities * contactless positioning system * magnetoresistive sensing * geotechnical engineering * structural health monitoring Subject RIV: JB - Sensors, Measurment, Regulation; BM - Solid Matter Physics ; Magnetism (FZU-D) OBOR OECD: Environmental and geological engineering , geotechnics; Condensed matter physics (including formerly solid state physics, supercond.) (FZU-D) Impact factor: 1.515, year: 2016

  7. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  8. Smart learning services based on smart cloud computing.

    Science.gov (United States)

    Kim, Svetlana; Song, Su-Mi; Yoon, Yong-Ik

    2011-01-01

    Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user's behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S)--smart pull, smart prospect, smart content, and smart push--concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users' needs by collecting and analyzing users' behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users' behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users.

  9. Smart Learning Services Based on Smart Cloud Computing

    Directory of Open Access Journals (Sweden)

    Yong-Ik Yoon

    2011-08-01

    Full Text Available Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user’s behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S—smart pull, smart prospect, smart content, and smart push—concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users’ needs by collecting and analyzing users’ behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users’ behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users.

  10. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  11. Smarter energy from smart metering to the smart grid

    CERN Document Server

    Sun, Hongjian; Poor, H Vincent; Carpanini, Laurence; Fornié, Miguel Angel Sánchez

    2016-01-01

    This book presents cutting-edge perspectives and research results in smart energy spanning multiple disciplines across four main topics: smart metering, smart grid modeling, control and optimisation, and smart grid communications and networking.

  12. The European Commission's Decision in MasterCard : Issues Facing the Payment Card Industry for the Future

    OpenAIRE

    John Wotton

    2008-01-01

    The Decision in MasterCard displays a fundamental divergence between the Commission’s and MasterCard’s approaches to the analysis of the competitive effects of open payment card schemes.

  13. 75 FR 52515 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-26

    ... August 16, 2010, to the House Committee on Oversight and Government Reform, the Senate Committee on... equipped with ``Smart Card'' technology that requires the insertion of an embedded identification card and... system-generated, forced password-change protocols and also equipped with ``Smart Card'' technology that...

  14. Challenging 'smart' in smart city strategies

    DEFF Research Database (Denmark)

    Sandvik, Kjetil; Knudsen, Jacob

    and development. Focusing on processes of citizen participation and co-creation as the main driving force, we introduce a concept of 'smart city at eye level'. The introduction of new media technology and new media uses need to emerge from a profound understanding of the wants, needs and abilities of the citizens......Smart city strategies concern the improvement of economic and political efficiency and the enabling of social, cultural and urban development (Hollands 2008) and covers a variety of fields from improving infrastructures, social and cultural development, resilience strategies (e.g. green energy......), improving schools, social welfare institutions, public and private institutions etc. The 'smart' in smart city strategies implies that these efforts are accomplished by the introduction and embedding of smart media technology into the very fabric of society. This is often done in a top-down and technology...

  15. PROTOTIPE KANTIN TANPA UANG BERBASIS KARTU PINTAR

    Directory of Open Access Journals (Sweden)

    Paulus Insap Santosa

    2010-01-01

    Full Text Available This paper presents a desktop application prototype that uses smart cards for payment mode without cash transaction at a canteen. Smart cards, used for authentication, are also designed to have information of cash balance and some personal data of card holders. Application developed is still a prototype that has not connected into the banking system to refill the balance into the smart card. This prototype is a desktop application. Features that have been successfully developed and run well in these applications include food settings, user settings, and reports sales per period.

  16. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  17. Realisering af Smart City/Smart House i Nordjylland

    DEFF Research Database (Denmark)

    Lindgren, Peter; Saghaug, Kristin Margrethe

    2008-01-01

    beskriver tankerne, visionerne og perspektiverne i forhold til at realisere Smart House-konceptet i Region Nordjylland. Smart House-tankerne er baseret på at bygge smarte huse og smarte byggekomponenter til fremtidens brugere, hvor den nyeste teknologi indenfor byggematerialer kombineres med nye værdier....... Formålet med Smart House Nordjylland er at flytte byggeindustriens og forskernes fokus fra en indbyrdes konkurrence lokalt til et udviklende innovationssamarbejde, som sigter mod det globale marked. På denne måde kan regionen skabe et udstillingsvindue indenfor fremtidens byggeri gennem en interaktion...

  18. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  19. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  20. Contactless flowrate sensors for Na, PbBi and Pb flows

    International Nuclear Information System (INIS)

    Buchenau, D.; Gerbeth, G.; Priede, J.

    2011-01-01

    Accurate and reliable flow rate measurements are required for various liquid metal systems such as the Na or Lead-flows in fast reactors, the PbBi-flows in transmutation systems, or the flows in liquid metal targets. For liquid metal flows, a contactless measurement is preferable. In this paper we report on the recent development of two types of such flow meters. The former operates by detecting the flow-induced disturbance in the phase distribution of an externally applied AC magnetic field. Such a phase-shift flow meter was developed with an emitting coil at one side of the duct and two sensing coils at the opposite side. The second approach uses a rotatable single cylindrical permanent magnet, which is placed close to the liquid metal duct. The rotation rate of this magnet is proportional to the flow rate. (author)

  1. A Smart Home Center Platform Solution Based on Smart Mirror

    Directory of Open Access Journals (Sweden)

    Deng Xibo

    2017-01-01

    Full Text Available With the popularization of the concept of smart home, people have raised requirements on the experience of smart living. A smart home platform center solution is put forward in order to solve the intelligent interoperability and information integration of smart home, which enable people to have a more intelligent and convenient life experience. This platform center is achieved through the Smart Mirror. The Smart Mirror refers to a smart furniture, on the basis of the traditional concept of mirror, combining Raspberry Pi, the application of one-way mirror imaging principle, the touch-enabled design, voice and video interaction. Smart Mirror can provide a series of intelligent experience for the residents, such as controlling all the intelligent furniture through Smart Mirror; accessing and displaying the weather, time, news and other life information; monitoring the home environment; remote interconnection operation.

  2. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  3. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  4. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  5. Smart City and Smart Tourism: A Case of Dubai

    Directory of Open Access Journals (Sweden)

    M. Sajid Khan

    2017-12-01

    Full Text Available Over the past decade, the advent of new technology has brought about the emergence of smart cities aiming to provide their stakeholders with technology-based solutions that are effective and efficient. Insofar as the objective of smart cities is to improve outcomes that are connected to people, systems and processes of businesses, government and other public- and private-sector entities, its main goal is to improve the quality of life of all residents. Accordingly, smart tourism has emerged over the past few years as a subset of the smart city concept, aiming to provide tourists with solutions that address specific travel related needs. Dubai is an emerging tourism destination that has implemented smart city and smart tourism platforms to engage various stakeholders. The objective of this study is to identify best practices related to Dubai’s smart city and smart tourism. In so doing, Dubai’s mission and vision along with key dimensions and pillars are identified in relation to the advancements in the literature while highlighting key resources and challenges. A Smart Tourism Dynamic Responsive System (STDRS framework is proposed while suggesting how Dubai may able to enhance users’ involvement and their overall experience.

  6. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  7. Smart Sensors Enable Smart Air Conditioning Control

    Directory of Open Access Journals (Sweden)

    Chin-Chi Cheng

    2014-06-01

    Full Text Available In this study, mobile phones, wearable devices, temperature and human motion detectors are integrated as smart sensors for enabling smart air conditioning control. Smart sensors obtain feedback, especially occupants’ information, from mobile phones and wearable devices placed on human body. The information can be used to adjust air conditioners in advance according to humans’ intentions, in so-called intention causing control. Experimental results show that the indoor temperature can be controlled accurately with errors of less than ±0.1 °C. Rapid cool down can be achieved within 2 min to the optimized indoor capacity after occupants enter a room. It’s also noted that within two-hour operation the total compressor output of the smart air conditioner is 48.4% less than that of the one using On-Off control. The smart air conditioner with wearable devices could detect the human temperature and activity during sleep to determine the sleeping state and adjusting the sleeping function flexibly. The sleeping function optimized by the smart air conditioner with wearable devices could reduce the energy consumption up to 46.9% and keep the human health. The presented smart air conditioner could provide a comfortable environment and achieve the goals of energy conservation and environmental protection.

  8. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  9. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  10. Smart business for smart users? : A social science agenda for developing smart grids

    NARCIS (Netherlands)

    Verbong, G.P.J.; Verkade, N.; Verhees, B.; Huijben, J.C.C.M.; Höffken, J.I.; Beaulieu, A.; de Wilde, J.; Scherpen, J.M.A.

    2016-01-01

    The promise of smart grids is very attractive. However, it is not yet clear what the future smart grid will look like. Although most researchers acknowledge that users will play a more prominent role in smart grids, there is a lot of uncertainty on this issue. To counter the strong techno-logical

  11. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  12. Contactless Spectral-dependent Charge Carrier Lifetime Measurements in Silicon Photovoltaic Materials

    Science.gov (United States)

    Roller, John; Hamadani, Behrang; Dagenais, Mario

    Charge carrier lifetime measurements in bulk or unfinished photovoltaic (PV) materials allow for a more accurate estimate of power conversion efficiency in completed solar cells. In this work, carrier lifetimes in PV-grade silicon wafers are obtained by way of quasi-steady state photoconductance measurements. These measurements use a contactless RF system coupled with varying narrow spectrum input LEDs, ranging in wavelength from 460 nm to 1030 nm. Spectral dependent lifetime measurements allow for determination of bulk and surface properties of the material, including the intrinsic bulk lifetime and the surface recombination velocity. The effective lifetimes are fit to an analytical physics-based model to determine the desired parameters. Passivated and non-passivated samples are both studied and are shown to have good agreement with the theoretical model.

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  14. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  15. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  16. Smart Meter Rollout: Intelligente Messsysteme als Schnittstelle zum Kunden im Smart Grid und Smart Market

    Science.gov (United States)

    Vortanz, Karsten; Zayer, Peter

    Das Gesetz zur Digitalisierung der Energiewende ist verabschiedet. Ab 2017 sind moderne Messeinrichtungen (mME) und intelligente Messsysteme (iMSys) zu verbauen und zu betreiben. Der "deutsche Weg" für die Einführung von Smart Metern sieht einen stufenweisen Rollout sowie ein Höchstmaß an Informations- und Datensicherheit vor. Dabei spielen iMSys und mME eine wichtige Rolle bei der Neugestaltung der intelligenten Netze (Smart Grids) und des neuen Marktmodells (Smart Market). Dieser Beitrag beschäftigt sich mit den neuen Gesetzen, den Marktrollen und ihren Aufgaben, Datenschutz und Datensicherheit, dem iMSys als sichere Lösung, dem sicheren Betrieb von Smart Meter Gateways, Smart Grid - Smart Market, dem Zusammenspiel zwischen reguliertem Bereich und Markt, den Einsatzbereichen der iMSys sowie den Auswirkungen auf Prozesse und Systeme und gibt Handlungsempfehlungen.

  17. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  18. An investigation into a contactless photoplethysmographic mobile application to record heart rate post-exercise: Implications for field testing

    Directory of Open Access Journals (Sweden)

    Peart Daniel J.

    2015-08-01

    Full Text Available Study aim: the aim of this study was to compare the accuracy of a contactless photoplethysmographic mobile application (CPA to record post-exercise heart rate and estimate maximal aerobic capacity after the Queen’s College Step Test. It was hypothesised that the CPA may present a cost effective heart rate measurement tool for educators and practitioners with limited access to specialised laboratory equipment.

  19. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  20. From Smart Rooms to Smart Hotels

    OpenAIRE

    Petrevska, Biljana; Cingoski, Vlatko; Gelev, Saso

    2016-01-01

    This paper gives an overview of a potential path that new hotels have to satisfy to improve their status from a hotel with smart rooms towards a full-scale smart hotel facility. It presents a possible transitional way including innovative applications based on modern information technology for ambient settings in the domain of hotel industry that aims to improve the quality of offered services towards clients, starting from the present level of smart rooms. The main objective i...

  1. From climate-smart agriculture to climate-smart landscapes

    Directory of Open Access Journals (Sweden)

    Scherr Sara J

    2012-08-01

    Full Text Available Abstract Background For agricultural systems to achieve climate-smart objectives, including improved food security and rural livelihoods as well as climate change adaptation and mitigation, they often need to be take a landscape approach; they must become ‘climate-smart landscapes’. Climate-smart landscapes operate on the principles of integrated landscape management, while explicitly incorporating adaptation and mitigation into their management objectives. Results An assessment of climate change dynamics related to agriculture suggests that three key features characterize a climate-smart landscape: climate-smart practices at the field and farm scale; diversity of land use across the landscape to provide resilience; and management of land use interactions at landscape scale to achieve social, economic and ecological impacts. To implement climate-smart agricultural landscapes with these features (that is, to successfully promote and sustain them over time, in the context of dynamic economic, social, ecological and climate conditions requires several institutional mechanisms: multi-stakeholder planning, supportive landscape governance and resource tenure, spatially-targeted investment in the landscape that supports climate-smart objectives, and tracking change to determine if social and climate goals are being met at different scales. Examples of climate-smart landscape initiatives in Madagascar’s Highlands, the African Sahel and Australian Wet Tropics illustrate the application of these elements in contrasting contexts. Conclusions To achieve climate-smart landscape initiatives widely and at scale will require strengthened technical capacities, institutions and political support for multi-stakeholder planning, governance, spatial targeting of investments and multi-objective impact monitoring.

  2. The smart energy world from a competition point of view. An interaction between smart customers, smart market and smart grids; Die Smarte Energiewelt aus wettbewerblicher Sicht. Ein Zusammenspiel aus Smarten Kunden, Smart Market und Smarten Netzen

    Energy Technology Data Exchange (ETDEWEB)

    Wiechmann, Holger [EnBW Vertrieb GmbH, Stuttgart (Germany)

    2012-07-01

    Everybody is talking about the ''Energiewende, the Smart Energy World and about ''Smart Market / Smart Grids'', but almost no one knows, what it exactly means. But the ''Energiewende'' is already coming. The entire energy sector and particularly the elctricity industry are evolving towards decentralized structures mainly based on renewable energies. Not only the growth in fluctuating power generation from renewable energy sources like wind and photovoltaic but also their consumption on a local basis are calling for new ways of decentralized managing energy and for further developed market rules. The interaction of all stakeholders (customer, market players, grid operators, authorities) in a Smart Market/Smart Grid environment is required to successfully implement an efficient ''Energiewende''. Derived from the different interests of these stakeholders, the paper describes a system and roles within this system. It shows how Smart Market and Smart Grid can interact corresponding to the guidelines of German Regulator recently published. (orig.)

  3. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  4. Smart market. From smart grid to the intelligent energy market; Smart Market. Vom Smart Grid zum intelligenten Energiemarkt

    Energy Technology Data Exchange (ETDEWEB)

    Aichele, Christian [Hochschule Kaiserslautern, Zweibruecken (Germany). Fachbereich Betriebswirtschaft; Doleski, Oliver D. (ed.)

    2014-07-01

    Dare more market. - The design of this postulate provides an important contribution to the success of the German energy transition. The Bundesnetzagentur has shown with its highly regarded benchmark paper on smart grids and markets leads the way towards more market in the energy sector. The therein required differentiation in a network and market sphere contributes to greater transparency on the consumer side and enables a gid releaving shift in energy consumption. The book focuses on actors and roles in the modified market circumstances as well as components and products of a future Smart Markets. Finally, to the reader concrete business models are offered. Authors from science and practice give in this book answers on how the interaction of Smart Grid and Smart Market works. [German] Mehr Markt wagen. - Die Ausgestaltung dieses Postulats liefert einen wichtigen Beitrag zum Gelingen der deutschen Energiewende. Die Bundesnetzagentur hat mit ihrem vielbeachteten Eckpunktepapier zu intelligenten Netzen und Maerkten diesen Weg in Richtung mehr Markt in der Energiewirtschaft gewiesen. Die darin geforderte Differenzierung in eine Netz- und Marktsphaere traegt zu mehr Transparenz auf der Verbraucherseite bei und ermoeglicht eine netzentlastende Verlagerung des Energieverbrauchs. Das Buch beleuchtet Akteure und Rollen im geaenderten Marktumfeld ebenso wie Komponenten und Produkte eines zukuenftigen Smart Markets. Schliesslich werden dem Leser konkrete Geschaeftsmodelle angeboten. Autoren aus Wissenschaft und Praxis geben in diesem Buch Antworten darauf, wie das Zusammenspiel von Smart Grid und Smart Market funktioniert.

  5. Smart Metering. Technological, economic and legal aspects. 2. ed.; Smart Metering. Technologische, wirtschaftliche und juristische Aspekte des Smart Metering

    Energy Technology Data Exchange (ETDEWEB)

    Koehler-Schute, Christiana (ed.)

    2010-07-01

    Smart metering comprises more than just meter technology, and the use of information and communication technologies is indispensable. Processes, roles and business models must be reconsidered as further challenges arise in the context of smart metering. For one, there is the operator of the metering points. Secondly, there is the end user who is in the role of an active market partner. Further, there is smart metering as a basic technology, e.g. for smart grids and smart homes. In spite of the need for action, many utilities are reluctant to introduce smart metering. Reasons for this are the cost, a lack of defined standards, and an unclear legal situation. On the other hand, smart metering offers potential for grids and distribution that should be made use of. The authors discuss all aspects of the subject. The point out the chances and limitations of smart metering and present their own experience. [German] Smart Metering geht weit ueber die Zaehlertechnologie hinaus und der Einsatz von Informations- und Kommunikationstechnologien ist unabdingbar. Damit einhergehend muessen Prozesse, Rollen und auch Geschaeftsmodelle neu durchdacht werden. Denn weitere Herausforderungen stehen im direkten Zusammenhang mit Smart Metering. Das ist zum einen die Rolle des Messstellenbetreibers / Messdienstleisters. Das ist zum anderen der Endnutzer, dem die Rolle des aktiven Marktpartners zugedacht wird. Das ist des Weiteren das Smart Metering als Basistechnologie beispielsweise fuer Smart Grid und Smart Home. Trotz des Handlungsdrucks stehen viele Unternehmen der Energiewirtschaft dem Smart Metering zurueckhaltend gegenueber. Drei gewichtige Gruende werden ins Feld gefuehrt: die Kostenfrage, nicht definierte Standards und die in vielen Bereichen ungeklaerte Gesetzeslage. Demgegenueber bietet das Smart Metering Potenziale fuer Netz und Vertrieb, die es zu nutzen gilt. Die Autoren setzen sich in ihren Beitraegen mit diesen Themen auseinander, zeigen Chancen, aber auch Grenzen des

  6. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  7. Privacy-Preserving Smart Metering with Authentication in a Smart Grid

    Directory of Open Access Journals (Sweden)

    Jun Beom Hur

    2015-12-01

    Full Text Available The traditional security objectives of smart grids have been availability, integrity, and confidentiality. However, as the grids incorporate smart metering and load management, user and corporate privacy is increasingly becoming an issue in smart grid networks. Although transmitting current power consumption levels to the supplier or utility from each smart meter at short intervals has an advantage for the electricity supplier’s planning and management purposes, it threatens user privacy by disclosing fine-grained consumption data and usage behavior to utility providers. In this study, we propose a distributed incremental data aggregation scheme where all smart meters on an aggregation path are involved in routing the data from the source meter to the collection unit. User privacy is preserved by symmetric homomorphic encryption, which allows smart meters to participate in the aggregation without seeing any intermediate or final result. Aggregated data is further integrated with an aggregate signature to achieve data integrity and smart meter authentication in such a way that dishonest or fake smart meters cannot falsify data en route. Only the collection unit can obtain the aggregated data and verify its integrity while the individual plain data are not exposed to the collection unit. Therefore, user privacy and security are improved for the smart metering in a smart grid network.

  8. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  9. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  10. Card products market in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Ivana Šučur

    2007-12-01

    Full Text Available Card business in the Republic of Croatia started to develop more than 30 years ago in the form of non-bank card products, issued by American Express and Diners Club global payment systems. These card products were defined as standard charge cards and had been the only card products present in the market until bank cards appeared about ten years ago. The situation changed completely when banks started to enter the market as active participants in the card business. In co-operation with bank global payment systems, MasterCard Worldwide and Visa International, banks have issued several millions of various cards in just a few years, while non-bank issuers have followed the same trend with new card products. This paper explores the current situation in the domestic market; it determines who the cardholders of particular products are, which products they are familiar with, whether they use them or not and for what reason. Cardholders’ opinions, attitudes and preferences towards existing products have been explored, as well as the benefits they would like to get. The results obtained imply that cardholders are familiar with all bank and non-bank card brands, but that they use mostly those which provide them with specific benefits. Therefore, instead of focusing on providing more similar products, issuers should concentrate on designing differentiated products that have been tailored to cardholders’ real needs.

  11. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    KAUST Repository

    Farhat, Mohamed

    2015-09-25

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the \\'Internet of Nano-Things\\'.

  12. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    KAUST Repository

    Farhat, Mohamed; Cheng, Mark M C; Le, Khai Q; Chen, Pai-Yen

    2015-01-01

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the 'Internet of Nano-Things'.

  13. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    International Nuclear Information System (INIS)

    Farhat, Mohamed; Cheng, Mark M C; Chen, Pai-Yen; Le, Khai Q

    2015-01-01

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the ‘Internet of Nano-Things’. (paper)

  14. Smart metering gateway works as Smart Home Energy Manager; Smart Metering Gateway als Smart Home Energy Manager

    Energy Technology Data Exchange (ETDEWEB)

    Walter, Klaus-Dieter [SSV Software Systems GmbH, Hannover (Germany)

    2011-07-01

    The installation of smart meters together with real time consumption data visualization doesn't help to save energy CO2 emissions. With regards to refinancing options, the situation in Germany has been quite different since the middle of last year for buildings equipped with a photovoltaic system. If a heat pump system is also present, intelligent energy use in conjunction with smart meters can save considerable amounts of money. A Smart Home Energy Manager (SHEM) automates the energy saving. (orig.)

  15. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  16. An integral effect test facility of the SMART, SMART ITL

    Energy Technology Data Exchange (ETDEWEB)

    Park, Hyun Sik; Moon, Sang Ki; Kim, Yeon Sik; Cho, Seok; Choi, Ki Yong; Bae, Hwang; Kim, Dong Eok; Choi, Nam Hyun; Min, Kyoung Ho; Ko, Yung Joo; Shin, Yong Cheol; Park, Rae Joon; Lee, Won Jae; Song, Chul Hwa; Yi, Sung Jae [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    SMART (System integrated Modular Advanced ReacTor) is a 330 MWth integral pressurized water reactor (iPWR) developed by KAERI and had obtained standard design approval (SDA) from Korean regulatory authority on July 2012. In this SMART design main components including a pressurizer, reactor coolant pumps and steam generators are installed in a reactor pressure vessel without any large connecting pipes. As the LBLOCA scenario is inherently excluded, its safety systems could be simplified only to ensure the safety during the SBLOCA scenarios and the other system transients. An integral effect test loop for the SMART (SMART ITL), or called as FESTA, had been designed to simulate the integral thermal hydraulic behavior of the SMART. The objectives of the SMART ITL are to investigate and understand the integral performance of reactor systems and components and the thermal hydraulic phenomena occurred in the system during normal, abnormal and emergency conditions, and to verify the system safety during various design basis events of the SMART. The integral effect test data will also be used to validate the related thermal hydraulic models of the safety analysis code such as TASS/SMR S, which is used for performance and accident analysis of the SMART design. This paper introduces the scaling analysis and scientific design of the integral test facility of the SMART, SMART ITL and its scaling analysis results.

  17. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  18. Machine-assisted verification of latent fingerprints: first results for nondestructive contact-less optical acquisition techniques with a CWL sensor

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Krapyvskyy, Dmytro; Dittmann, Jana; Vielhauer, Claus; Leich, Marcus

    2011-11-01

    A machine-assisted analysis of traces from crime scenes might be possible with the advent of new high-resolution non-destructive contact-less acquisition techniques for latent fingerprints. This requires reliable techniques for the automatic extraction of fingerprint features from latent and exemplar fingerprints for matching purposes using pattern recognition approaches. Therefore, we evaluate the NIST Biometric Image Software for the feature extraction and verification of contact-lessly acquired latent fingerprints to determine potential error rates. Our exemplary test setup includes 30 latent fingerprints from 5 people in two test sets that are acquired from different surfaces using a chromatic white light sensor. The first test set includes 20 fingerprints on two different surfaces. It is used to determine the feature extraction performance. The second test set includes one latent fingerprint on 10 different surfaces and an exemplar fingerprint to determine the verification performance. This utilized sensing technique does not require a physical or chemical visibility enhancement of the fingerprint residue, thus the original trace remains unaltered for further investigations. No particular feature extraction and verification techniques have been applied to such data, yet. Hence, we see the need for appropriate algorithms that are suitable to support forensic investigations.

  19. 2nd international KES conference on Smart Education and Smart e-Learning

    CERN Document Server

    Howlett, Robert; Jain, Lakhmi

    2015-01-01

    This book contains the contributions presented at the 2nd international KES conference on Smart Education and Smart e-Learning, which took place in Sorrento, Italy, June 17-19, 2015. It contains a total of 45 peer-reviewed book chapters that are grouped into several parts: Part 1 - Smart Education, Part 2 – Smart Educational Technology, Part 3 – Smart e-Learning, Part 4 – Smart Professional Training and Teachers’ Education, and Part 5 – Smart Teaching and Training related Topics.  This book can be a useful source of research data and valuable information for faculty, scholars, Ph.D. students, administrators, and practitioners  - those who are interested in innovative areas of smart education and smart e-learning.  .

  20. Smart Energy 2012. How smart is the way towards the turnaround in the energy policy; Smart Energy 2012. Wie smart ist der Weg zur Energiewende?

    Energy Technology Data Exchange (ETDEWEB)

    Grossmann, Uwe; Kunold, Ingo (eds.)

    2012-07-01

    The contribution under consideration contains fifteen contributions of well-known authors from commercial enterprises, public institutions and universities on smart energy: (1) Smart grids, but surely (Claudia Eckert); (2) Requirements concerning the further development of data protection and data security as part of the technological change (Reinhold Harnisch); (3) Standardization in the smart grid (Harald Orlamuender); (4) IEC 61850 - The standard for energy automation (Georg Harnischmacher); (5) Smart City, the intelligent grid in the city (Michael Laskowski); (6) IKT is a basis for a real smart power distribution system (Justus Bross); (7) Power transparency and optimized building optimization by means of a holistic automation concepts (Joerg Wollert); (8) Distributed architecture for a balancing aggregation of consumption and generation of power in private households (Kilian Hemmeboehle); (9) Development of an e-energy market place and first experiences from the field test in the E-DeMa project (Bernd Werner); (10) Smart metering rollout pilot ''30,000er'' (Axel Lauterkorn); (11) Experiences with the connexion and communication to smart meters in the project eTelligence (Guenter Pistoor); (12) Smart Phoenix - Intelligent energy networks in Dortmund (Roland Brueggemann); (13) Smart planning (C. Engels); Intelligent house control by means of smart metering (Sabine Wieland); (14) Dynamic billing of energy and value-added service in the networked home (Frank C. Bormann).

  1. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  2. Contactless measurement of muscles fatigue by tracking facial feature points in a video

    DEFF Research Database (Denmark)

    Irani, Ramin; Nasrollahi, Kamal; Moeslund, Thomas B.

    2014-01-01

    their exercises when the level of the fatigue might be dangerous for the patients. The current technology for measuring tiredness, like Electromyography (EMG), requires installing some sensors on the body. In some applications, like remote patient monitoring, this however might not be possible. To deal...... with such cases, in this paper we present a contactless method based on computer vision techniques to measure tiredness by detecting, tracking, and analyzing some facial feature points during the exercise. Experimental results on several test subjects and comparing them against ground truth data show...... that the proposed system can properly find the temporal point of tiredness of the muscles when the test subjects are doing physical exercises....

  3. 3rd international KES conference on Smart Education and Smart e-Learning

    CERN Document Server

    Howlett, Robert; Jain, Lakhmi

    2016-01-01

    This book contains the contributions presented at the 3rd international KES conference on Smart Education and Smart e-Learning, which took place in Puerto de la Cruz, Tenerife, Spain, June 15-17, 2016. It contains a total of 56 peer-reviewed book chapters that are grouped into several parts: Part 1 - Smart University: Conceptual Modeling, Part 2 – Smart Education: Research and Case Studies, Part 3 – Smart e-Learning, Part 4 – Smart Education: Software and Hardware Systems, and Part 5 – Smart Technology as a Resource to Improve Education and Professional Training. We believe that the book will serve as a useful source of research data and valuable information for faculty, scholars, Ph.D. students, administrators, and practitioners - those who are interested in innovative areas of smart education and smart e-learning. .

  4. Smart governance for smart city

    Science.gov (United States)

    Mutiara, Dewi; Yuniarti, Siti; Pratama, Bambang

    2018-03-01

    Some of the local government in Indonesia claimed they already created a smart city. Mostly the claim based of IT utilization for their governance. In general, a smart city definition is to describe a developed urban area that creates sustainable economic development and high quality of life by excelling in multiple key; economy, mobility, environment, people, living, and government. For public services, the law guarantees good governance by setting the standard for e-government implicitly including for local government or a city. Based on the arguments, this research tries to test the condition of e-government of the Indonesian city in 34 provinces. The purpose is to map e-government condition by measuring indicators of smart government, which are: transparent governance and open data for the public. This research is departing from public information disclosure law and to correspond with the existence law. By examining government transparency, the output of the research can be used to measure the effectiveness of public information disclosure law and to determine the condition of e-government in local government in which as part of a smart city.

  5. Remote calibration system of a smart electrical energy meter

    Directory of Open Access Journals (Sweden)

    Zakariae Jebroni

    2017-12-01

    Full Text Available The need to control the power grid in real time has opened a new field of research, today researchers are trying to design electrical meters that are completely remote controlled, to create an advanced metering infrastructure. One of the most important processes in the field of measurement is the calibration of measuring instruments. The calibration process of the electrical meters was performed at laboratories. However, the new directives, now, require a regular test of accuracy. Nevertheless, moving each time on site to check the accuracy of a meter can be annoying. To solve this problem our contribution is to propose a new structure of a smart meter that integrates a calibration card, so that, this process is carried out remotely. To be able to calibrate the meter or test its accuracy, we have included an AC-AC converter powered by the electrical grid and that provides a stable voltage independent of the electrical grid in term of frequency and amplitude. The output voltage of the converter is used as the reference signal during calibration or accuracy testing. In this paper, we will present the structure of the calibration card, the study and dimensioning of the converter, as well as the control technique used to eliminate variations of the input voltage. At the end, we will present the results of simulations and experiments.

  6. Smart grids for smart cities: Smart energy management

    International Nuclear Information System (INIS)

    Kieny, Christophe

    2013-01-01

    Smart grids are currently a hot topic. Growing numbers of municipalities are experimenting with smart grids as the foundation for tomorrow's smart cities. And yet, end users are struggling to understand the innovative new energy distribution models just over the horizon. Our energy system is at a crossroads. And the coming years will tell us whether smart grids - whether they integrate renewable energy sources or not - will develop as a hybrid industry combining energy and IT or emerge as a full-fledged sector in and of itself. First and foremost, smart grids must be considered from a local, micro-economic standpoint, but one that also takes into account issues and interactions at the regional, national, EU, and global levels. Today, fighting climate change is a major challenge at both the national and global levels. The Kyoto Protocol and the Copenhagen Summit established a framework for crucial initiatives to combat climate change. The EU and France followed suit with their Climate and Energy Package and Grenelle de l'environnement environmental agenda. These policies set forth measures to fight climate change and to adapt to its impacts on people and the economy. France, for instance, set two basic targets to be achieved by 2020: - Make renewable energy a priority by promoting the development of energy from renewable sources to achieve the target of 23% renewables in the final energy mix. - Promote energy savings and increase energy efficiency by 20% and limit global warming to less than 2 deg. C over pre-industrial temperatures in industrialized nations by 2050 (around 1.2 deg. C above current temperatures). Tomorrow's grids will have to be smarter, which means incorporating information and communication technologies to provide the responsiveness and enhanced communication capabilities needed to meet the following challenges: - Integrating electricity from renewable sources; - Controlling demand; - Managing peak consumption; - Promoting widespread adoption of

  7. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  8. 12 CFR 226.12 - Special credit card provisions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  9. Noncontact power/interrogation system for smart structures

    Science.gov (United States)

    Spillman, William B., Jr.; Durkee, S.

    1994-05-01

    The field of smart structures has been largely driven by the development of new high performance designed materials. Use of these materials has been generally limited due to the fact that they have not been in use long enough for statistical data bases to be developed on their failure modes. Real time health monitoring is therefore required for the benefits of structures using these materials to be realized. In this paper a non-contact method of powering and interrogating embedded electronic and opto-electronic systems is described. The technique utilizes inductive coupling between external and embedded coils etched on thin electronic circuit cards. The technique can be utilized to interrogate embedded sensors and to provide > 250 mW for embedded electronics. The system has been successfully demonstrated with a number of composite and plastic materials through material thicknesses up to 1 cm. An analytical description of the system is provided along with experimental results.

  10. Big data, smart cities and city planning.

    Science.gov (United States)

    Batty, Michael

    2013-11-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London's public transport systems.

  11. SmartInspect: Smart Contract Inspection Technical Report

    OpenAIRE

    Bragagnolo , Santiago; Rocha , Henrique ,; Denker , Marcus; Ducasse , Stéphane

    2017-01-01

    Smart contracts are embedded procedures stored with the data they act upon. Debugging deployed Smart Contracts is a difficult task since once deployed, the code cannot be reexecuted and inspecting a simple attribute is not easily possible because data is encoded. In this technical report, we present SmartInspect to address the lack of inspectability of a deployed contract. Our solution analyses the contract state by using decompilation techniques and a mirror-based architecture to represent t...

  12. Towards Contactless Silent Speech Recognition Based on Detection of Active and Visible Articulators Using IR-UWB Radar.

    Science.gov (United States)

    Shin, Young Hoon; Seo, Jiwon

    2016-10-29

    People with hearing or speaking disabilities are deprived of the benefits of conventional speech recognition technology because it is based on acoustic signals. Recent research has focused on silent speech recognition systems that are based on the motions of a speaker's vocal tract and articulators. Because most silent speech recognition systems use contact sensors that are very inconvenient to users or optical systems that are susceptible to environmental interference, a contactless and robust solution is hence required. Toward this objective, this paper presents a series of signal processing algorithms for a contactless silent speech recognition system using an impulse radio ultra-wide band (IR-UWB) radar. The IR-UWB radar is used to remotely and wirelessly detect motions of the lips and jaw. In order to extract the necessary features of lip and jaw motions from the received radar signals, we propose a feature extraction algorithm. The proposed algorithm noticeably improved speech recognition performance compared to the existing algorithm during our word recognition test with five speakers. We also propose a speech activity detection algorithm to automatically select speech segments from continuous input signals. Thus, speech recognition processing is performed only when speech segments are detected. Our testbed consists of commercial off-the-shelf radar products, and the proposed algorithms are readily applicable without designing specialized radar hardware for silent speech processing.

  13. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  14. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  15. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  16. Determinants of debit cards acceptance: An empirical investigation

    International Nuclear Information System (INIS)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar; Bakri, Mohamed Hariri; Zulkepli, Jafri

    2014-01-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry

  17. Determinants of debit cards acceptance: An empirical investigation

    Energy Technology Data Exchange (ETDEWEB)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar [Faculty of Business and Management, Universiti Teknologi MARA, Melaka 75300 (Malaysia); Bakri, Mohamed Hariri [Faculty of Technology Management And Technopreneurship, Universiti Teknikal Malaysia, Melaka 76100 (Malaysia); Zulkepli, Jafri [Faculty of Quantitative Science, Universiti Utara Malaysia, Sintok Kedah (Malaysia)

    2014-12-04

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  18. Determinants of debit cards acceptance: An empirical investigation

    Science.gov (United States)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  19. Restructuring of the driver for TASS/SMR, SMART analysis code

    International Nuclear Information System (INIS)

    Lee, G. H.; Kim, S. H.; Whang, Y. D.; Kim, H. C.

    2003-01-01

    TASS/SMR is under development by implementing the newly developed thermal hydraulic models for the integral reactor, SMART. The data structure of TASS utilizes external files, which could result in difficulties for the code maintenance and an easy understanding of the code. The driver for TASS/SMR was rewritten for the use of Fortran 90 advanced features, such as dynamic memory management and user defined derived type. The input structure of TASS changed from the interactive method to card numbered system. Also the output process of TASS reformed by removing the utility program. The validation of the TASS/SMR driver was performed by the comparison of results. The use of the revised TASS/SMR driver is expected to accelerate code development process as well as improve user friendliness

  20. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  1. Contactless Inductive Flow Tomography: Brief History and Recent Developments in Its Application to Continuous Casting

    Directory of Open Access Journals (Sweden)

    Matthias Ratajczak

    2014-01-01

    Full Text Available The contactless inductive flow tomography (CIFT aims at reconstructing the velocity field of electrically conducting fluids, with special focus on applications in metallurgy and crystal growth technologies. The method relies on the induction of secondary magnetic fields if the moving fluid is exposed to a primary magnetic field. The theoretical foundation of the method is delineated, and some early experiments on the reconstruction of the three-dimensional flow in a cylinder are sketched. Then, the recent efforts to apply CIFT to various model problems in connection with the continuous casting of steel are summarized.

  2. SmartCampusAAU

    DEFF Research Database (Denmark)

    Hansen, Rene; Thomsen, Bent; Thomsen, Lone Leth

    2013-01-01

    This paper describes SmartCampusAAU - an open, extendable platform that supports the easy creation of indoor location based systems. SmartCampusAAU offers an app and backend that can be used to enable indoor positioning and navigation in any building. The SmartCampusAAU app is available on all ma...... major mobile platforms (Android, iPhone and Windows Phone) and supports both device- and infrastructure-based positioning. SmartCampusAAU also offers a publicly available OData backend that allows researchers to share radio map and location tracking data.......This paper describes SmartCampusAAU - an open, extendable platform that supports the easy creation of indoor location based systems. SmartCampusAAU offers an app and backend that can be used to enable indoor positioning and navigation in any building. The SmartCampusAAU app is available on all...

  3. Health care report cards: what about consumers' perspectives?

    Science.gov (United States)

    McGee, J; Knutson, D

    1994-10-01

    Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.

  4. EuCARD final project report

    CERN Document Server

    Koutchouk, J P

    2014-01-01

    After four years of activity, EuCARD has most of its objectives fulfilled, with some new objectives added and a few others on excellent tracks while requiring additional time. The management has been active in reinforcing the collaborative links between partners and projects, contributing to the preparation of FP7-EuCARD2, initiating FP7-HiLumi-LHC Design Study, to favour sustained collaborations beyond EuCARD. An out-of-contract network has been successfully launched on laser plasma acceleration, to combine forces between accelerator, laser and plasma communities. Communication and dissemination activities have led to two highlights: Accelerating News, an accelerator R&D newsletter initiated by EuCARD and now common to all FP7 accelerator projects (over 1000 subscribers) and a series of monographs on accelerator sciences that is progressively finding its public. The scientific networks have more than fulfilled their initial objectives: roadmaps are defined for neutrino facilities, submitted to the Europe...

  5. Electricity Markets, Smart Grids and Smart Buildings

    Science.gov (United States)

    Falcey, Jonathan M.

    A smart grid is an electricity network that accommodates two-way power flows, and utilizes two-way communications and increased measurement, in order to provide more information to customers and aid in the development of a more efficient electricity market. The current electrical network is outdated and has many shortcomings relating to power flows, inefficient electricity markets, generation/supply balance, a lack of information for the consumer and insufficient consumer interaction with electricity markets. Many of these challenges can be addressed with a smart grid, but there remain significant barriers to the implementation of a smart grid. This paper proposes a novel method for the development of a smart grid utilizing a bottom up approach (starting with smart buildings/campuses) with the goal of providing the framework and infrastructure necessary for a smart grid instead of the more traditional approach (installing many smart meters and hoping a smart grid emerges). This novel approach involves combining deterministic and statistical methods in order to accurately estimate building electricity use down to the device level. It provides model users with a cheaper alternative to energy audits and extensive sensor networks (the current methods of quantifying electrical use at this level) which increases their ability to modify energy consumption and respond to price signals The results of this method are promising, but they are still preliminary. As a result, there is still room for improvement. On days when there were no missing or inaccurate data, this approach has R2 of about 0.84, sometimes as high as 0.94 when compared to measured results. However, there were many days where missing data brought overall accuracy down significantly. In addition, the development and implementation of the calibration process is still underway and some functional additions must be made in order to maximize accuracy. The calibration process must be completed before a reliable

  6. Simple, heart-smart substitutions

    Science.gov (United States)

    Coronary artery disease - heart smart substitutions; Atherosclerosis - heart smart substitutions; Cholesterol - heart smart substitutions; Coronary heart disease - heart smart substitutions; Healthy diet - heart ...

  7. Using smart card technology to monitor the eating habits of children in a school cafeteria: 2. The nutrient contents of all meals chosen by a group of 8- to 11-year-old boys over 78 days.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the abilities of the newly created smart card system to track the nutrient contents of foods chosen over several months by individual diners in a school cafeteria. From the food choice and composition of food data sets, an Access database was created encompassing 30 diners (aged 8-11 years), 78 days and eight nutrients. Data were available for a total of 1909 meals. Based upon population mean values the cohort were clearly choosing meals containing higher than the recommended maximum amounts for sugar and lower than the recommended minimum amounts of fibre, iron and vitamin A. Protein and vitamin C contents of meals chosen were well above minimum requirements. Over the 1909 meals, nutrient requirements were met 41% of the time. The system created was very effective at continually monitoring food choices of individual diners over limitless time. The data generated raised questions on the common practice of presenting nutrient intakes as population mean values calculated over a few days. The impact of heavily fortified foods on such studies in general is discussed.

  8. Smart Cities - Smart Homes and Smart Home Technology

    OpenAIRE

    Faanes, Erlend Kydland

    2014-01-01

    This master’s thesis consists of two articles where the first article is theoretical and the second is the empirical study. Article I The purpose with this paper is to explore and illuminate how smart home and smart home technology can contribute to enhance health and Quality of Life in elderly citizens and allow them to live longer in their home. The paper provides a brief introduction to health promotion and highlights the thesis theoretical framework and foundation of Aaron Antonov...

  9. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  10. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  11. "It's in the Cards": The Contribution of Illustrated Metaphor Cards to Exploring Values Within Narratives.

    Science.gov (United States)

    Karnieli-Miller, Orit; Nissim, Geffen; Goldberg, Miriam

    2017-01-01

    In this article, we present the use of illustrated metaphorical cards as a technique to enrich the qualitative narrative interview. We examine the advantages of incorporating a projective tool to assist in constructing and understanding personal narratives of people living with severe mental illness. We interviewed 25 participants-staff and members of a clubhouse in Israel (an international community model of rehabilitation in mental health)-and sought to understand their stories focused on personal and organizational values. The findings revealed that, in most cases, the cards contributed to data collection by enhancing the interviewees' ability for expression and by facilitating richer, more comprehensive stories and descriptions. This in turn enhanced the researcher's ability to understand the messages and stories presented. The research conclusions discuss the cards' potential contribution to improving data collection and analysis. The cards became an additional channel for expressing participants' experiences, emotions, and unique voice. © The Author(s) 2015.

  12. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  13. Investigation of a matrix converter for contactless power transmission systems; Untersuchung eines Matrixumrichters fuer kontaktlose Energieuebertragungssysteme

    Energy Technology Data Exchange (ETDEWEB)

    Ecklebe, Andreas

    2009-05-22

    The publication discusses a three- to two-phase matrix converter for contactless power transmission systems. Based on relevant publications, possible resonance setups for contactless power transmission systems are investigated to begin with. An analysis of relevant parameters shows the differences between the various setups, but it also shows that for an investigation focusing on the feeding converter, simple modelling of the three investigated resonance setups is possible with the aid of a serial oscillating circuit. In consequence, it should be possible to apply the results also to the matrix converter with other serially resonant loads. The second part of the investigation focuses on the matrix converter. After a theoretical description, a combination von high-frequency control - e.g. bulk pulsing - and low-frequency pulsing patterns for setting the harmonics level of the grid currents is presented. The similarity to a conventional H bridge circuit enables an assessment of commutation and the identification of the necessary inverter states. These are characterized in that a bidirectional connection between the input system and each output phase is available at any time. The functioning of the commutation and of the inverter as a whole is proved by simulation in a first step, in which also the dynamic switching characteristics of the power semiconductors is taken into account. Finally, the results of laboratory measurements are presented and compared with the theoretical results. The laboratory setup consists of the power section of the matrix converter with input filters and modular gate drivers, a DSP/FPGA control system, and a contactless power transmission system with a current inverter and load on the secondary side. The investigation thus provides information on the use of the three-to-two phase matrix converter as an interesting alternative for feeding of contactless power transmission systems and other serially resonant loads. (orig.) [German] Diese

  14. Electricity usage scheduling in smart building environments using smart devices.

    Science.gov (United States)

    Lee, Eunji; Bahn, Hyokyung

    2013-01-01

    With the recent advances in smart grid technologies as well as the increasing dissemination of smart meters, the electricity usage of every moment can be detected in modern smart building environments. Thus, the utility company adopts different price of electricity at each time slot considering the peak time. This paper presents a new electricity usage scheduling algorithm for smart buildings that adopts real-time pricing of electricity. The proposed algorithm detects the change of electricity prices by making use of a smart device and changes the power mode of each electric device dynamically. Specifically, we formulate the electricity usage scheduling problem as a real-time task scheduling problem and show that it is a complex search problem that has an exponential time complexity. An efficient heuristic based on genetic algorithms is performed on a smart device to cut down the huge searching space and find a reasonable schedule within a feasible time budget. Experimental results with various building conditions show that the proposed algorithm reduces the electricity charge of a smart building by 25.6% on average and up to 33.4%.

  15. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  16. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  17. Towards smart environments using smart objects.

    Science.gov (United States)

    Sedlmayr, Martin; Prokosch, Hans-Ulrich; Münch, Ulli

    2011-01-01

    Barcodes, RFID, WLAN, Bluetooth and many more technologies are used in hospitals. They are the technological bases for different applications such as patient monitoring, asset management and facility management. However, most of these applications exist side by side with hardly any integration and even interoperability is not guaranteed. Introducing the concept of smart objects inspired by the Internet of Things can improve the situation by separating the capabilities and functions of an object from the implementing technology such as RFID or WLAN. By aligning technological and business developments smart objects have the power to transform a hospital from an agglomeration of technologies into a smart environment.

  18. Smart homes with smartphones : Creating a Smart home application for smartphones

    OpenAIRE

    Lärka, Martin

    2015-01-01

    The goal of this master thesis was to evaluate the field of Smart home applications run on mobile platforms such as smart phones. This was at the time a relatively new field that has attracted the attention of Smart phone giants like Apple and Google. This raised the question whether or not the users willingness to embrace the technology. To evaluate the field, a literature study was conducted covering the Smart home technology, and Apple’s and Google’s Smart home solutions. The rendered in a...

  19. Hydro One smart meter/smart grid : realizing the vision

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, R. [Hydro One Networks Inc., Toronto, ON (Canada)

    2010-07-01

    Ontario's Hydro One Networks has been installing smart meters as part of its smart grid plan since 2007. The smart grid plan forms part of the utility's overall aim to create an energy conservation culture across the province. The utility now has over 1 million installed meters over a 640,000{sup 2} km territory. The smart grid planning team has adopted the use of an upgraded open protocol standards-based communications as part of its 2-way high bandwidth network. The utility is using a 1.8 Ghz worldwide interoperability for microwave access (WiMAX) spectrum designed specifically for the protection of electric utility infrastructure. The utility is now incorporating proof-of-concept applications including automated reclosers, remote terminal units, demand management devices and mobile technologies for use in its smart grid procedures. Various smart zone business scenarios were also described in this power point presentation, as well as details of Hydro One's integration plans for vendors and other power systems. tabs., figs.

  20. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  1. Correlates of credit card ownership in men and women.

    Science.gov (United States)

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  2. 46 CFR 154.1814 - Cargo information cards.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo information cards. 154.1814 Section 154.1814... cards. (a) No person may operate a vessel unless a cargo information card for each cargo being... accessible to the person in charge of the watch. (b) When a vessel is moored at a terminal, the master shall...

  3. Smart Grid, Smart Europe

    OpenAIRE

    VITIELLO SILVIA; FULLI Gianluca; MENGOLINI Anna Maria

    2013-01-01

    Le smart grid, o reti elettriche intelligenti, aprono la strada a nuove applicazioni con conseguenze di vasta portata per l’intero sistema elettrico, tra le quali la principale è la capacità di integrare nella rete esistente più fonti di energia rinnovabili (FER), veicoli elettrici e fonti di generazione distribuita. Le smart grid inoltre garantiscono una più efficiente ed affidabile risposta alla domanda di energia, sia da un punto di vista tecnico, permettendo un monitoraggio e un controll...

  4. Smart Chips for Smart Surroundings -- 4S

    NARCIS (Netherlands)

    Schuler, Eberhard; König, Ralf; Becker, Jürgen; Rauwerda, G.K.; van de Burgwal, M.D.; Smit, Gerardus Johannes Maria; Cardoso, João M.P.; Hübner, Michael

    2011-01-01

    The overall mission of the 4S project (Smart Chips for Smart Surroundings) was to define and develop efficient flexible, reconfigurable core building blocks, including the supporting tools, for future Ambient System Devices. Reconfigurability offers the needed flexibility and adaptability, it

  5. A Comparison of Card-sorting Analysis Methods

    DEFF Research Database (Denmark)

    Nawaz, Ather

    2012-01-01

    This study investigates how the choice of analysis method for card sorting studies affects the suggested information structure for websites. In the card sorting technique, a variety of methods are used to analyse the resulting data. The analysis of card sorting data helps user experience (UX......) designers to discover the patterns in how users make classifications and thus to develop an optimal, user-centred website structure. During analysis, the recurrence of patterns of classification between users influences the resulting website structure. However, the algorithm used in the analysis influences...... the recurrent patterns found and thus has consequences for the resulting website design. This paper draws an attention to the choice of card sorting analysis and techniques and shows how it impacts the results. The research focuses on how the same data for card sorting can lead to different website structures...

  6. RENEWAL OF CRIMINAL LAW AGAINST ABUSE OF CREDIT CARDS

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-07-01

    Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people.   On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia.   A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.

  7. Puppet Visual Adaptation on Playing Cards as Educational Media

    Directory of Open Access Journals (Sweden)

    Joko Wiyoso

    2017-02-01

    Full Text Available This study aims at presenting an effective media in a form of puppet picture playing cards as a means to introduce traditional puppet to the society. Research and Development (R&D was chosen as the method to develop the playing cards. Results were presented in a form of the design of puppet picture playing cards as many as 54 cards as well as 54 puppet characters as the background pictures. The design of the playing cards is adjusted to the common playing cards which are distributed widely in the society, including both the sizes and symbols, like the pictures of spade, heart, diamond, and club. In detail, the design comprises: (1 the size of playing cards which is 6 cm width of the upper and lower sides and 9 cm length for the left and right sides. (2 The playing cards’ background is in a bright color so does the puppet picture on the card can be seen clearly.

  8. A Review of Systems and Technologies for Smart Homes and Smart Grids

    OpenAIRE

    Lobaccaro, Gabriele; Carlucci, Salvatore; Löfström, Erica

    2016-01-01

    In the actual era of smart homes and smart grids, advanced technological systems that allow the automation of domestic tasks are developing rapidly. There are numerous technologies and applications that can be installed in smart homes today. They enable communication between home appliances and users, and enhance home appliances’ automation, monitoring and remote control capabilities. This review article, by introducing the concept of the smart home and the advent of the smart grid, investiga...

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  10. The Regulation of the Credit Card Market in Turkey

    OpenAIRE

    Ahmet Faruk Aysan; L. Yildiz

    2006-01-01

    The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...

  11. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  12. Problem and solution of tally segment card in MCNP code

    International Nuclear Information System (INIS)

    Xie Jiachun; Zhao Shouzhi; Sun Zheng; Jia Baoshan

    2010-01-01

    Wrong results may be given when FS card (tally segment card) was used for tally with other tally cards in Monte Carlo code MCNP. According to the comparison of segment tally results which were obtained by FS card of three different models of the same geometry, the tally results of fuel regions were found to be wrong in fill pattern. The reason is that the fuel cells were described by Universe card and FILL card, and the filled cells were always considered at Universe card definition place. A proposed solution was that the segment tally for filled cells was done at Universe card definition place. Radial flux distribution of one example was calculated in this way. The results show that the fault of segment tally with FS card in fill pattern could be solved by this method. (authors)

  13. Cobacabana (control of balance by card-based navigation) : A card-based system for job shop control

    NARCIS (Netherlands)

    Land, M.J.

    Existing card-based production control systems such as Kanban are mostly dedicated to repetitive production environments. Cards-based systems for job shop control are lacking, while particularly this industry segment shows a need for simple control systems. This paper aims at filling the gap by

  14. Prepaid cards: how do they function? how are they regulated?

    OpenAIRE

    Mark Furletti

    2004-01-01

    This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...

  15. Smart Energy 2011. Smart Grid or the future of power industry; Smart Energy 2011. Smart Grid oder die Zukunft der Energiewirtschaft

    Energy Technology Data Exchange (ETDEWEB)

    Grossmann, Uwe; Kunold, Ingo (eds.)

    2011-07-01

    The demand for smart grids, energy information networks, smart metering, new tariffs offering incentives for load shifting to household customers and load reduction options to energy providers are discussed increasingly. The privacy protection of customers being threatened by detailed consumption profiles also needs attention. Practitioners and researches from enterprises and research institutions present results from their field of work in nine papers. This book mainly focusses on three topics: 'Energy 2020', 'Data protection and data security within smart grids' and 'Smart grid and energy information networks'. On the one hand this volume addresses researchers and practitioners from enterprises and research institutions, on the other hand teachers and students dealing with questions concerning the energy market of the future. (orig.)

  16. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  17. Mathematical card magic fifty-two new effects

    CERN Document Server

    Mulcahy, Colm

    2013-01-01

    Mathematical card effects offer both beginning and experienced magicians an opportunity to entertain with a minimum of props. Featuring mostly original creations, Mathematical Card Magic: Fifty-Two New Effects presents an entertaining look at new mathematically based card tricks. Each chapter contains four card effects, generally starting with simple applications of a particular mathematical principle and ending with more complex ones. Practice a handful of the introductory effects and, in no time, you'll establish your reputation as a "mathemagician." Delve a little deeper into each chapter and the mathematics gets more interesting. The author explains the mathematics as needed in an easy-to-follow way. He also provides additional details, background, and suggestions for further explorations.Suitable for recreational math buffs and amateur card lovers or as a text in a first-year seminar, this color book offers a diverse collection of new mathemagic principles and effects.

  18. Location Based Application Availability

    Science.gov (United States)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  19. Smart Beta or Smart Alpha

    DEFF Research Database (Denmark)

    Winther, Kenneth Lillelund; Steenstrup, Søren Resen

    2016-01-01

    that smart beta investing probably will do better than passive market capitalization investing over time, we believe many are coming to a conclusion too quickly regarding active managers. Institutional investors are able to guide managers through benchmarks and risk frameworks toward the same well......Smart beta has become the flavor of the decade in the investment world with its low fees, easy access to rewarded risk premiums, and appearance of providing good investment results relative to both traditional passive benchmarks and actively managed funds. Although we consider it well documented......-documented smart beta risk premiums and still motivate active managers to avoid value traps, too highly priced small caps, defensives, etc. By constructing the equity portfolios of active managers that resemble the most widely used risk premiums, we show that the returns and risk-adjusted returns measures...

  20. Smart Grid: Network simulator for smart grid test-bed

    International Nuclear Information System (INIS)

    Lai, L C; Ong, H S; Che, Y X; Do, N Q; Ong, X J

    2013-01-01

    Smart Grid become more popular, a smaller scale of smart grid test-bed is set up at UNITEN to investigate the performance and to find out future enhancement of smart grid in Malaysia. The fundamental requirement in this project is design a network with low delay, no packet drop and with high data rate. Different type of traffic has its own characteristic and is suitable for different type of network and requirement. However no one understands the natural of traffic in smart grid. This paper presents the comparison between different types of traffic to find out the most suitable traffic for the optimal network performance.

  1. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Jorge Thierer

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la en...

  2. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Thierer, Jorge

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los betabloqueantes vasodilatadores y los inhibidores de la enzim...

  3. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  4. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user’s medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents’ medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data. Questions can be abstracted to various level of resolution (hence sensitivity of private data for use in the authentication process. The method is described and a case study is given in this paper.

  5. Conceptualizing smart service systems

    DEFF Research Database (Denmark)

    Beverungen, Daniel; Müller, Oliver; Matzner, Martin

    2017-01-01

    Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service” that is b......Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service......” that is based on monitoring, optimization, remote control, and autonomous adaptation of products, profoundly transform service systems into what we call “smart service systems”. In a multi-method study that includes conceptual research and qualitative data from in-depth interviews, we conceptualize “smart...... service” and “smart service systems” based on using smart products as boundary objects that integrate service consumers’ and service providers’ resources and activities. Smart products allow both actors to retrieve and to analyze aggregated field evidence and to adapt service systems based on contextual...

  6. The smart - development and technology; Der smart - Entwicklung und Technik

    Energy Technology Data Exchange (ETDEWEB)

    Goppelt, G.

    1999-06-01

    The smart is the first representative of a radically new vehicle concept, with minimum space requirements and trend-setting in terms of ecology, safety, and individualism. The new design is not rooted in any tradition. The contribution describes the development process and constructional features of the smart. [Deutsch] Der smart ist der erste Vertreter eines voellig neuen Fahrzeugkonzepts. Bei kleinstem Raumbedarf soll er neue Massstaebe bei Oekologie, Sicherheit und Individualitaet setzen. Entstanden ist eine konsequente Neukonstruktion, die sich von bisherigen Traditionen loest. In diesem Beitrag sind der Entwicklungsprozess sowie die Konstruktionsmerkmale des smart beschrieben. (orig.)

  7. A contact-less method to evaluate the state of charge of nickel batteries using Foucault's eddy currents

    Science.gov (United States)

    Mancier, V.; Metrot, A.; Willmann, P.

    A nickel hydroxide electrode and a commercial battery have been studied by a new and contact-less impedance method, based on Foucault's eddy currents, with the aim of determining their state of charge. Four different current line distributions have been employed and the impedance versus time graphs obtained show a linear variation of this impedance during charge and discharge for all configurations. This new method allows the determination of the state of charge and, furthermore some "artifacts" obvious on these graphs may be useful to detect a deterioration of the studied material.

  8. PC add on card for processing of LSC signals

    International Nuclear Information System (INIS)

    Jadhav, S.R.; Nikhare, D.M.; Gurna, R.K.; Paulson, Molly; Kulkarni, C.P.; Vaidya, P.P.

    2001-01-01

    This paper describes PC- add on card developed at Electronics Division for processing of LSC signals. This card uses highly integrated digital and analog circuits, for entire processing of signals available from preamplifiers to get complete beta energy spectrum corresponding to coincident events in Liquid Scintillation Counting. LSC card along with High Voltage PC-add on card gives complete electronics required for LSC system. This card is also used in automatic LSC system along with interface circuits, which are used to control mechanical movements. (author)

  9. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  10. Telecommunication Technologies for Smart Grid Projects with Focus on Smart Metering Applications

    Directory of Open Access Journals (Sweden)

    Nikoleta Andreadou

    2016-05-01

    Full Text Available This paper provides a study of the smart grid projects realised in Europe and presents their technological solutions with a focus on smart metering Low Voltage (LV applications. Special attention is given to the telecommunications technologies used. For this purpose, we present the telecommunication technologies chosen by several European utilities for the accomplishment of their smart meter national roll-outs. Further on, a study is performed based on the European Smart Grid Projects, highlighting their technological options. The range of the projects analysed covers the ones including smart metering implementation as well as those in which smart metering applications play a significant role in the overall project success. The survey reveals that various topics are directly or indirectly linked to smart metering applications, like smart home/building, energy management, grid monitoring and integration of Renewable Energy Sources (RES. Therefore, the technological options that lie behind such projects are pointed out. For reasons of completeness, we also present the main characteristics of the telecommunication technologies that are found to be used in practice for the LV grid.

  11. 75 FR 81721 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2010-12-28

    ... cards not marketed or labeled as a gift card or certificate. EFTA Section 920 provides, however, that... cardholder initiates a purchase by providing his or her card or card information to a merchant. In the case... purchases at retailers in the early 1980s. It was not until the mid-1990s, however, that PIN debit became a...

  12. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  14. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  15. Materialism and credit card use by college students.

    Science.gov (United States)

    Pinto, M B; Parente, D H; Palmer, T S

    2000-04-01

    Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use.

  16. 76 FR 20343 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-12

    ..., were submitted on April 5, 2011 to the House Committee on Oversight and Government Reform, the Senate... or smart card technology protocols.'' Retention and disposal: Delete entry and replace with... and cleared for need- to-know. PRODARTS is protected by user identification and password or smart card...

  17. Smart meters. Smart metering. A solution module for a future-oriented energy system; Intelligente Zaehler. Smart Metering. Ein Loesungsbaustein fuer ein zukunftsfaehiges Energiesystem

    Energy Technology Data Exchange (ETDEWEB)

    Grimm, Nadia; Seidl, Hans [comps.

    2011-12-15

    The German Energy Agency GmbH (Berlin, Federal Republic of Germany) reports on smart metering as a solution module for a future-oriented energy system by means of the following contributions: (1) Key role for smart meters; (2) What is smart metering? (3) Implementation of smart metering in Europe; (4) The market development to date in Germany; (5) Practical experiences with smart metering in Germany; (6) Frequently asked questions; (7) Smart metering in intelligent networks; (8) Legal framework conditions; (9) Data security and data protection in the utilisation of smart meters; (10) Ongoing information; (11) Efficient energy systems.

  18. Smart material screening machines using smart materials and controls

    Science.gov (United States)

    Allaei, Daryoush; Corradi, Gary; Waigand, Al

    2002-07-01

    The objective of this product is to address the specific need for improvements in the efficiency and effectiveness in physical separation technologies in the screening areas. Currently, the mining industry uses approximately 33 billion kW-hr per year, costing 1.65 billion dollars at 0.05 cents per kW-hr, of electrical energy for physical separations. Even though screening and size separations are not the single most energy intensive process in the mining industry, they are often the major bottleneck in the whole process. Improvements to this area offer tremendous potential in both energy savings and production improvements. Additionally, the vibrating screens used in the mining processing plants are the most costly areas from maintenance and worker health and safety point of views. The goal of this product is to reduce energy use in the screening and total processing areas. This goal is accomplished by developing an innovative screening machine based on smart materials and smart actuators, namely smart screen that uses advanced sensory system to continuously monitor the screening process and make appropriate adjustments to improve production. The theory behind the development of Smart Screen technology is based on two key technologies, namely smart actuators and smart Energy Flow ControlT (EFCT) strategies, developed initially for military applications. Smart Screen technology controls the flow of vibration energy and confines it to the screen rather than shaking much of the mass that makes up the conventional vibratory screening machine. Consequently, Smart Screens eliminates and downsizes many of the structural components associated with conventional vibratory screening machines. As a result, the surface area of the screen increases for a given envelope. This increase in usable screening surface area extends the life of the screens, reduces required maintenance by reducing the frequency of screen change-outs and improves throughput or productivity.

  19. 29 CFR 4.123 - Administrative limitations, variances, tolerances, and exemptions.

    Science.gov (United States)

    2010-07-01

    ... microelectronic circuitry or other technology of at least similar sophistication is an essential element (for... servicing of cards (including credit cards, debit cards, purchase cards, smart cards, and similar card... military personnel in buying and selling homes (which shall not include actual moving or storage of...

  20. From smart city to smart destination. The case of three Canadian cities

    Directory of Open Access Journals (Sweden)

    François Bédard

    2018-03-01

    Full Text Available Several cities around the world are self-proclaimed "smart" by integrating, in varying degrees, new technologies in the different spheres of the city. Nevertheless, despite this effervescence around the smart city, the concept requires more conceptualization from the researchers. This is even more important when it comes time to distinguishing between smart city and smart destination. The relationship between these two concepts is blurred and the transition from the smart city to the smart destination is not automatic. This situation is explained by the fact that the intrinsic characteristics of their respective target populations, being the citizens and the tourists, are different. This article compares three Canadian cities in the province of Quebec with the aim of demonstrating that the realization of a smart destination project requires the adaptation of governance structure and the involvement of all the stakeholders and more particularly in tourism.