WorldWideScience

Sample records for contactless smart cards

  1. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  2. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  3. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  4. Smart Icon Cards

    Science.gov (United States)

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  5. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  6. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  7. Determinants affecting consumer adoption of contactless credit card: an empirical study.

    Science.gov (United States)

    Wang, Yu-Min

    2008-12-01

    The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.

  8. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  9. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  10. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  11. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  12. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  13. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  14. Signal processing for smart cards

    Science.gov (United States)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  15. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  16. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  17. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  18. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  19. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  20. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  1. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  2. Smart practice: smart card design considerations in health care.

    Science.gov (United States)

    Lindley, R A; Pacheco, F

    1995-01-01

    Recent innovations in microelectronics and advances in cryptography are driving the appearance of a new generation of smart cards with wider applications; this has important repercussions for our society in the coming years. Essentially, these breakthroughs include built-in microprocessors capable of generating cryptographic transactions (e.g.,Jelectronic blinded signatures, digital pseudonyms, and digital credentials), developments toward a single electronic card offering multi-access to services such as transport, telecommunications, health, financial, and entertainment (Universal Access Services), and incorporation of personal identification technologies such as voice, eye, or skin pattern recognition. For example, by using electronic representatives or cryptographic blinded signatures, a smart card can be used for multi transactions across different organizations and under different generated pseudonyms. These pseudonyms are capable of recognizing an individual unambiguously, while none of her records can be linked [1]. Moreover, tamper-proof electronic observers would make smart cards a very attractive technology for high-security based applications, such as those in the health care field. New trends in smart card technology offer excellent privacy and confidentiality safeguards. Therefore, smart cards constitute a promising technology for the health sector in Australia and other countries around the world in their pursuit of technology to support the delivery of quality care services. This paper addresses the main issues and the key design criteria which may be of strategic importance to the success of future smart card technology in the health care sector.

  3. Smart Card sebagai Pengaman Sepeda Motor Berbasis Mikrokontroler

    OpenAIRE

    Yohanes Chrisostomus Purba; Antonius Wibowo

    2010-01-01

    Pengaman sepeda motor yang berbentuk smart card terdiri dari bagian yang memuat chip EEPROM dan bagian pengaman smart card. Pembacaan smart card didesain dan ditempatkan pada sepeda motor. Untuk pembacaan data chip SLE 4442, dan pembacaan data pengaman smart card digunakan mikrokontroler AT89S51. Untuk pengaturan aktif maupun tidak aktifnya CDI, dan starter juga digunakan mikrokontroler AT89S51. Sistem pengaman sepeda motor akan menjadi aktif bila sepeda motor dalam keadaan mati. Smart car...

  4. Studi Perkembangan Pasar Smart Card Indonesia Pada Sektor Perbankan

    OpenAIRE

    Onny Rafizan

    2017-01-01

    Smart card merupakan salah satu teknologi yang sudah banyak digunakan di Indonesia di berbagai sektor. Dari sisi teknologi, industri dalam negeri sebenarnya sudah mampu memproduksi smart card, sehingga industri ini sangat potensial untuk dikembangkan menuju kemandirian. Penelitian ini dilakukan sebagai bagian dalam USAha pemerintah untuk mendorong perkembangan industri smart card dalam negeri, dengan tujuan memberikan gambaran kondisi pasar smart card di Indonesia saat ini. Pengumpulan data p...

  5. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  6. An overview of smart card technology and markets

    OpenAIRE

    Mark Furletti

    2002-01-01

    As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...

  7. On Cyclic Plans for Scheduling a Smart Card Personalisation System

    NARCIS (Netherlands)

    Nieberg, T.

    An industrial case study for scheduling the personalisation of smart cards is presented and analysed. Smart cards are personalised in several machines that are served by an underlying conveyor belt connecting these. As there are usually a very high number of smart cards to be personalised, the focus

  8. 'Smart card' speeds triage, boosts safety.

    Science.gov (United States)

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.

  9. Design and implementation of a smart card based billing system for ...

    African Journals Online (AJOL)

    A smart card based billing system for petroleum dispenser is just one of the many ways in which smart cards can be employed to make commerce efficient. It incorporates the use of smart card as its legal tender and a smart card reader embedded into the filling station dispenser design. The smart card reader processes the ...

  10. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  11. Patient health record on a smart card.

    Science.gov (United States)

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  12. WWW + smart card: towards a mobile health care management system.

    Science.gov (United States)

    Chan, A T

    2000-07-01

    This paper highlights the benefits of combining the World Wide Web and smart card technologies to support a highly mobile health management framework. In particular, we describe an approach using the SmartCard-Web Gateway Interface (SGI) as a common interface to communicate and access the medical records residing in a smart card. Importantly, by employing HTTP as the baseline protocol to access information on the smart card, SGI promotes the use of de facto standard web browsers as the common client user interface. The initial implementation of the framework has demonstrated the feasibility of the concept in facilitating a truly mobile access of patient's medical records based on SGI.

  13. Australian healthcare: a smart card for a clever country.

    Science.gov (United States)

    Morris, S; Cooper, J; Bomba, D; Brankovic, L; Miller, M; Pacheco, F

    1995-10-01

    In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone may contain the cardholders name and address. Access to the different zones depends on the level of security of the zone. The higher the security level the more restrictive the access method. Were smart cards adopted for the storage of medical histories it would change the form of medical information recorded, not merely convert paper files to electronic ones. Storage of an individual's medical history on a smart card raises important privacy issues. These privacy issues are discussed particularly as they relate to the Australian community.

  14. Towards testability in smart card operating system design

    NARCIS (Netherlands)

    Hartel, Pieter H.; Cordonnier, V.; de Jong, Eduard K.; Quisquater, J.J.

    1994-01-01

    The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the

  15. Designing minimum data sets of health smart card system

    OpenAIRE

    Mohtaram Nematollahi

    2014-01-01

    Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s ...

  16. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  17. Sample Development on Java Smart-Card Electronic Wallet Application

    OpenAIRE

    Toma Cristian

    2009-01-01

    In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet ...

  18. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  19. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  20. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  1. SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

    Directory of Open Access Journals (Sweden)

    _ Sukamto

    2012-01-01

    Full Text Available Dalam penelitian ini, system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data Tujuan dari penelitian ini adalah menerapkan teknologi smart card sebagai sarana atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas yang tinggi, sehingga meningkatkan jaminan ketersediaan data pada sebuah sistem rekam medik.Tahapan pembuatan rancang bangun sistem rekam medis ini meliputi perancangan data flow diagram, rentity relationshipp diagram, database dan program aplikasi. Hasil dari penelitian ini menunjukan bahwa smart card dapat digunakan sebagai sarana atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas yang tinggi.

  2. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  3. Ridership impacts of South Florida's EASY smart card : [summary].

    Science.gov (United States)

    2013-07-01

    Transit agencies across the U.S. increasingly are replacing electronic fare reading systems with Advanced Fare Collection (AFC) or smart card systems. In 2009, Miami-Dade Transit (MDT) was the first Florida transit agency to deploy AFC, branded...

  4. Developing efficient blinded attribute certificates on smart cards via pairings

    NARCIS (Netherlands)

    Batina, L.; Hoepman, J.H.; Jacobs, B.; Mostowski, W.; Vullers, P.

    2010-01-01

    This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified

  5. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  6. Improving computer security by health smart card.

    Science.gov (United States)

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  7. SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

    Directory of Open Access Journals (Sweden)

    _ Sukamto

    2013-04-01

    Full Text Available Dalam penelitian ini,  system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data  Tujuan dari penelitian ini adalah  menerapkan teknologi smart card sebagai sarana  atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas  yang tinggi, sehingga meningkatkan jaminan ketersediaan data pada sebuah sistem rekam medik.Tahapan pembuatan rancang bangun sistem rekam medis ini meliputi  perancangan data flow diagram, rentity relationshipp diagram, database dan program aplikasi. Hasil dari penelitian ini menunjukan bahwa smart  card dapat digunakan  sebagai sarana  atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas  yang tinggi.

  8. An Improvement on Remote User Authentication Schemes Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2018-01-01

    Full Text Available In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.

  9. Identification of Clusters in Travel Patterns using Smart Card Data

    DEFF Research Database (Denmark)

    Reinau, Kristian Hegner; Harder, Henrik

    2016-01-01

    This article is the first contribution, which explores the potential of smart card data in relation to optimization of public transport in a peripheral monocentric region. A modularity analysis is made using smart card data collected in Northern Jutland in Marts and July 2014, and the analysis...... reveals first, that smart card data can be used to identify clusters within flows of public transport passengers in a peripheral region. Second, that the presence of such clusters suggest that public transport should be planned to give the users the possibility of travelling with good connectivity...... and easiness within these clusters. Third, the presence of such clusters in peripheral areas of the monocentric region suggest, that the overall current focus in public transport planning on transport possibilities to and from the central city in monocentric regions is questionable....

  10. Clinical information system based on the medical smart card.

    Science.gov (United States)

    Danon, Y L; Saiag, E

    2000-07-01

    Over the last 5 years Israel has implemented a nationwide health insurance plan covering the entire population of the country. We have developed a clinical information system based on electronic-chip health care medical smart cards. Health care cards are used in several European countries and chip smart cards have been successful in many sectors. Our project involves the community use of the MSC, thereby enabling health care professionals to skillfully employ card systems in the health care sector. This system can easily arrange electronic medical charts in clinics, facilitating the confidential sharing of personal health databases among health professionals. To develop an MSC applicable for daily use in the community and hospital system. The MSC project, currently underway in Israel and the USA, will aid in determining the costs, benefits and feasibility of the MSC. Successful implementation of the MSC in chosen clinics will promote a nationwide willingness to adopt this promising technology.

  11. Smart Card Based Integrated Electronic Health Record System For Clinical Practice

    OpenAIRE

    N. Anju Latha; B. Rama Murthy; U. Sunitha

    2012-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Smart cards are used as a Electronic Health Record (EHR) Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in hospitals. In this paper, a smart card based Integrated Electronic health Reco...

  12. Real Electronic Commerce: Smart Cards on the Superhighway.

    Science.gov (United States)

    Birch, David

    1997-01-01

    Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…

  13. Deduction of passengers' route choice from smart card data

    NARCIS (Netherlands)

    Van Der Hurk, Evelien; Kroon, Leo; Maroti, Gabor; Vervest, Peter

    2013-01-01

    Deducing passengers' route choice from smart card data provides public transport operators the opportunity to evaluate passenger service. Especially in case of disruptions when route choice models may not be valid this is an advantage. This paper proposes a method for deducing the chosen route of

  14. Deduction of passengers' route choices from smart card data

    NARCIS (Netherlands)

    van der Hurk, E.; Kroon, L.G.; Maroti, G.; Vervest, P.

    2015-01-01

    Deducing passengers' route choices from smart card data provides public transport operators the opportunity to evaluate and improve their passenger service. Particularly in the case of disruptions, when traditional route choice models may not be valid, this is an advantage. This paper proposes a

  15. Pressure Sequence - A Novel Method of Protecting Smart Cards

    NARCIS (Netherlands)

    Hartel, Pieter H.; Henderson, N.J.; Domingo-Ferrer, J; Chan, D.; Watson, A.

    If someone knocks on your door, the chances are that you can tell by the sound who it is. This simple idea is the basis of our pressure sequence method, which records the signal arising from a user tapping on a smart card. We have built a prototype, piezoelectric, screen printed pressure sensor on a

  16. Applying Formal Methods to the Design of Smart Card Software

    NARCIS (Netherlands)

    Butler, Michael; Hartel, Pieter H.; Longley, Mark; de Jong, Eduard

    1997-01-01

    The goal of this work is the design of a language for the implementation of smart card applications, specifically an operating system, as high integrity software. The integrity of a piece of software is demonstrated by proving various properties of the software. The language must therefore exclude

  17. Deriving Schedules for a Smart Card Personalisation System

    NARCIS (Netherlands)

    Mader, Angelika H.

    We report on an industrial case study on the synthesis of (close) optimal schedules for a smart card personalisation system. The basic technique used is model checking. In most cases, the pure model checking approach has to be enriched by other techniques to fight the state space explosion. Other

  18. SC2: Secure Communication over Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Papini, Davide

    2012-01-01

    The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the c...

  19. A security review of proximity identification based smart cards

    CSIR Research Space (South Africa)

    Lefophane, S

    2015-03-01

    Full Text Available International Conference on Cyber warfare and Security, Mpumalanga, Kruger National Park, South Africa, 24-25 March 2015 A SECURITY REVIEW OF PROXIMITY IDENTIFICATION BASED SMART CARDS S.Lefophane, J. Van der Merwe Modelling and Digital Science: CSIR...

  20. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  1. UTILIZAÇÃO DE JAVA CARD COMO PLATAFORMA PARA O DESENVOLVIMENTO DE APLICAÇÕES EM SMART CARD.

    Directory of Open Access Journals (Sweden)

    Lucas Plis Dolce

    2011-12-01

    Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.

  2. BİYOMETRIC FINGER PRINT USED AND APPLIED ON SMART CARD

    Directory of Open Access Journals (Sweden)

    Makbule KARAKÜLAH

    2004-04-01

    Full Text Available During the last years, the authors are trying to integrate biometrics, inside a smart card. In this study the first step, as in every biometric system is to obtain an image of the user's fingerprint. After this, a preprocessing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae. The minutiae are ridges and valleys of the fingerprint. We researched these minutiae which are used with smart cards. A lot of smart card readers /writers were used for data writing and reading. Fingerprint minutiae and identify information were wrote on smart cards successfully using development kits (smart cards of fingerprint and so were identified.

  3. Telematics and smart cards in integrated health information system.

    Science.gov (United States)

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole

  4. CQL: a database in smart card for health care applications.

    Science.gov (United States)

    Paradinas, P C; Dufresnes, E; Vandewalle, J J

    1995-01-01

    The CQL-Card is the first smart card in the world to use Database Management Systems (DBMS) concepts. The CQL-Card is particularly suited to a portable file in health applications where the information is required by many different partners, such as health insurance organizations, emergency services, and General Practitioners. All the information required by these different partners can be shared with independent security mechanisms. Database engine functions are carried out by the card, which manages tables, views, and dictionaries. Medical Information is stored in tables and views are logical and dynamic subsets of tables. For owner-partners like MIS (Medical Information System), it is possible to grant privileges (select, insert, update, and delete on table or view) to other partners. Furthermore, dictionaries are structures that contain requested descriptions and which allow adaptation to computer environments. Health information held in the CQL-Card is accessed using CQL (Card Query Language), a high level database query language which is a subset of the standard SQL (Structured Query Language). With this language, CQL-Card can be easily integrated into Medical Information Systems.

  5. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  6. Supporting Software Evolution for Open Smart Cards by Security-by-Contract

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gadyatskya, Olga; Massacci, Fabio

    2011-01-01

    Open multi-application smart cards that allow post-issuance evolution (i.e. loading of new applets) are potentially very attractive for both smart card developers and card users. Yet we find only few of them on the market as no satisfactory solution exists for the assurance that these coming...

  7. DIABCARD a smart card for patients with chronic diseases.

    Science.gov (United States)

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  8. Design and implementation of a smart card based healthcare information system.

    Science.gov (United States)

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  9. Prevention of Information Leakage by Photo-Coupling in Smart Card

    Science.gov (United States)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  10. The suggested system for health insurance Application based on Smart Cards

    OpenAIRE

    Esam Mohamed El Gohary; Mohamed El-Sayed Waheed

    2013-01-01

    This paper concentrates on designing a system for Health insurance using smart card technology .The system is called HISS (Health insurance system using smart card).As we will see the system is web based application based on central database ,uses smart card for two reasons first, as a data carrier for patient and professionals. Second reason is for authentication purposes. There are some figures that describe system architecture and processes then each component well be explained.

  11. Evaluation of an Electronic Smart-Card Based School Absenteeism Surveillance System

    OpenAIRE

    So, HC; Lam, CK; Tam, YH; Cowling, BJ; Leung, GM; Lau, EHY; Ip, DKM

    2014-01-01

    We evaluated the performance of an electronic smart-card based school absenteeism surveillance system which was initiated in 2008 in Hong Kong. The result demonstrated the feasibility and potential benefit of employing electronic school absenteeism data as captured automatically by a smart card system as an alternative data stream for monitoring influenza activities, and flexibility in establishing surveillance for emerging diseases. The increasing popularity of usage of smart card technology...

  12. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  13. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity.../or characteristics of some thing ? This thing can be anything, however in the context of this discussion, this thing could be a person, a network device, or even an identity authentication device itself ? This act or process of verifying these attributes could...

  14. Patient exposure tracking: the IAEA smart card project.

    Science.gov (United States)

    Rehani, Madan M; Frush, Donald P

    2011-09-01

    The existing approach of radiation protection is largely based on the collective dose to the population with provisions for protection at an individual level through justification and optimisation. With the individual patient dose now exceeding the life-long occupational dose to a worker in a typical radiology practice, there is a need to establish approaches based on the protection of an individual patient. Radiation exposure tracking seems a way forward in this respect. Technological advances in recent years have provided opportunities for tracking to becoming a reality. The IAEA project on Smart Card/SmartRadTrack is described in this paper. The tracking is now a reality in a few dozen centres in many countries connected by picture archiving and communication systems, and there is hope that this will extend to cover other countries and continents.

  15. Patient exposure tracking: The IAEA smart card project

    International Nuclear Information System (INIS)

    Rehani, M. M.; Frush, D. P.

    2011-01-01

    The existing approach of radiation protection is largely based on the collective dose to the population with provisions for protection at an individual level through justification and optimisation. With the individual patient dose now exceeding the life-long occupational dose to a worker in a typical radiology practice, there is a need to establish approaches based on the protection of an individual patient. Radiation exposure tracking seems a way forward in this respect. Technological advances in recent years have provided opportunities for tracking to becoming a reality. The IAEA project on Smart Card/SmartRadTrack is described in this paper. The tracking is now a reality in a few dozen centres in many countries connected by picture archiving and communication systems, and there is hope that this will extend to cover other countries and continents. (authors)

  16. An advanced mutual-authentication algorithm using 3DES for smart card systems

    CSIR Research Space (South Africa)

    Tsague, HD

    2012-11-01

    Full Text Available One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core feature...

  17. Using Formal Methods to Cultivate Trust in Smart Card Operating Systems

    NARCIS (Netherlands)

    Alberda, Marjan I.; Hartel, Pieter H.; de Jong, Eduard K.

    To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards contain relatively simple computers, and are used only for a specific class of applications, it is feasible to make the language used to program the software components focused and tiny. Formal

  18. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  19. Selecting e-Purse Smart Card Technology via Fuzzy AHP and ANP

    Directory of Open Access Journals (Sweden)

    Nurgül Demirtaş

    2014-01-01

    Full Text Available Developments in the information technologies provide important advantages to consumers and companies. Nowadays, smart card technology starts to use e-purse applications. The aim of this paper is to identify the most important decision criteria to select the best card technology. In this study, at first smart card and multiple selection techniques were explained. Then the best card technology was selected for an e-purse application. The three types of card technologies were examined and the most important criteria were taken into account by the software developer while they develop card software. Fuzzy analytic hierarchy process (FAHP and analytical network process (ANP techniques were used to compare smart card technologies.

  20. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  1. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  2. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  3. Protecting Digital Evidence Integrity by Using Smart Cards

    Science.gov (United States)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  4. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  5. The impacts of smart cards on hospital information systems--an investigation of the first phase of the national health insurance smart card project in Taiwan.

    Science.gov (United States)

    Liu, Chien-Tsai; Yang, Pei-Tun; Yeh, Yu-Ting; Wang, Bin-Long

    2006-02-01

    To investigate the impacts of the first phase of Taiwan's Bureau of National Health Insurance (TBNHI) smart card project on existing hospital information systems. TBNHI has launched a nationwide project for replacement of its paper-based health insurance cards by smart cards (or NHI-IC cards) since November 1999. The NHI-IC cards have been used since 1 July 2003, and they have fully replaced the paper-based cards since 1 January 2004. Hospitals must support the cards in order to provide medical services for insured patients. We made a comprehensive study of the current phase of the NHI-IC card system, and conducted a questionnaire survey (from 1 October to 30 November, 2003) to investigate the impacts of NHI-IC cards on the existing hospital information systems. A questionnaire was distributed by mail to 479 hospitals, including 23 medical centers, 71 regional hospitals, and 355 district hospitals. The returned questionnaires were also collected by prepaid mail. The questionnaire return rates of the medical centers, regional hospitals and district hospitals were 39.1, 29.6 and 20.9%, respectively. In phase 1 of the project, the average number of card readers purchased per medical center, regional hospital, and district hospital were 202, 45 and 10, respectively. The average person-days for the enhancement of existing information systems of a medical center, regional hospital and district hospital were 175, 74 and 58, respectively. Three months after using the NHI-IC cards most hospitals (60.6%) experienced prolonged service time for their patients due to more interruptions caused mainly by: (1) impairment of the NHI-IC cards (31.2%), (2) failure in authentication of the SAMs (17.0%), (3) malfunction in card readers (15.3%) and (4) problems with interfaces between the card readers and hospital information systems (15.8%). The overall hospital satisfaction on the 5-point Likert scale was 2.86. Although most hospitals were OK with the project, there was about 22

  6. Extended applications with smart cards for integration of health care and health insurance services.

    Science.gov (United States)

    Sucholotiuc, M; Stefan, L; Dobre, I; Teseleanu, M

    2000-01-01

    In 1999 in Romania has initiated the reformation of the national health care system based on health insurance. In 1998 we analyzed this system from the point of view of its IT support and we studied methods of optimisation with relational, distributed databases and new technologies such as Our objectives were to make a model of the information and services flow in a modern health insurance system, to study the smart card technology and to demonstrate how smart card can improve health care services. The paper presents only the smart cards implementations.

  7. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  8. Comparison of the performance and security of free and open source smart card offcard APIs

    CSIR Research Space (South Africa)

    Chifura, A

    2008-09-01

    Full Text Available . Off card APIs provide a framework for this by providing interfaces that can be implemented to enhance the communication. This study looks at the performance and security comparisons of several free and open source smart card offcard APIs...

  9. Using smart card technology to prevent sales of alcohol to underage persons

    Science.gov (United States)

    2001-07-01

    This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...

  10. Managing medical and insurance information through a smart-card-based information system.

    Science.gov (United States)

    Lambrinoudakis, C; Gritzalis, S

    2000-08-01

    The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.

  11. Adoption of smart cards in the medical sector: the Canadian experience.

    Science.gov (United States)

    Auber, B A; Hamel, G

    2001-10-01

    This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.

  12. Rancang Bangun Sistem Pilkades Menggunakan Teknologi Smart Card Sebagai Kartu Pemilih

    Directory of Open Access Journals (Sweden)

    I Putu Indra Permana

    2016-08-01

    Full Text Available Pemilihan Kepala Desa (Pilkades merupakan proses yang tidak terpisahkan dari Negara Indonesia sebagai negara demokrasi. Pilkades saat ini masih menggunakan sistem pemungutan suara (voting secara konvensional, menggunakan media kertas untuk melakukan proses pemilihan. Pelaksanaan sistem voting konvensional tersebut mempunyai banyak kelemahan seperti menghitung hasil voting relatif lebih lama dan menggunakan perhitungan manual. Perkembangan dan kemajuan teknologi informasi saat ini dapat dimanfaatkan untuk mendukung pelaksanaan voting Pilkades secara lebih baik yang menjadi solusi cerdas akan kemajuan teknologi yang dapat menggantikan sistem voting konvensional, yaitu dengan media sistem elektronik voting (e-voting menggunakan teknologi smart card sebagai kartu pemilih. Sistem dikemas dalam bentuk aplikasi yang dipasang/di-install pada komputer dan reader/writer tools sebagai media untuk membaca/menulis pada smart card. Sistem e-voting Pilkades dengan teknologi smart card telah berhasil dijalankan dan menghasilkan dashboard hasil voting Pilkades dengan menunjukkan jumlah voting dalam bentuk angka, persentase (%, grafik dan diagram.

  13. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  14. Smart Card Data Mining of Public Transport Destination: A Literature Review

    Directory of Open Access Journals (Sweden)

    Tian Li

    2018-01-01

    Full Text Available Smart card data is increasingly used to investigate passenger behavior and the demand characteristics of public transport. The destination estimation of public transport is one of the major concerns for the implementation of smart card data. In recent years, numerous studies concerning destination estimation have been carried out—most automatic fare collection (AFC systems only record boarding information but not passenger alighting information. This study provides a comprehensive review of the practice of using smart card data for destination estimation. The results show that the land use factor is not discussed in more than three quarters of papers and sensitivity analysis is not applied in two thirds of papers. In addition, the results are not validated in half the relevant studies. In the future, more research should be done to improve the current model, such as considering additional factors or making sensitivity analysis of parameters as well as validating the results with multi-source data and new methods.

  15. Chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  16. Interoperable computerized smart card based system for health insurance and health services applied in cardiology.

    Science.gov (United States)

    Cocei, Horia-Delatebea; Stefan, Livia; Dobre, Ioana; Croitoriu, Mihai; Sinescu, Crina; Ovricenco, Eduard

    2002-01-01

    In 1999 Romania started its health care reform by promulgating the Health Insurance Law. A functional and efficient health care system needs procedures for monitoring and evaluation of the medical services, communication between different service providers and entities involved in the system, integration and availability of the information. The final goal is a good response to the needs and demands of the patients and of the real life. For this project we took into account, on one hand, the immediate need for computerized systems for the health care providers and, on the other hand, the large number of trials and experiments with health smart cards across Europe. Our project will implement a management system based on electronic patient records to be used in all cardiology clinics and will experiment the health smart cards, will promote and demonstrate the capabilities of the smart card technology. We focused our attention towards a specific and also critical category of patients, those with heart diseases, and also towards a critical sector of the health care system--the emergency care. The patient card was tested on a number of 150 patients at a cardiology clinic in Bucharest. This was the first trial of a health smart card in Romania.

  17. Can a patient smart card improve decision making in a clinical setting?.

    Science.gov (United States)

    Bérubé, J; Papillon, M J; Lavoie, G; Durant, P; Fortin, J P

    1995-01-01

    In the health field, clinical information is the raw material for the clinician delivering health services. Therefore, the clinical information available to the physician is often incomplete or even non¿existent upon consultation. Furthermore, the reconstruction of the medical history, which is the most important source of data for the clinician to establish a diagnosis and initiate a treatment, suffers from many constraints. The smart card, like the one used in Quebec's project, could ease the physician's decision-making by allowing fast access to accurate and pertinent data. The smart card is a major asset in the present health system.

  18. STANDARDIZATION AND APPLICATION OF PLASTIC CARDS IN THE EDUCATIONAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Polina V. Baranova

    2015-01-01

    Full Text Available The application of plastic cards has been widely increasing in various fields of life, business and education. They have already become up-to-date and convenient attribute of our daily life. There are emerging more and more areas where they can be used in a convenient and practical way. Contactless smart cards can be used in access control in the educational systems. This article gives an overview of existing standards dealing with contactless identification smart-cards. All standards covered in this article are developed by the Federal State Unitary Enterprise VNIINMASH jointly with TC 22 «Information Technology» based on their own authentic Russian translation of international standards. 

  19. Aplikasi Pembayaran Jalan Tol Dengan Smart Card Menggunakan Algoritma Enkripsi Idea Dan 3Des: Studi Kasus Pada PT.Citra Marga Nusaphala Persada

    OpenAIRE

    Elidjen, Elidjen; Budianto, Hendy; Yohanes, Lilyawati; Nugroho, Novianto Wibowo

    2004-01-01

    Salah satu USAha pemerintah untuk mengatasi kemacetan adalah dengan membuatjalan tol, namun cara ini kurang efektif karena kemacetan masih terjadi akibat antrian yangpanjang pada gerbang tol. Oleh sebab itu, penulis berusaha mencari solusi untuk membuatsistem baru yaitu dengan penggunaan smart card. Penggunaan smart card yang memilikitingkat integritas, reliabilitas, dan keamanan yang tinggi diharapkan dapat dijadikan solusiuntuk memecahkan semua masalah tersebut. Dalam penggunaan smart card ...

  20. Aplikasi Pembayaran Jalan Tol dengan Smart Card Menggunakan Algoritma Enkripsi Idea dan 3Des: Studi Kasus pada PT.Citra Marga Nusaphala Persada

    OpenAIRE

    Elidjen, Elidjen; Budianto, Hendy; Yohanes, Lilyawati; Nugroho, Novianto Wibowo

    2009-01-01

    Salah satu usaha pemerintah untuk mengatasi kemacetan adalah dengan membuatjalan tol, namun cara ini kurang efektif karena kemacetan masih terjadi akibat antrian yangpanjang pada gerbang tol. Oleh sebab itu, penulis berusaha mencari solusi untuk membuatsistem baru yaitu dengan penggunaan smart card. Penggunaan smart card yang memilikitingkat integritas, reliabilitas, dan keamanan yang tinggi diharapkan dapat dijadikan solusiuntuk memecahkan semua masalah tersebut. Dalam penggunaan smart card ...

  1. A Proposed Solution for Managing Doctor's Smart Cards in Hospitals Using a Single Sign-On Central Architecture

    OpenAIRE

    Mauro, Christian;Sunyaev, Ali;Leimeister, Jan Marco;Schweiger, Andreas;Krcmar, Helmut

    2014-01-01

    This paper describes a single sign-on solution for the central management of health care provider?s smart cards in hospitals. The proposed approach which is expected to be an improvement over current methods is made possible through the introduction of a national healthcare telematics infrastructure in Germany where every physician and every patient will automatically be given an electronic health smart card (for patients) and a corresponding health professional card (for health care provider...

  2. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    Science.gov (United States)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  3. Crowding Valuation in Urban Tram and Bus Transportation based on Smart Card Data

    NARCIS (Netherlands)

    Yap, M.D.; Cats, O.; Yu, S; van Arem, B.

    2017-01-01

    Crowding in public transport can be of major influence on passengers’ travel experience and therefore affect route and mode choice. Therefore, it is important to understand how crowding in urban public transport is perceived by passengers. The availability of individual smart card transactions

  4. Short-Term Prediction of Ridership on Public Transport with Smart Card Data

    NARCIS (Netherlands)

    van Oort, N.; Brands, Ties; de Romph, E.

    2015-01-01

    Public transport operators are collecting massive amounts of data from smart card systems. In the Netherlands, every passenger checks in and checks out; this system creates detailed records of demand patterns. In buses and trams, users check in and check out in the vehicle; this factor provides good

  5. A Proposed Smart-Card Solution for Australian Health Services: The Problems Encountered

    OpenAIRE

    Danielle Fowler; Paul Swatman; Tanya Castleman

    2004-01-01

    This case study describes the experience of a state government health department in evaluating the use of smart card technology to redesign health benefits programs for the disabled in Australia. The social and political context of the system is explained in detail, and the potential benefits and risks accruing to the government, health care intermediaries and the community are examined.

  6. Factoring RSA keys from certified smart cards : Coppersmith in the wild

    NARCIS (Netherlands)

    Bernstein, D.J.; Chang, Y.A.; Cheng, C.M.; Chou, L.P.; Heninger, N.; Lange, T.; Someren, van N.

    2013-01-01

    An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by government-issued smart cards that were certified secure. The certificates had all the usual buzzwords:

  7. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    Science.gov (United States)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  8. Authenticated, private, and secured smart cards (APS-SC)

    Science.gov (United States)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  9. Constructing activity–mobility trajectories of college students based on smart card transaction data

    Directory of Open Access Journals (Sweden)

    Negin Ebadi

    2017-12-01

    Full Text Available In this research, we use UB card as a convenient source of combined smart transaction data in order to define a campus-wide model for constructing students’ activity–mobility trajectories in time–space dimension. UB Card is a student’s official ID at the University at Buffalo and is used across campus for various activities including Stampedes and Shuttles (on-campus bus system, facilities access, library services, dining, shopping, and etc. Two activity–mobility trajectory construction algorithms are developed. The base algorithm constructs students’ activity–mobility patterns in space–time dimension using a set of smart card transaction data points as the only inputs. The modified individualized algorithm constructs activity–mobility patterns with prior knowledge of students’ previous patterns as they have similar patterns for certain days of the week. A database of 37 students’ travel survey and UB card transactions that contains a period of 5 days have been used to illustrate the results of the study. Three measures of errors have been proposed to capture the time allocation, location deviation, and activity sequences. These errors present an acceptable accuracy (12–25% error ranges for activity types and average 0.04–0.16 miles of error for location predictions and show the potential of inferring activity–mobility behaviors based on smart card transaction type data sets.

  10. Health smart cards: differing perceptions of emergency department patients and staff.

    Science.gov (United States)

    Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

    2009-02-01

    An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.

  11. A study of smart card for radiation exposure history of patient.

    Science.gov (United States)

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  12. Time Delay Measurements of Key Generation Process on Smart Cards

    Science.gov (United States)

    2015-03-01

    delve into the meat of the thesis, describing a java program written to test DOD CAC cards that have ECC algorithms implemented. Test data will be...WICOM.2009.5302782 Defense Enterprise Mobility – A game changer for the Department of Defense. (2012, Jan.). , DISA: DOD Mobility Program. Retrieved

  13. An Association Rule Based Method to Integrate Metro-Public Bicycle Smart Card Data for Trip Chain Analysis

    Directory of Open Access Journals (Sweden)

    De Zhao

    2018-01-01

    Full Text Available Smart card data provide valuable insights and massive samples for enhancing the understanding of transfer behavior between metro and public bicycle. However, smart cards for metro and public bicycle are often issued and managed by independent companies and this results in the same commuter having different identity tags in the metro and public bicycle smart card systems. The primary objective of this study is to develop a data fusion methodology for matching metro and public bicycle smart cards for the same commuter using historical smart card data. A novel method with association rules to match the data derived from the two systems is proposed and validation was performed. The results showed that our proposed method successfully matched 573 pairs of smart cards with an accuracy of 100%. We also validated the association rules method through visualization of individual metro and public bicycle trips. Based on the matched cards, interesting findings of metro-bicycle transfer have been derived, including the spatial pattern of the public bicycle as first/last mile solution as well as the duration of a metro trip chain.

  14. Laboratory skinpatches and smart cards based on foils.

    Science.gov (United States)

    Ruano-López, Jesús M; Laouenan, Florian; Agirregabiria, Maria; Rodriguez, Sonia; Krüger, Jan; Flavin, Diarmuid

    2011-01-01

    This paper presents: (i) a hand held system consisting of a portable platform and disposable polymeric Lab-on-a-card capable of performing a nucleic acid concentration, amplification and detection with reagents inside; and a (ii) wearable diagnostic Lab-on-a-Paper skinpatch system, capable of performing in-situ sweat sampling, analyte pre-concentration, and immunoassay analysis. The skinpatch works in conjunction with a hand-held optoelectronic reader / micro PC fluorescence analysis interface.

  15. SMART INTERFACE: FERRAMENTA DE AUXÍLIO AO DESENVOLVIMENTO DE APLICAÇÕES JAVA CARD

    Directory of Open Access Journals (Sweden)

    Leonardo Ataíde Minora

    2008-05-01

    Full Text Available Com a evolução da tecnologia de microprocessadores, hoje é possível colocar um minúsculo chip em um cartão de plástico, nas dimensões de um cartão de crédito convencional. Chip este com capacidade de armazenamento de informação e processamento. Esse tipo de cartão é chamado de Smart Card. É possível desenvolver aplicações para esses cartões utilizando um subconjunto da plataforma Java – Java Card. O subconjunto da plataforma Java para o desenvolvimento de aplicações próprias para executar em Smart Cards é bastante limitado, em virtude das limitações do hardware envolvido. O desenvolvimento deste tipo de aplicação implica invariavelmente em se trabalhar no nível de bytes, pois toda a comunicação com o cartão acontece através de APDUs (Applicaion Protocol Data Unit montadas como uma sequência de bytes. Para auxiliar nesse trabalho, foi desenvolvido o SMART SHELL: ferramenta, modo texto, que interpreta comandos para a interação com a aplicação gerente do cartão – card manager. Os objetivos deste trabalho são: aperfeiçoar as funcionalidades do SMART SHELL e desenvolver uma interface gráfica para o mesmo, denominada de SMART INTERFACE. A aplicação em questão visa oferecer ao desenvolvedor de aplicações Java Card um mecanismo simples e ágil para a realização de atividades comuns de manipulação de um cartão, tais como: (1 realizar o processo de autenticação para operar com o card manager, (2 listar as aplicações – applets Java Card – instalados em um cartão, (3 preparar uma aplicação para ser instalada em um cartão, (4 instalação de uma aplicação no cartão, (5 remoção de uma aplicação instalada no cartão, entre outras. Para a realização do trabalho serão seguida a seguinte metodologia: levantamento bibliográfico sobre o tema; definição dos aperfeiçoamentos necessários ao SMART SHELL; implementação dos aperfeiçoamentos propostos; e implementação da interface gr

  16. The Internet and healthcare in Taiwan: value-added applications on the medical network in the National Health Insurance smart card system.

    Science.gov (United States)

    Tsai, Wen-Hsien; Kuo, Hsiao-Chiao

    2007-01-01

    The introduction of smart card technology has ushered in a new era of electronic medical information systems. Taiwan's Bureau of National Health Insurance (BNHI) implemented the National Health Insurance (NHI) smart card project in 2004. The purpose of the project was to replace all paper cards with one smart card. The NHI medical network now provides three kinds of services. In this paper, we illustrate the status of the NHI smart card system in Taiwan and propose three kinds of value-added applications for the medical network, which are electronic exchange of medical information, retrieval of personal medical records and medical e-learning for future development of health information systems.

  17. The Danish Rejsekortet (Smart Card for Public Transportation); Project Governance for Failure or Success?

    DEFF Research Database (Denmark)

    Harboe, Peter Georg; Riis, Eva

    The authors examine a project regarded as a major failure in Danish public investments: The Smart Card for Public Transportation whose introduction was delayed for 9 years with an estimated cost overrun of 125 million EURO. After 3 years of operation, the Smart Card system only covers seven...... of the nine Danish regions and the discussion about giving up the system is continuing. The authors explore the overall conditions set up for these types of projects in the project governance - how project governance conditions a major public IT project and forms the success evaluation. The focus...... is on the whole cycle from project initiation to long-term use of the project results. Data collection is through documentation as governmental reports and evaluations, for example (Rigsrevisionen, 2011; The Comptroller and Auditor General, 2006; Transport Committee, 2011)and semi-structured interviews...

  18. The Danish Rejsekortet ( Smart Card for Public Transportation ): Project Governance for Failure or Success ?

    DEFF Research Database (Denmark)

    Harboe, Peter Georg; Riis, Eva

    The authors examine a project regarded as a major failure in Danish public investments: The Smart Card for Public Transportation whose introduction was delayed for 9 years with an estimated cost overrun of 125 million EURO. After 3 years of operation, the Smart Card system only covers seven...... of the nine Danish regions and the discussion about giving up the system is continuing. The authors explore the overall conditions set up for these types of projects in the project governance - how project governance conditions a major public IT project and forms the success evaluation. The focus...... is on the whole cycle from project initiation to long-term use of the project results. Data collection is through documentation as governmental reports and evaluations, for example (Rigsrevisionen, 2011; The Comptroller and Auditor General, 2006; Transport Committee, 2011)and semi-structured interviews...

  19. Slovene smart card and IP based health-care information system infrastructure.

    Science.gov (United States)

    Trcek, D; Novak, R; Kandus, G; Suselj, M

    2001-04-01

    Slovenia initiated a nation-wide project to introduce smart cards in the health sector in 1995 and its full-scale deployment started in September 2000. Although the basic aim of the project was to support insurance related procedures, the system was designed in a flexible and open manner to present an infrastructure for the whole health sector. The functionality of the current system is described in this paper along with lessons learned so far. The upgrade of the system is outlined, with emphasis on technical details, the objective being to provide a real-time EDI based environment for a general set of applications in the medical sector, supported by the flexibility and security of modern smart card technologies. Integration with similar systems in other EU countries is discussed.

  20. Electronic Tickets, Smart Cards, and Online Prepayments: When and How to Advance Sell

    OpenAIRE

    Jinhong Xie; Steven M. Shugan

    2001-01-01

    Advance selling occurs when sellers allow buyers to purchase at a time preceding consumption (Shugan and Xie 2000). Electronic tickets, smart cards, online prepayments, and other technological advances make advance selling possible for many, if not all, service providers. These technologies lower the cost of making complex transactions at a greater distance from the seller's site. They also give sellers more control over advance selling by decreasing arbitrage. As technology enhances the capa...

  1. An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

    OpenAIRE

    Pathan, Al-Sakib Khan; Hong, Choong Seon

    2007-01-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...

  2. JPEG2000 vs. full frame wavelet packet compression for smart card medical records.

    Science.gov (United States)

    Leehan, Joaquín Azpirox; Lerallut, Jean-Francois

    2006-01-01

    This paper describes a comparison among different compression methods to be used in the context of electronic health records in the newer version of "smart cards". The JPEG2000 standard is compared to a full-frame wavelet packet compression method at high (33:1 and 50:1) compression rates. Results show that the full-frame method outperforms the JPEG2K standard qualitatively and quantitatively.

  3. Security Analysis of a Remote User Authentication Scheme with Smart Cards

    OpenAIRE

    Kumar, Manoj

    2007-01-01

    Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen scheme. This paper reviews Yoon et al. scheme and then proves that the password change phase of Yoon et al. scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.

  4. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  5. A smart-card-enabled privacy preserving E-prescription system.

    Science.gov (United States)

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  6. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  7. An Efficient Authentication Method For Smart Card Verification In Online

    Directory of Open Access Journals (Sweden)

    Kanamarlapudi Venkata Srinivasa Rao

    2017-08-01

    Full Text Available The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and managing here we have tendency to are presenting the three level confirmations. In arranged approach there are two stages i.e. Enlistment and login. All through enlistment part control the word which can figure and separated into two segments i.e. parcel one can keep inside the client or customer viewpoint, segment a couple of can keep in server perspective. Next level is to exchange the client icon which can figure and split into two shares each are keep severally. In the end zero information code will be get refreshed and it’s furthermore get keep as two components. All through the login part before starting the managing the client and server ought to uncover their three-genuine data offers if each stacked data got coordinate then the client is legitimate and server isn’t a phishing site.

  8. The effect of Health smart cards for Quality Health care services ( doctor martyr Beheshti medical research center in Qom

    Directory of Open Access Journals (Sweden)

    Saeed zarandi

    2016-03-01

    Full Text Available The main objective of this study was to investigate the effect of the use health smart card on the aspects quality of healthcare services in doctor martyr beheshti medical research center in qom . With regard to the measures taken in the context of the establishment of this card in Qom and the lack of previous experience in this province, one of the concerns of the authorities to investigate the performance and capabilities of the card and its effects on the quality of health services is affecting the present study is to respond to this concerns. This research method is descriptive and applied to the target population of physicians, nurses and medical record experts employed at the Medical Center have formed a martyr Beheshti Qom due to more awareness cognitive advantages associated with its use of smart cards have given. The population is equal to the number of 444 and 124 questionnaire for data analysis is used. The sampling method used in this research was stratified random sampling conducted in the respective classes. Spss software for data analysis & exploratory factor analysis & confirmed, Kolmogorov-Smirnov Test, Wilcoxon Test & matrix of factors were used. The analysis results showed that Health Smart Cards for quality of health care services positive and significant effects on Dimension quality of the reliability & Tangibles . Analysis of demographic variables that influence opinions about the quality of health care Health Smart Cards significantly related to gender and education level, and also no experience discussed the variables significantly associated with age.

  9. [Smart card systems in health care (protection, key-functions, divided data bases, applications)].

    Science.gov (United States)

    Simon, P

    1999-04-25

    Barely more than 15 years have passed since electronic memory cards appeared, their popularity has grown rapidly (first of all as a cash-saving device and later for other purposes, as well). This is due also to the growing interest towards development of the intelligence of information systems for the follow-up of patients' health condition and medical care in countries with a highly developed health and insurance system (need for the creation of data bases divided for individuals) and also to their commitment towards a better control of the quality and costs of health care. We can come to the conclusion that the aim of research, development and the creation of systems in health informatics is to prevent illness and to give a direct informatic support to medical and nursing activity carried out in the patients' interests. The smart card and the surrounding application systems are certainly the appropriate means for the achievement of these aims.

  10. Demonstration of holographic smart card system using the optical memory technology

    Science.gov (United States)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  11. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  12. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  13. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  14. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  15. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  16. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  17. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  18. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Science.gov (United States)

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  19. Spatial-Temporal Similarity Correlation between Public Transit Passengers Using Smart Card Data

    Directory of Open Access Journals (Sweden)

    Hamed Faroqi

    2017-01-01

    Full Text Available The increasing availability of public transit smart card data has enabled several studies to focus on identifying passengers with similar spatial and/or temporal trip characteristics. However, this paper goes one step further by investigating the relationship between passengers’ spatial and temporal characteristics. For the first time, this paper investigates the correlation of the spatial similarity with the temporal similarity between public transit passengers by developing spatial similarity and temporal similarity measures for the public transit network with a novel passenger-based perspective. The perspective considers the passengers as agents who can make multiple trips in the network. The spatial similarity measure takes into account direction as well as the distance between the trips of the passengers. The temporal similarity measure considers both the boarding and alighting time in a continuous linear space. The spatial-temporal similarity correlation between passengers is analysed using histograms, Pearson correlation coefficients, and hexagonal binning. Also, relations between the spatial and temporal similarity values with the trip time and length are examined. The proposed methodology is implemented for four-day smart card data including 80,000 passengers in Brisbane, Australia. The results show a nonlinear spatial-temporal similarity correlation among the passengers.

  20. Flow Orientation Analysis for Major Activity Regions Based on Smart Card Transit Data

    Directory of Open Access Journals (Sweden)

    Parul Singh

    2017-10-01

    Full Text Available Analyzing public movement in transportation networks in a city is significant in understanding the life of citizen and making improved city plans for the future. This study focuses on investigating the flow orientation of major activity regions based on smart card transit data. The flow orientation based on the real movements such as transit data can provide the easiest way of understanding public movement in the complicated transportation networks. First, high inflow regions (HIRs are identified from transit data for morning and evening peak hours. The morning and evening HIRs are used to represent major activity regions for major daytime activities and residential areas, respectively. Second, the directional orientation of flow is then derived through the directional inflow vectors of the HIRs to show the bias in directional orientation and compare flow orientation among major activity regions. Finally, clustering analysis for HIRs is applied to capture the main patterns of flow orientations in the city and visualize the patterns on the map. The proposed methodology was illustrated with smart card transit data of bus and subway transportation networks in Seoul, Korea. Some remarkable patterns in the distribution of movements and orientations were found inside the city. The proposed methodology is useful since it unfolds the complexity and makes it easy to understand the main movement patterns in terms of flow orientation.

  1. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  2. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2014-01-01

    Full Text Available In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  3. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  4. Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports

    Directory of Open Access Journals (Sweden)

    RIAD, R.

    2016-11-01

    Full Text Available Security checking can be improved by watermarking identity (ID images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter. Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user.

  5. Using metro smart card data to model location choice of after-work activities : an application to Shanghai

    NARCIS (Netherlands)

    Wang, Y.; Homem de Almeida Correia, G.; de Romph, E.; Timmermans, H.J.P.

    2017-01-01

    A location choice model explains how travellers choose their trip destinations especially for those activities which are flexible in space and time. The model is usually estimated using travel survey data; however, little is known about how to use smart card data (SCD) for this purpose in a public

  6. Relationship between Spatio-Temporal Travel Patterns Derived from Smart-Card Data and Local Environmental Characteristics of Seoul, Korea

    Directory of Open Access Journals (Sweden)

    Mi-Kyeong Kim

    2018-03-01

    Full Text Available With the incorporation of an automated fare-collection system into the management of public transportation, not only can the quality of transportation services be improved but also that of the data collected from users when coupled with smart-card technology. The data collected from smart cards provide opportunities for researchers to analyze big data sets and draw meaningful information out of them. This study aims to identify the relationship between travel patterns derived from smart-card data and urban characteristics. Using seven-day transit smart-card data from the public-transportation system in Seoul, the capital city of the Republic of Korea, we investigated the temporal and spatial boarding and alighting patterns of the users. The major travel patterns, classified into five clusters, were identified by utilizing the K-Spectral Centroid clustering method. We found that the temporal pattern of urban mobility reflects daily activities in the urban area and that the spatial pattern of the five clusters classified by travel patterns was closely related to urban structure and urban function; that is, local environmental characteristics extracted from land-use and census data. This study confirmed that the travel patterns at the citywide level can be used to understand the dynamics of the urban population and the urban spatial structure. We believe that this study will provide valuable information about general patterns, which represent the possibility of finding travel patterns from individuals and urban spatial traits.

  7. Using metro smart card data to model location choice of after-work activities: An application to Shanghai

    NARCIS (Netherlands)

    Wang, Y.; Correia, G.H.D.A.; Romph, E. de; Timmermans, H.J.P.H.

    2017-01-01

    A location choice model explains how travellers choose their trip destinations especially for those activities which are flexible in space and time. The model is usually estimated using travel survey data; however, little is known about how to use smart card data (SCD) for this purpose in a public

  8. Comparison of the Effects of SMART Board Technology and Flash Card Instruction on Sight Word Recognition and Observational Learning

    Science.gov (United States)

    Mechling, Linda C.; Gast, David L.; Thompson, Kimberly L.

    2009-01-01

    This study compared the effectiveness of SMART Board, interactive whiteboard technology and traditional flash cards in teaching reading in a small-group instructional arrangement. Three students with moderate intellectual disabilities were taught to read grocery store aisle marker words under each condition. Observational learning (students…

  9. Towards second-generation smart card-based authentication in health information systems: the secure server model.

    Science.gov (United States)

    Hallberg, J; Hallberg, N; Timpka, T

    2001-01-01

    Conventional smart card-based authentication systems used in health care alleviate some of the security issues in user and system authentication. Existing models still do not cover all security aspects. To enable new protective measures to be developed, an extended model of the authentication process is presented. This model includes a new entity referred to as secure server. Assuming a secure server, a method where the smart card is aware of the status of the terminal integrity verification becomes feasible. The card can then act upon this knowledge and restrict the exposure of sensitive information to the terminal as required in order to minimize the risks. The secure server model can be used to illuminate the weaknesses of current approaches and the need for extensions which alleviate the resulting risks.

  10. Does Environmental Sustainability Play a Role in the Adoption of Smart Card Technology at Universities in Taiwan: An Integration of TAM and TRA

    Directory of Open Access Journals (Sweden)

    Ching-Wei Ho

    2015-08-01

    Full Text Available Smart cards are able to store and protect relatively large amounts of data. When applied in universities, they can act as multi-purpose, multi-function and smart ID cards. This would avoid the waste of resources and maintain environmental sustainability. This study proposes a model that integrates Technology Acceptance Model and Theory of Reasoned Action into a framework incorporating the notion of environmental concern in order to explore the factors that affect students’ behavioral intention to use University Smart Cards. This study employs a quantitative method for primary data collection via a structured questionnaire for university students. The findings indicated that the perceived usefulness and subjective norm of university smart card systems have the most significant predictive power on potential users’ attitudes and intentions of adopting the card.

  11. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  12. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  13. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    Full Text Available Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  14. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    Science.gov (United States)

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  15. The Internet- and Digital Signature-Based Prescription Order Communication System Using Synchronized Smart Cards in the 2-Way Type Terminal

    National Research Council Canada - National Science Library

    Song, Won

    2001-01-01

    ...) based on the Internet between the hospital and the pharmacy, on the public-key infrastructure, and on the concurrently parallel co-operation with both medical professional's and patient's smart cards...

  16. SAE for the prediction of road traffic status from taxicab operating data and bus smart card data

    Science.gov (United States)

    Zhengfeng, Huang; Pengjun, Zheng; Wenjun, Xu; Gang, Ren

    Road traffic status is significant for trip decision and traffic management, and thus should be predicted accurately. A contribution is that we consider multi-modal data for traffic status prediction than only using single source data. With the substantial data from Ningbo Passenger Transport Management Sector (NPTMS), we wished to determine whether it was possible to develop Stacked Autoencoders (SAEs) for accurately predicting road traffic status from taxicab operating data and bus smart card data. We show that SAE performed better than linear regression model and Back Propagation (BP) neural network for determining the relationship between road traffic status and those factors. In a 26-month data experiment using SAE, we show that it is possible to develop highly accurate predictions (91% test accuracy) of road traffic status from daily taxicab operating data and bus smart card data.

  17. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  18. The purchase of natural gas using a smart card. Energy company and customer sometimes better off with prepayment

    International Nuclear Information System (INIS)

    Meijerink, R.; Meyer, G.E.

    1997-01-01

    In particular in an open market prepayment systems offer advantages for small-scale and large-scale consumers and energy utilities. The use of prepayment systems makes invoices superfluous and defaulters do not have to disconnected. By means of a smart card it is simple to register who made the purchase and to whom gas is supplied. The Dutch natural gas research institute Gastec plans a project to test the safety of prepayment systems

  19. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  20. Optimized Skip-Stop Metro Line Operation Using Smart Card Data

    Directory of Open Access Journals (Sweden)

    Peitong Zhang

    2017-01-01

    Full Text Available Skip-stop operation is a low cost approach to improving the efficiency of metro operation and passenger travel experience. This paper proposes a novel method to optimize the skip-stop scheme for bidirectional metro lines so that the average passenger travel time can be minimized. Different from the conventional “A/B” scheme, the proposed Flexible Skip-Stop Scheme (FSSS can better accommodate spatially and temporally varied passenger demand. A genetic algorithm (GA based approach is then developed to efficiently search for the optimal solution. A case study is conducted based on a real world bidirectional metro line in Shenzhen, China, using the time-dependent passenger demand extracted from smart card data. It is found that the optimized skip-stop operation is able to reduce the average passenger travel time and transit agencies may benefit from this scheme due to energy and operational cost savings. Analyses are made to evaluate the effects of that fact that certain number of passengers fail to board the right train (due to skip operation. Results show that FSSS always outperforms the all-stop scheme even when most passengers of the skipped OD pairs are confused and cannot get on the right train.

  1. Ring aggregation pattern of metro passenger trips: A study using smart card data

    Science.gov (United States)

    Wang, Ziyang; Hu, Yuxin; Zhu, Peng; Qin, Yong; Jia, Limin

    2018-02-01

    With the widespread implementation of smart cards and with more travel details being recorded, travel patterns can be studied more precisely and deeply. Although considerable attention has been paid to travel patterns, the relationship between travel patterns and the functional structure of a city is yet to be well understood. In this research, we study this relationship by analysing metro passenger trip data (in Beijing and Shenzhen in China and London in the United Kingdom), and we present two unprecedented findings. First, through averaging, a linear relationship is found to exist between individual travel distance and the distance between the origin and the city centre. The underlying mechanism is a travel pattern we call "ring aggregation", i.e., the daily movement of city passengers is aggregated into a ring (with approximately equal distances to the city centre). Then, for commuting trips, the daily travel pattern can be regarded as switching between the outer residential ring and the inner work ring. Second, this linear relationship and the ring aggregation pattern seem to be exclusive characteristics of metro systems (and may also fit other moderate- and long-distance transportation modes) but do not apply to short-distance transportation modes, such as bicycles and taxis. This finding implies that the ring aggregation pattern is a product of the relationship between travel patterns and the city functional structure at a large scope.

  2. A Load Time Policy Checker for Open Multi-Application Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Gadyatskaya, Olga

    2011-01-01

    , traditional approaches for information flow analysis are not suitable. We suggest the Security-by-Contract approach for loading time application certification on the card, that will enable the stakeholders with the means to ensure the compliance of every update of the card with their security policy. We...... describe an extension of the card security architecture to deal with verification for different types of updates and present a Java Card prototype implementation of the Policy Checker with performance measurements....

  3. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zhang

    2015-01-01

    Full Text Available Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.

  4. Smart-card-based automatic meal record system intervention tool for analysis using data mining approach.

    Science.gov (United States)

    Zenitani, Satoko; Nishiuchi, Hiromu; Kiuchi, Takahiro

    2010-04-01

    The Smart-card-based Automatic Meal Record system for company cafeterias (AutoMealRecord system) was recently developed and used to monitor employee eating habits. The system could be a unique nutrition assessment tool for automatically monitoring the meal purchases of all employees, although it only focuses on company cafeterias and has never been validated. Before starting an interventional study, we tested the reliability of the data collected by the system using the data mining approach. The AutoMealRecord data were examined to determine if it could predict current obesity. All data used in this study (n = 899) were collected by a major electric company based in Tokyo, which has been operating the AutoMealRecord system for several years. We analyzed dietary patterns by principal component analysis using data from the system and extracted 5 major dietary patterns: healthy, traditional Japanese, Chinese, Japanese noodles, and pasta. The ability to predict current body mass index (BMI) with dietary preference was assessed with multiple linear regression analyses, and in the current study, BMI was positively correlated with male gender, preference for "Japanese noodles," mean energy intake, protein content, and frequency of body measurement at a body measurement booth in the cafeteria. There was a negative correlation with age, dietary fiber, and lunchtime cafeteria use (R(2) = 0.22). This regression model predicted "would-be obese" participants (BMI >or= 23) with 68.8% accuracy by leave-one-out cross validation. This shows that there was sufficient predictability of BMI based on data from the AutoMealRecord System. We conclude that the AutoMealRecord system is valuable for further consideration as a health care intervention tool. Copyright 2010 Elsevier Inc. All rights reserved.

  5. Using smart card technology to monitor the eating habits of children in a school cafeteria: 1. Developing and validating the methodology.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.

  6. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  7. A Smart City Application: A Fully Controlled Street Lighting Isle Based on Raspberry-Pi Card, a ZigBee Sensor Network and WiMAX

    Directory of Open Access Journals (Sweden)

    Fabio Leccese

    2014-12-01

    Full Text Available A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  8. A smart city application: a fully controlled street lighting isle based on Raspberry-Pi card, a ZigBee sensor network and WiMAX.

    Science.gov (United States)

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-12-18

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  9. PENGEMBANGAN MODEL MEDIA SMART CARD UNTUK PEMBELAJARAN BOLA BASKET PADA SISWA KELAS IV SDIT PERMATA HATI KECAMATAN MADUKARA KABUPATEN BANJARNEGARA TAHUN 2014

    Directory of Open Access Journals (Sweden)

    Nur’aeni Linda Pratiwi

    2016-02-01

    Full Text Available The purpose of this study is to find out the development product of Smart Card media for basketball learning to the four grade of SDIT Permata Hati Kecamatan Madukara Kabupaten. The study is a research and development. There are procedures of the product development based on this research, they are: (1 Analyse the product of the result of information collected, including field observation and theoritical review, (2 develop the form of the first product ( in form of basketball Smart Card media, (3 expert validation test that is an expert of basketball and an expert of physical learning and try out 1, (4 revision of the first product. This revision is used for an improvement toward the first product that is resulted by the researcher, (5 try out II, (6 revision of the last product that is done according to the result of the field try out, (7 the final result of the model of Smart Card media for basketball learning for the four grade of SDIT Permata Hati.The result of this research in try out I is resulted 85,3% that is categorized as good, and the result of the try out II is resulted 87,7% that is categorized as good, because the students are able to do those three aspects so it is acceptable to be used. So, it can be concluded that there is a difference between try out I and try out II that is 2,44%.

  10. Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-01-01

    Full Text Available Remote user authentication is the first step to guarantee the security of online services. Online services grow rapidly and numerous remote user authentication schemes were proposed with high capability and efficiency. Recently, there are three new improved remote user authentication schemes which claim to be resistant to various attacks. Unfortunately, according to our analysis, these schemes all fail to achieve some critical security goals. This paper demonstrates that they all suffer from offline dictionary attack or fail to achieve forward secrecy and user anonymity. It is worth mentioning that we divide offline dictionary attacks into two categories: (1 the ones using the verification from smart cards and (2 the ones using the verification from the open channel. The second is more complicated and intractable than the first type. Such distinction benefits the exploration of better design principles. We also discuss some practical solutions to the two kinds of attacks, respectively. Furthermore, we proposed a reference model to deal with the first kind of attack and proved its effectiveness by taking one of our cryptanalysis schemes as an example.

  11. PENGARUH PEMBELAJARAN TEAM ASSISTED INDIVIDUALIZATION (TAI BERBANTUAN MEDIA SMART AND INTERESTING CARD (SIC TERHADAP HASIL BELAJAR SISWA

    Directory of Open Access Journals (Sweden)

    Kun Khuriya Pratiwi

    2015-11-01

    Full Text Available This experiment aimed to determine the influence of student’s learning outcomes of Senior High School (SHS in Parakan through the application of TAI (Team Assisted Individualization assisted of SIC (Smart and Interesting Card media on the subject of redox reaction. The population in this experiment were X grade students Senior High School (SHS in Parakan of the school year 2011/2012. Determination of the sample used cluster random sampling system that obtained two classes where X-3 as an experimental group that was treated by using TAI method assisted by SIC media and X-4 as a control group that was treated conventional methods. The research data was obtained by the method of documentation, testing, questionnaire and observation. The final analysis methods are normalization test, the similarity of two varians test, difference of two average test, gain test, biserial correlation, determination coefficient and analysis of questionnaire and observation sheet. The results showed that experiment class better than the control class. The results of study obtained results of the experimental group had an average 76,78 and a control group had an average of 67,82. TAI method assisted by SIC media give contribution to the learning outcome as 30%.Key words: TAI learning, SIC media 

  12. Inferring Social Functions Available in the Metro Station Area from Passengers’ Staying Activities in Smart Card Data

    Directory of Open Access Journals (Sweden)

    Yang Zhou

    2017-12-01

    Full Text Available The function of a metro station area is vital for city planners to consider when establishing a context-aware Transit-Oriented Development policy around the station area. However, the functions of metro station areas are hard to infer using the static land use distribution and other traditional survey datasets. In this paper, we propose a method to infer the functions occurring around the metro station catchment areas according to the patterns of staying activities derived from smart card data. We first define the staying activities by the spatial and temporal constraints of the two consecutive alighting and boarding records from the individual travel profile. Then we cluster and label the whole staying activities by considering the features of duration, frequency, and start time. By analyzing the percentage of different types of aggregated activities happening around each metro station, we cluster and explore the functions of the metro station area. Taking Wuhan as a case study, we analyze the results of Wuhan metro systems and discuss the similarities and differences between the functions and the land use distribution around the station area. The results show that although there exist some agreements, there is also a gap between the human activities and the land uses around the station area. These findings could give us deeper insight into how people act around the stations by metro systems, which will ultimately benefit the urban planning and policy development.

  13. Proposing a Model for Patient Admission and NFC Mobile Payment by Biometric Identification and Smart Health Card

    Directory of Open Access Journals (Sweden)

    Mahdi Barkhordari Firouzabadi

    2016-02-01

    Full Text Available Abstract Following the advances in mobile communication and information technology, smart phones have been used in a wide variety of commercial, social, entertainment, file sharing and health transactions and applications. The current procedures in healthcare environment for patient registration, appointment scheduling and payment are time consuming and somehow tiresome. Traditionally, patients were supposed to fill out registration forms, wait for being called, and finally stand in long lines for payment procedures. In some places, appointment could be done online via web but still the patient has to walk in with appointment card and in our case, provide the insurance booklet to the front desk personnel to pay for services and receive discounts for insurance. Therefore, the present study intended to propose a model using Near Field Communication-enabled mobile application for a medical clinic which currently offers online and call services for making an appointment, though patient waiting time is still too much in the current process of payment for services.

  14. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    Directory of Open Access Journals (Sweden)

    Chen Zhong

    Full Text Available To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more

  15. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    Science.gov (United States)

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable.

  16. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data

    Science.gov (United States)

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable. PMID:26872333

  17. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  18. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment.

    Science.gov (United States)

    Ip, Dennis Km; Lau, Eric Hy; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-10-06

    School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card-based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card-based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. We designed and implemented an ILI surveillance system utilizing smart card-based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. We designed and implemented a novel

  19. Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan.

    Science.gov (United States)

    Hsu, Min-Huei; Yeh, Yu-Ting; Chen, Chien-Yuan; Liu, Chien-Hsiang; Liu, Chien-Tsai

    2011-03-01

    Doctor shopping (or hospital shopping), which means changing doctors (or hospitals) without professional referral for the same or similar illness conditions, is common in Hong Kong, Taiwan and Japan. Due to the lack of infrastructure for sharing health information and medication history among hospitals, doctor-shopping patients are more likely to receive duplicate medications and suffer adverse drug reactions. The Bureau of National Health Insurance (BNHI) adopted smart cards (or NHI-IC cards) as health cards in Taiwan. With their NHI-IC cards, patients can freely access different medical institutions. Because an NHI-IC card carries information about a patient's prescribed medications received from different hospitals nationwide, we used this system to address the problem of duplicate medications for outpatients visiting multiple hospitals. A computerized physician order entry (CPOE) system was enhanced with the capability of accessing NHI-IC cards and providing alerts to physicians when the system detects potential duplicate medications at the time of prescribing. Physician responses to the alerts were also collected to analyze changes in physicians' behavior. Chi-square tests and two-sided z-tests with Bonferroni adjustments for multiple comparisons were used to assess statistical significance of differences in actions taken by physicians over the three months. The enhanced CPOE system for outpatient services was implemented and installed at the Pediatric and Urology Departments of Taipei Medical University Wan-Fang Hospital in March 2007. The "Change Log" that recorded physician behavior was activated during a 3-month study period from April to June 2007. In 67.93% of patient visits, the physicians read patient NHI-IC cards, and in 16.76% of the reads, the NHI-IC card contained at least one prescribed medication that was taken by the patient. Among the prescriptions issued by physicians, on average, there were 2.36% prescriptions containing at least one

  20. Using smart card technology to monitor the eating habits of children in a school cafeteria: 3. The nutritional significance of beverage and dessert choices.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The consumption patterns of beverages and desserts features highly in the current debate surrounding children's nutrition. The aim of this study was to continuously monitor the choice of beverages and desserts made by nearly 1000 children in a school cafeteria. A newly developed smart card system was used to monitor the food choices of diners (7-16-year-old boys) in a school cafeteria over 89 days. A wide variety of beverages and desserts were on offer daily. Despite coming from an affluent, well-educated demographic group, the boys' choices of beverages and desserts mirrored those of children in general. Buns and cookies were over 10 times more popular than fresh fruits and yogurts. Sugary soft-drinks were over 20 times more popular than fresh fruit drinks and milk combined. Appropriate choices could, over a month, reduce intake of added sugar by over 800 g and fat by over 200 g. The smart card system was very effective at monitoring total product choices for nearly 1000 diners. In agreement with a recent national school meal survey, where choice is extensive, children show a preference for products high in fat and/or sugar. The consequences of these preferences are discussed.

  1. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  2. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  3. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  4. Fingerprint match-on-card: review and outlook

    CSIR Research Space (South Africa)

    Shabalala, MB

    2015-03-01

    Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...

  5. Modeling the Hourly Distribution of Population at a High Spatiotemporal Resolution Using Subway Smart Card Data: A Case Study in the Central Area of Beijing

    Directory of Open Access Journals (Sweden)

    Yunjia Ma

    2017-04-01

    Full Text Available The accurate estimation of the dynamic changes in population is a key component in effective urban planning and emergency management. We developed a model to estimate hourly dynamic changes in population at the community level based on subway smart card data. The hourly population of each community in six central districts of Beijing was calculated, followed by a study of the spatiotemporal patterns and diurnal dynamic changes of population and an exploration of the main sources and sinks of the observed human mobility. The maximum daytime population of the six central districts of Beijing was approximately 0.7 million larger than the night-time population. The administrative and commercial districts of Dongcheng and Xicheng had high values of population ratio of day to night of 1.35 and 1.22, respectively, whereas Shijingshan, a residential district, had the lowest value of 0.84. Areas with a high population ratio were mainly concentrated in Dongcheng, Xicheng, West Chaoyang, and Southeast Haidian. The daytime population distribution showed a hierarchical spatial pattern of planar centers and second scattered centers as opposed to multiple scattered centers during the night-time. This was because most people moved inward from the areas with a low–high to high–low population ratio of day to night from night-time to daytime, which can be explained by the process of commuting between residential areas and workplaces. Several distinctive phenomena (e.g., the distribution of new industrial parks, the so-called old residential areas, and colleges and universities in the development of China are reflected by the spatiotemporal pattern of the distribution of population. The general consistency of the population ratios of day to night, population distribution, population variation of typical communities, and population mobility pattern with previous research suggests that the subway smart card data has potential in analyzing dynamic diurnal

  6. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    Science.gov (United States)

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  7. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  8. Unconstrained and contactless hand geometry biometrics.

    Science.gov (United States)

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  9. Unconstrained and Contactless Hand Geometry Biometrics

    Directory of Open Access Journals (Sweden)

    Carmen Sánchez-Ávila

    2011-10-01

    Full Text Available This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM and k-Nearest Neighbour (k-NN. Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  10. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  11. A microprocessor card software server to support the Quebec health microprocessor card project.

    Science.gov (United States)

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  12. Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Hartel, Pieter H.; Butler, Michael J.; de Jong, Eduard; Longley, Mark; Olivieira, J.N.; Zave, P.

    A transacted memory that is implemented using EEPROM technology offers persistence, undoability and auditing. The transacted memory system is formally specified in Z, and refined in two steps to a prototype C implementation / SPIN model. Conclusions are offered both on the transacted memory system

  13. Contactless Ultrasound Generation in a Crucible

    Science.gov (United States)

    Bojarevics, Valdis; Djambazov, Georgi S.; Pericleous, Koulis A.

    2015-07-01

    Ultrasound treatment is used in light alloys during solidification to refine microstructure, remove gas, or disperse immersed particles. A mechanical sonotrode immersed in the melt is most effective when probe tip vibrations lead to cavitation. Liquid contact with the probe can be problematic for high temperature or reactive melts leading to contamination. An alternative contactless method of generating ultrasonic waves is proposed, using electromagnetic (EM) induction. As a bonus, the EM force induces vigorous stirring distributing the effect to treat larger volumes of material. In a typical application, the induction coil surrounding the crucible—also used to melt the alloy—may be adopted for this purpose with suitable tuning. Alternatively, a top coil, immersed in the melt (but still contactless due to EM force repulsion) may be used. Numerical simulations of sound, flow, and EM fields suggest that large pressure amplitudes leading to cavitation may be achievable with this method.

  14. Development of a contactless capacitive immunosensor

    OpenAIRE

    Perruche, Brice Emmanuel

    2011-01-01

    In the present work, a label-free, contactless and capacitive immunosensor is developed using impedance spectroscopy, in the aim to perform low-cost immunoassays. Chapter 1 puts this work in perspective with some existing techniques, while a presentation of impedance theory used in this work is carried out in chapter 2. In Chapter 3, numerical simulations using a commercial finite element method software is carried out. The response of coplanar and fa...

  15. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  16. The application of Hough transform-based fingerprint alignment on match-on-card

    CSIR Research Space (South Africa)

    Mlambo, S

    2015-03-01

    Full Text Available of these cards, has led to the need for further improvements on smart cards combined with fingerprint biometrics. Due to the insufficient memory space and few instruction sets in Java smart cards, developers and programmers are faced with implementing efficient...

  17. User authentication based on the NFC host-card-emulation technology

    Science.gov (United States)

    Kološ, Jan; Kotyrba, Martin

    2017-11-01

    This paper deals with implementation of algorithms for data exchange between mobile devices supporting NFC HCE (Host-Card-Emulation) and a contactless NFC reader communicating in a read/write mode. This solution provides multiplatform architecture for data exchange between devices with a focus on safe and simple user authentication.

  18. The effect of using the health smart card vs. CPOE reminder system on the prescribing practices of non-obstetric physicians during outpatient visits for pregnant women in Taiwan.

    Science.gov (United States)

    Long, An-Jim; Chang, Polun

    2012-09-01

    There is an evidence that pregnant women have been prescribed a significant number of improper medications that could lead to potential damage for a developing fetus due to discontinuity of care. The safety of pregnant women raises public concern and there is a need to identify ways to prevent potential adverse events to the pregnant woman. This study used a health smart card with a clinical reminder system to keep continuous records of general outpatient visits of pregnant women to protect them from potential adverse events caused by improper prescription. The health smart card, issued to all 23 million citizens in Taiwan, was used to work with a Computerized Physician Order Entry (CPOE) implemented at a 700-bed teaching medical center in Taipei to provide the outpatient information of pregnant women. FDA pregnancy risk classification was used to categorize the risk of pregnant women. The log file, combined with the physicians' and patients' profiles, were statistically examined using the Mantel-Haenszel technique to evaluate the impact of system in changing physician's prescription behavior. A total of 441 patients ranged in age from 15 to 50 years with 1114 prescriptions involved in FDA pregnancy risk classification C, D, and X during the study period. 144 reminders (13.1%) were accepted by physicians for further assessment and 100 (69.4%) of them were modified. Non-obstetric physicians in non-emergency setting were more intended to accept reminders (27.8%, 4.9 folds than obstetricians). Reminders triggered on patients in second trimester (15.5%) were accepted by all physicians more than third trimester (OR 1.52, psmart card armed with CPOE reminder system and well-defined criteria had the potential to decrease harmful medication prescribed to pregnant patients. The results show better conformance for non-obstetric physicians (26%) and when physicians accepted the alerts they are more likely to went back and review their orders (69%). In sum, reminder criteria

  19. Tethered Contactless Mobile Nuclear Environment Monitoring Robot

    International Nuclear Information System (INIS)

    Choi, S. Y.; Lee, E. S.; Lee, Kun J.; Kim, Su H.; Rim, C. T.

    2013-01-01

    In fact, the nuclear environment monitoring is significantly crucial for early detection of NPP accident, radiological emergency, the estimation of radiation exposure to nearby residents as well as the long term radioactivity. In the UAE, the nuclear environment monitoring is, however, quite challenging because sampling locations are far from NPPs and the outdoor temperature and humidity are very high for NPP workers to collect soil, air, and water samples. Therefore, nuclear environment monitoring robots (Nubos) are strongly needed for the NPPs in the UAE. The Nubos can be remotely controlled to collect samples in extreme environment instead of NPP workers. Moreover, the Nubos can be unmanned ground vehicles (UGVs), unmanned aerial vehicles (UAVs) and unmanned marine vehicles (UMVs) to collect soil, air, and water samples, respectively. In this paper, the prototype development of UGV type Nubos using power cable for a long distance power delivery, called Tethered contactless mobile Nubo is introduced and validated by experiments. In this paper, the prototype development of Tethered Contactless Mobile (TeCoM) Nubo, which can be powered continuously within several km distance and avoid tangled cable, and the indoor test are finished. As further works, outdoor demonstration and a grand scale R and D proposal of practical Nubo will be proceeded

  20. Tethered Contactless Mobile Nuclear Environment Monitoring Robot

    Energy Technology Data Exchange (ETDEWEB)

    Choi, S. Y.; Lee, E. S.; Lee, Kun J.; Kim, Su H.; Rim, C. T. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2013-05-15

    In fact, the nuclear environment monitoring is significantly crucial for early detection of NPP accident, radiological emergency, the estimation of radiation exposure to nearby residents as well as the long term radioactivity. In the UAE, the nuclear environment monitoring is, however, quite challenging because sampling locations are far from NPPs and the outdoor temperature and humidity are very high for NPP workers to collect soil, air, and water samples. Therefore, nuclear environment monitoring robots (Nubos) are strongly needed for the NPPs in the UAE. The Nubos can be remotely controlled to collect samples in extreme environment instead of NPP workers. Moreover, the Nubos can be unmanned ground vehicles (UGVs), unmanned aerial vehicles (UAVs) and unmanned marine vehicles (UMVs) to collect soil, air, and water samples, respectively. In this paper, the prototype development of UGV type Nubos using power cable for a long distance power delivery, called Tethered contactless mobile Nubo is introduced and validated by experiments. In this paper, the prototype development of Tethered Contactless Mobile (TeCoM) Nubo, which can be powered continuously within several km distance and avoid tangled cable, and the indoor test are finished. As further works, outdoor demonstration and a grand scale R and D proposal of practical Nubo will be proceeded.

  1. FY1995 study of electronic coservice project which used Optical-Smart Hybrid Card; 1995 nendo hikari IC hybrid card wo mochiite katei kara ukeru gyosei denshika service project

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    As one of advanced multi media service, We can think about electoronization-network changing of the public coservice. that the official system provides. It can be expected to improve the life environment for a nation by the electronization. The purpose of this research is to clarify the off-line administration of an individual information and the issue on security. We constructed the experimental system using the Internet and Optical-IC hybrid card that an individual information is administrated. The system provides the following services. (1) On-stop moving service (2) Electronic certificate publishing service (3) Electronic ticket publishing service We have mounted client terminals at Fuchu city hall, Yokohama city hall, and Keio University, and made field experimentation. (NEDO)

  2. Using Contactless Scanners for Quality Inspection

    Directory of Open Access Journals (Sweden)

    Mendřický Radomír

    2017-01-01

    Full Text Available The article presents the research of use of modern 3D measurement contactless methods for quality inspection in automotive industry production. The experience with measuring functional assemblies and parts of complex shapes as well as advantages of optical measurement methods are shown on practical research example, whose aim was to find effective procedures and methods of obtaining 3-dimensional high-definition models of measured components. The obtained models were then subjected to inspection of their dimensional and shape accuracy, which was performed by means of comparison with the nominal CAD model, as well as to analyses of the assembly functionality by searching or collision situations of the movable parts of this mechanism.

  3. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  4. Using smart card technology to monitor the eating habits of children in a school cafeteria: 2. The nutrient contents of all meals chosen by a group of 8- to 11-year-old boys over 78 days.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the abilities of the newly created smart card system to track the nutrient contents of foods chosen over several months by individual diners in a school cafeteria. From the food choice and composition of food data sets, an Access database was created encompassing 30 diners (aged 8-11 years), 78 days and eight nutrients. Data were available for a total of 1909 meals. Based upon population mean values the cohort were clearly choosing meals containing higher than the recommended maximum amounts for sugar and lower than the recommended minimum amounts of fibre, iron and vitamin A. Protein and vitamin C contents of meals chosen were well above minimum requirements. Over the 1909 meals, nutrient requirements were met 41% of the time. The system created was very effective at continually monitoring food choices of individual diners over limitless time. The data generated raised questions on the common practice of presenting nutrient intakes as population mean values calculated over a few days. The impact of heavily fortified foods on such studies in general is discussed.

  5. Contactless sub-millimeter displacement measurements

    Science.gov (United States)

    Sliepen, Guus; Jägers, Aswin P. L.; Bettonvil, Felix C. M.; Hammerschlag, Robert H.

    2008-07-01

    Weather effects on foldable domes, as used at the DOT and GREGOR, are investigated, in particular the correlation between the wind field and the stresses caused to both metal framework and tent clothing. Camera systems measure contactless the displacement of several dome points. The stresses follow from the measured deformation pattern. The cameras placed near the dome floor do not disturb telescope operations. In the set-ups of DOT and GREGOR, these cameras are up to 8 meters away from the measured points and must be able to detect displacements of less than 0.1 mm. The cameras have a FireWire (IEEE1394) interface to eliminate the need for frame grabbers. Each camera captures 15 images of 640 × 480 pixels per second. All data is processed on-site in real-time. In order to get the best estimate for the displacement within the constraints of available processing power, all image processing is done in Fourier-space, with all convolution operations being pre-computed once. A sub-pixel estimate of the peak of the correlation function is made. This enables to process the images of four cameras using only one commodity PC with a dual-core processor, and achieve an effective sensitivity of up to 0.01 mm. The deformation measurements are well correlated to the simultaneous wind measurements. The results are of high interest to upscaling the dome design (ELTs and solar telescopes).

  6. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  7. A programming and a modelling perspective on the evaluation of Java Card implementations

    NARCIS (Netherlands)

    Hartel, Pieter H.; de Jong, E.; de Jong, Eduard; Attali, Isabelle; Jensen, Thomas

    Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using

  8. On the use of OSL of chip card modules with molding for retrospective and accident dosimetry

    International Nuclear Information System (INIS)

    Woda, Clemens; Fiedler, Irene; Spöttl, Thomas

    2012-01-01

    The potential of optically stimulated luminescence of wire-bond chip card modules with molded encapsulations for retrospective and accident dosimetry is investigated. Contact-based and contactless modules were studied, the latter finding potential use in electronic documents (e.g. electronic passports, electronic identity cards). Investigations were carried out on intact as well as chemically prepared modules, extracting the filler material. Contact-based modules are characterized according to zero dose signal, correlation between OSL and TL, dose response and long-term signal stability. For prepared modules, the minimum detectable dose immediately after irradiation is 3 mGy and between 20 and 200 mGy for contact-based and contactless modules, respectively. Dose recovery tests on contact-based modules indicate that the developed methodology yields results with sufficient accuracy for measurements promptly after irradiation, whereas a systematic underestimation is observed for longer delay times. The reasons for this behaviour are as yet not fully understood.

  9. Accurate magnetic field calculations for contactless energy transfer coils

    NARCIS (Netherlands)

    Sonntag, C.L.W.; Spree, M.; Lomonova, E.A.; Duarte, J.L.; Vandenput, A.J.A.

    2007-01-01

    In this paper, a method for estimating the magnetic field intensity from hexagon spiral windings commonly found in contactless energy transfer applications is presented. The hexagonal structures are modeled in a magneto-static environment using Biot-Savart current stick vectors. The accuracy of the

  10. Contactless Opto-electronic Area and Their Attainable Measuring Accuracy

    Directory of Open Access Journals (Sweden)

    V. Ricny

    2001-06-01

    Full Text Available This paper deals with the problems of the contactless areameasurement on the principle of video signal processing. This videosignal generates TV camera, which scans the measured object. Basicprinciple of these meters is explained and attainable measurementaccuracy and factors influencing this accuracy are analyzed.

  11. Centrifugal turbocompressor with contactless sealing for H-2 S

    International Nuclear Information System (INIS)

    Peculea, M.; Balint, I.; Hirean, I.; Dumitrescu, C.; Pitigoi, Gh.; Balanuca, C.

    1995-01-01

    This paper reports the development of a centrifugal turbocompressor with contactless sealing for H 2 S specially designed for the ROMAG Drobeta heavy water plant. The bench-scale experiments are described and the resulted main characteristics are given. For this equipment an asymmetric automatic anti-pumping protection system has been developed and patented

  12. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  13. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  14. A programming and a modelling perspective on the evaluation of Java Card implementations

    OpenAIRE

    Hartel, Pieter H.; de Jong, E.; de Jong, Eduard; Attali, Isabelle; Jensen, Thomas

    2000-01-01

    Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using Java achievable in smartcard programming. In particular, efforts towards evaluating Java Card implementations at a high level of assurance may be hampered by the presence of these differences as wel...

  15. Smart grid

    International Nuclear Information System (INIS)

    Choi, Dong Bae

    2001-11-01

    This book describes press smart grid from basics to recent trend. It is divided into ten chapters, which deals with smart grid as green revolution in energy with introduction, history, the fields, application and needed technique for smart grid, Trend of smart grid in foreign such as a model business of smart grid in foreign, policy for smart grid in U.S.A, Trend of smart grid in domestic with international standard of smart grid and strategy and rood map, smart power grid as infrastructure of smart business with EMS development, SAS, SCADA, DAS and PQMS, smart grid for smart consumer, smart renewable like Desertec project, convergence IT with network and PLC, application of an electric car, smart electro service for realtime of electrical pricing system, arrangement of smart grid.

  16. Research on Efficiency of Contactless Charging System based on Electromagnetic Induction

    Directory of Open Access Journals (Sweden)

    Chen Jianshu

    2016-01-01

    Full Text Available For the efficiency problem of contactless charging in type of electromagnetic induction, this paper establishes a mathematical model of contactless charging in type of electromagnetic induction and the theoretical derivation. This contactless charging simulation model is founded by Matlab/Simulink, which uses the frequency of PWM generator, the mutual inductance value of the coil and load resistance of RL to simulate some conditions, such as the working frequency in practical work, the distance of coil, whether the coils are directed at the central, and changing of loads. Then through the influence of the changing frequency, load and mutual inductance, contactless charging in type of electromagnetic induction is analyzed. By the whole simulation experiment on contactless charging, the theory deduced from the mathematical model is verified, and the method to improve inductive contactless charging is proved.

  17. Acoustophoretic contactless transport and handling of matter in air.

    Science.gov (United States)

    Foresti, Daniele; Nabavi, Majid; Klingauf, Mirko; Ferrari, Aldo; Poulikakos, Dimos

    2013-07-30

    Levitation and controlled motion of matter in air have a wealth of potential applications ranging from materials processing to biochemistry and pharmaceuticals. We present a unique acoustophoretic concept for the contactless transport and handling of matter in air. Spatiotemporal modulation of the levitation acoustic field allows continuous planar transport and processing of multiple objects, from near-spherical (volume of 0.1-10 μL) to wire-like, without being limited by the acoustic wavelength. The independence of the handling principle from special material properties (magnetic, optical, or electrical) is illustrated with a wide palette of application experiments, such as contactless droplet coalescence and mixing, solid-liquid encapsulation, absorption, dissolution, and DNA transfection. More than a century after the pioneering work of Lord Rayleigh on acoustic radiation pressure, a path-breaking concept is proposed to harvest the significant benefits of acoustic levitation in air.

  18. The INCAS Project: An Innovative Contact-Less Angular Sensor

    Science.gov (United States)

    Ghislanzoni, L.; Di Cintio, A.; Solimando, M.; Parzianello, G.

    2013-09-01

    Angular Positions sensors are widely used in all spacecrafts, including re-entry vehicles and launchers, where mechanisms and pointing-scanning devices are required. The main applications are on mechanisms for TeleMeasure (TM) related to the release and deployment of devices, or on rotary mechanisms such as Solar Array Drive Mechanism (SADM) and Antenna Pointing Mechanism (APM). Longer lifetime (up to 7- 10 years) is becoming a new driver for the coming missions and contact technology sensors often incur in limitations due to the wear of the contacting parts [1].A Self-Compensating Absolute Angular Encoder was developed and tested in the frame of an ESA's ARTES 5.2 project, named INCAS (INnovative Contact-less Angular Sensor). More in particular, the INCAS sensor addresses a market need for contactless angular sensors aimed at replacing the more conventional rotary potentiometers, while featuring the same level of accuracy performances and extending the expected lifetime.

  19. Optical Fibres Contactless Sensor for Dynamic Testing of Lightweight Structures

    Directory of Open Access Journals (Sweden)

    L. Bregant

    2008-01-01

    Full Text Available With dynamic testing, engineers describe activities focused on the identification of some properties of vibrating structures. This step requires for the measurements of excitations and responses signals, applying appropriate sensors directly on the test article. These instruments modify the system's mass and stiffness distributions and eventually the eigen-properties of the structure. These errors become unacceptable especially when testing lightweight structures. This paper shows the results of some tests performed on a small compressor with the purpose of identifying the blades’ natural frequencies and modes. It compares the acquisitions performed with standard accelerometers and two different contact-less systems using as exciters either a micro-hammer or a micro inertial shaker. The paper shows how the contact-less sensors provide good quality data and consistent results in the mode identification phase.

  20. USING PHOTOPLETHYSMOGRAPHY IMAGING FOR OBJECTIVE CONTACTLESS PAIN ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Marcus Koeny

    2014-08-01

    Full Text Available This work presents an extension to the known Analgesia Nociception Index (ANI, which provides an objective estimation of the current depth of analgesia. An adequate “measure” would facilitate so-called balanced anesthesia. Generally, ANI is computed using heart rate variability or rather beat-to-beat intervals based on an electrocardiogram (ECG. There are clinical situations where no ECG monitoring is available or required, but only photoplethysmography (PPG, e.g., in some cases in postoperative care or pain therapy. In addition, a combination of PPG and ECG for obtaining beat-to-beat intervals may lead to increased robustness and reliability for dealing with artifacts. This work therefore investigates the computation of ANI using standard PPG. In addition, new methods and opportunities are presented using contactless PPG imaging (PPGI. PPGI®enables contactless PPG recordings for deriving beat-to-beat intervals as well as analysis of local perfusion and wounds.

  1. Study of Contactless Power Supply for Spindle Ultrasonic Vibrator

    Science.gov (United States)

    Chen, T. R.; Lee, Y. L.; Liu, H. T.; Chen, S. M.; Chang, H. Z.

    2017-11-01

    In this study, a contactless power supply for the ultrasonic motor on the spindle is proposed. The proposed power supply is composed of a series-parallel resonant circuit and a cylindrical contactless transformer. Based on the study and rotation experiments, it can be seen that the proposed power supply can both provide a stable ac power with 25 kHz / 70 V to the ultrasonic motor. When the output power is 250 W, the efficiency of the proposed supply is 89.8 % in respectively rotation tests. When the output power is more than 150 W, the efficiency of the proposed supply is higher than 80 % within the rated output power range.

  2. Accurate magnetic field calculations for contactless energy transfer coils

    OpenAIRE

    Sonntag, C.L.W.; Spree, M.; Lomonova, E.A.; Duarte, J.L.; Vandenput, A.J.A.

    2007-01-01

    In this paper, a method for estimating the magnetic field intensity from hexagon spiral windings commonly found in contactless energy transfer applications is presented. The hexagonal structures are modeled in a magneto-static environment using Biot-Savart current stick vectors. The accuracy of the models are evaluated by mapping the current sticks and the hexagon spiral winding tracks to a local twodimensional plane, and comparing their two-dimensional magnetic field intensities. The accurac...

  3. Contactless Mechanical Components: Gears, Torque Limiters and Bearings

    Directory of Open Access Journals (Sweden)

    Jose Luis Perez-Diaz

    2014-12-01

    Full Text Available Contactless mechanical components are mechanical sets for conversion of torque/speed, whose gears and moving parts do not touch each other, but rather they provide movement with magnets and magnetic materials that exert force from a certain distance. Magneto-mechanical transmission devices have several advantages over conventional mechanisms: no friction between rotatory elements (no power losses or heat generation by friction so increase of efficiency, no lubrication is needed (oil-free mechanisms and no lubrication auxiliary systems, reduced maintenance (no lubricant so no need of oil replacements, wider operational temperature ranges (no lubricant evaporation or freezing, overload protection (if overload occurs magnet simply slides but no teeth brake, through-wall connection (decoupling of thermal and electrical paths and environmental isolation, larger operative speeds (more efficient operative conditions, ultralow noise and vibrations (no contact no noise generation. All these advantages permit us to foresee in the long term several common industrial applications in which including contactless technology would mean a significant breakthrough for their performance. In this work, we present three configurations of contactless mechanical passive components: magnetic gears, magnetic torque limiters and superconducting magnetic bearings. We summarize the main characteristic and range of applications for each type; we show experimental results of the most recent developments showing their performance.

  4. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  5. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  6. Research for the Smart Card of 2010

    NARCIS (Netherlands)

    Cucinelli, B

    In preparation for the activities to be launched under the 6th Framework Programme for Research, Technological Development and Demonstration Activities (FP61), the European Commission’s Information Society Directorate-General organised a meeting to consult the industrial and academic research

  7. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  8. AKILLI KARTLAR İLE YAPILAN MAL VE HİZMET SATIŞLARININ TMS-18 HASILAT STANDARDI ÇERÇEVESİNDE MUHASEBELEŞTİRİLMESİ-RECOGNITION OF SOLD GOODS AND SERVICES BY SMART CARDS WITHIN TMS-18 REVENUE STANDARD

    Directory of Open Access Journals (Sweden)

    Abitter ÖZULUCAN

    2012-06-01

    Full Text Available Bu çalışmada;, önce akıllı kart / yemek çekleri sistemi tanıtılmakta, tarafların sağladıkları fayda ve maliyetler belirtilmekte ve gerçekleşen satış işleminin taraflarca kayda geçirilmesi hususu TMS 18 Hasılat standardı kapsamında ele alınmaktadır. Elde edilen hasılatın ölçümünde, sistemin işleyişinde temel unsur olan ve üye iş yeri tarafından yemek kartı tedavül eden işletmeye hizmet faturası karşılığında ödenen komisyonların, hasılatla doğrudan ilişkilendirilebilen bir gider niteliği taşıyıp taşımaması; bu türden giderlerin Tekdüzen Muhasebe Sistemi’nden farklı olarak, TMS 18 kapsamındaki ölçümünün ve muhasebeleştirilmesinin farklı olup olmadığının belirlenmesi amacıyla kaleme alınan bu çalışma, giriş ve sonuç bölümlerinin dışında dört bölümden oluşmaktadır.-The main part of the smart card system is sellers and while they are measuring of their revenue, they should associate the commissions with revenues to record at inception. So in this paper, after the smart card system is introduced, the advantages and disadvantages of this system are exposed and then how to recognise of the selling is considered within TMS 18, Revenues Standard. In other words, the reason that we conduct this paper can be expressed that the expense of the selling commissions which arise from the selling products with smart card whether should or should not deduct to revenue while the revenue is been measured.

  9. Distortion analysis on binary representation of minutiae based fingerprint matching for match-on-card

    CSIR Research Space (South Africa)

    Mlambo, CS

    2016-12-01

    Full Text Available The fingerprint matching on the smart card has long been developed and recognized faster method than fingerprint matching on a computer or large capacity systems. There has been much research and activities concerned with improving the accuracy...

  10. Contactless conductivity detection for analytical techniques — Developments from 2014 to 2016

    Czech Academy of Sciences Publication Activity Database

    Kubáň, Pavel; Hauser, P.C.

    2017-01-01

    Roč. 38, č. 1 (2017), s. 95-114 ISSN 0173-0835 R&D Projects: GA ČR(CZ) GA16-09135S Institutional support: RVO:68081715 Keywords : capacitively coupled contactless conductivity detection * capillary electrophoresis * contactless conductivity detection * analytical techniques * review Subject RIV: CB - Analytical Chemistry, Separation OBOR OECD: Analytical chemistry Impact factor: 2.744, year: 2016

  11. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  12. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  13. Value Chain Flexibility with RFID: A Case Study of the Octopus Card

    Directory of Open Access Journals (Sweden)

    Lam Tak Ming

    2011-02-01

    Full Text Available Octopus cards are an electronic payment system based on a wireless RFID technology developed in Hong Kong. Users simply hold their contactless smartcards over an electronic reader, and the payment is deducted from the card automatically. If users link their cards to their credit card to upload money, there is no cash transaction involved. Launched in 1997, Octopus cards are the world’s most widely accepted contactless RFID electronic payment system. The system generates value for customers, service providers, and societies.This article makes a theoretical and applied contribution to our understanding of strategic information systems. It adopts and modifies Porter’s value chain and develops value‐chain flexibility as a theoretical framework to analyze the Octopus card system. The fast and dramatic changes in customer needs, business competition, and technological innovation are creating an urgent need for flexibility throughout the whole value chain. By looking at order fulfillment as a process, the shop outlet—either online or offline—is only part of the entire flow from customer enquiry to customer receipt. It is clear that no single idea could significantly reduce customer lead time. Only a total effort from organizations to increase flexibility and eliminate bottlenecks can make the kind of difference needed to compete (Day, 1994; Blackburn, 1991; Yusuf, Sarhadi, & Gunasekran, 1999. Therefore, value chain flexibility must be broadly defined, and it should be applied in the service industry. In other words, organizations should be able to deal with the uncertainty along the value chain to meet customer demands. This framework analyzes how the Octopus card system creates value and, in doing so, identifies key implications for customers, service providers, and society

  14. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  15. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  16. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  17. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  18. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  19. The biometric recognition on contactless multi-spectrum finger images

    Science.gov (United States)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  20. Express method for contactless measurement of parameters of thermoelectric materials

    Directory of Open Access Journals (Sweden)

    Ashcheulov A. A.

    2015-08-01

    Full Text Available The paper presents an original method for contactless express measurement of parameters of thermoelectric materials. The presence of a combination of AC and DC magnetic fields in the gap of the oscillating circuit, where the monitored sample of the thermoelectric material is located, leads — due to Ampere force — to delamination of geometric regions of the occurrence of half-cycles of Foucault current. This in turn causes the appearance of additional heat losses in the oscillating circuit caused by Peltier effect. Computer modeling of these processes with the use of the software package ComsolFenlab 3.3 allowed determining the nature and magnitude of the electric currents in oscillating circuit, the range of operating frequencies, and the ratio of amplitudes of the variable and fixed components of the magnetic field. These components eventually cause a certain temperature difference along the controlled sample, which difference is proportional to the thermoelectric figure of merit Z of the material. The basic expressions are obtained for determining the value of the Seebeck coefficient a, thermal conductivity ?, electrical conductivity ? and thermoelectric figure of merit Z. A description is given to the design of the device for contactless express measurement of parameters of thermoelectric materials based on Bi—Te—Se—Sb solid solutions. Its distinctive feature is the ability to determine the symmetric and asymmetric components of the electric conductivity of the material values. The actual error in parameter measurement in this case is 2%.

  1. Contactless, photoinitiated snap-through in azobenzene-functionalized polymers.

    Science.gov (United States)

    Shankar, M Ravi; Smith, Matthew L; Tondiglia, Vincent P; Lee, Kyung Min; McConney, Michael E; Wang, David H; Tan, Loon-Seng; White, Timothy J

    2013-11-19

    Photomechanical effects in polymeric materials and composites transduce light into mechanical work. The ability to control the intensity, polarization, placement, and duration of light irradiation is a distinctive and potentially useful tool to tailor the location, magnitude, and directionality of photogenerated mechanical work. Unfortunately, the work generated from photoresponsive materials is often slow and yields very small power densities, which diminish their potential use in applications. Here, we investigate photoinitiated snap-through in bistable arches formed from samples composed of azobenzene-functionalized polymers (both amorphous polyimides and liquid crystal polymer networks) and report orders-of-magnitude enhancement in actuation rates (approaching 10(2) mm/s) and powers (as much as 1 kW/m(3)). The contactless, ultra-fast actuation is observed at irradiation intensities focusing on isolating the role of sample geometry, mechanical properties of the materials, and photomechanical strain. Using light to trigger contactless, ultrafast actuation in an otherwise passive structure is a potentially versatile tool to use in mechanical design at the micro-, meso-, and millimeter scales as actuators, as well as switches that can be triggered from large standoff distances, impulse generators for microvehicles, microfluidic valves and mixers in laboratory-on-chip devices, and adaptive optical elements.

  2. Contactless Diagnostics of Turbine Blade Vibration and Damage

    International Nuclear Information System (INIS)

    Prochazka, Pavel; Vanek, Frantisek

    2011-01-01

    The study deals with the contactless diagnostic method used for the identification of steam turbine blade strain, vibration and damage. The tip-timing method based on the evaluation of time differences of blade passages in different rotor revolutions has been modified and improved to provide more precise and reliable results. A new approach to the analysis of the amplitude and time differences of impulse signals generated by a blade passage has been applied. Amplitudes and frequencies of vibrations and static position of blades ascertained by the diagnostic process are used to establish the state of blade damage. A contactless diagnostic system VDS-UT based on magneto-resistive sensors was developed in the Institute of Thermomechanics Academy of Sciences of the Czech Republic. The system provides on-line monitoring of vibration amplitudes and frequencies of all blades and notification of possible blade damage. Evaluation of the axial and circumferential components of the deflections by measuring the amplitude of blade impulse signals results in an overall improvement of the method. Using magneto-resistive sensors, blade elongation and untwisting can be determined as well.

  3. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  4. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  5. Internet of things technologies in smart cities

    CSIR Research Space (South Africa)

    Dlodlo, N

    2016-05-01

    Full Text Available at exploiting the most advanced technologies to support value-added services for the administration of the city and its citizens (Zanella, 2014). Smart cities worldwide live under a ‘data deluge” in which big data generated by people and sensors are processed... single ticket in the form of a smart card which can be loaded with money and is swiped at any point of entry into a transport system using Near Field Communication (NFC) technology to transmit information from the card to the reading machine and back...

  6. The Learning Credit Card: A Tool for Managing Personal Development

    Science.gov (United States)

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  7. Smart Grid, Smart Europe

    OpenAIRE

    VITIELLO SILVIA; FULLI Gianluca; MENGOLINI Anna Maria

    2013-01-01

    Le smart grid, o reti elettriche intelligenti, aprono la strada a nuove applicazioni con conseguenze di vasta portata per l’intero sistema elettrico, tra le quali la principale è la capacità di integrare nella rete esistente più fonti di energia rinnovabili (FER), veicoli elettrici e fonti di generazione distribuita. Le smart grid inoltre garantiscono una più efficiente ed affidabile risposta alla domanda di energia, sia da un punto di vista tecnico, permettendo un monitoraggio e un controll...

  8. Smart parking barrier

    KAUST Repository

    Alharbi, Abdulrazaq M.

    2016-05-06

    Various methods and systems are provided for smart parking barriers. In one example, among others, a smart parking barrier system includes a movable parking barrier located at one end of a parking space, a barrier drive configured to control positioning of the movable parking barrier, and a parking controller configured to initiate movement of the parking barrier, via the barrier drive. The movable parking barrier can be positioned between a first position that restricts access to the parking space and a second position that allows access to the parking space. The parking controller can initiate movement of the movable parking barrier in response to a positive identification of an individual allowed to use the parking space. The parking controller can identify the individual through, e.g., a RFID tag, a mobile device (e.g., a remote control, smartphone, tablet, etc.), an access card, biometric information, or other appropriate identifier.

  9. FPGA-Based HD Camera System for the Micropositioning of Biomedical Micro-Objects Using a Contactless Micro-Conveyor

    Directory of Open Access Journals (Sweden)

    Elmar Yusifli

    2017-03-01

    Full Text Available With recent advancements, micro-object contactless conveyers are becoming an essential part of the biomedical sector. They help avoid any infection and damage that can occur due to external contact. In this context, a smart micro-conveyor is devised. It is a Field Programmable Gate Array (FPGA-based system that employs a smart surface for conveyance along with an OmniVision complementary metal-oxide-semiconductor (CMOS HD camera for micro-object position detection and tracking. A specific FPGA-based hardware design and VHSIC (Very High Speed Integrated Circuit Hardware Description Language (VHDL implementation are realized. It is done without employing any Nios processor or System on a Programmable Chip (SOPC builder based Central Processing Unit (CPU core. It keeps the system efficient in terms of resource utilization and power consumption. The micro-object positioning status is captured with an embedded FPGA-based camera driver and it is communicated to the Image Processing, Decision Making and Command (IPDC module. The IPDC is programmed in C++ and can run on a Personal Computer (PC or on any appropriate embedded system. The IPDC decisions are sent back to the FPGA, which pilots the smart surface accordingly. In this way, an automated closed-loop system is employed to convey the micro-object towards a desired location. The devised system architecture and implementation principle is described. Its functionality is also verified. Results have confirmed the proper functionality of the developed system, along with its outperformance compared to other solutions.

  10. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  11. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  12. CAC on a MAC: Setting up a DOD Common Access Card Reader on the Macintosh OS X Operating System

    National Research Council Canada - National Science Library

    Hopfner, Phil

    2006-01-01

    .... The CAC readers in conjunction with the user's Smart Card enables access to DoD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DoD Public Key Infrastructure (PKI...

  13. Smart assistants for smart homes

    OpenAIRE

    Rasch, Katharina

    2013-01-01

    The smarter homes of tomorrow promise to increase comfort, aid elderly and disabled people, and help inhabitants save energy. Unfortunately, smart homes today are far from this vision – people who already live in such a home struggle with complicated user interfaces, inflexible home configurations, and difficult installation procedures. Under these circumstances, smart homes are not ready for mass adoption. This dissertation addresses these issues by proposing two smart assistants for smart h...

  14. Smart Cities for Smart Children

    DEFF Research Database (Denmark)

    Rehm, Matthias; Jensen, Martin Lynge; Wøldike, Niels Peter

    This position paper presents the concept of smart cities for smart children before highlighting three concrete projects we are currently running in order to investigate different aspects of the underlying concept like social-relational interaction and situated and experiential learning.......This position paper presents the concept of smart cities for smart children before highlighting three concrete projects we are currently running in order to investigate different aspects of the underlying concept like social-relational interaction and situated and experiential learning....

  15. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  16. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  17. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  18. Development of a contactless DC current sensor with high linearity and sensitivity based on the magnetoelectric effect

    Science.gov (United States)

    Castro, N.; Reis, S.; Silva, M. P.; Correia, V.; Lanceros-Mendez, S.; Martins, P.

    2018-06-01

    The magnetoelectric (ME) effect is increasingly being considered an attractive alternative for magnetic field and smart current sensing, being able to sense static and dynamic magnetic fields. This work reports on a contactless DC current sensor device based on a ME PVDF/Metglas composite, a solenoid and the corresponding electronic instrumentation. The ME sample shows a maximum resonant ME coefficient (α 33) of 34.48 V cm‑1 Oe‑1, a linear response (R 2 = 0.998) and a sensitivity of 6.7 mV A‑1. With the incorporation of a charge amplifier, an AC-RMS converter and a microcontroller the linearity is maintained (R 2 = 0.997), the ME output voltage increases to a maximum of 2320 mV and the sensitivity rises to 476.5 mV A‑1. Such features allied to the highest sensitivity reported in the literature on polymer-based ME composites provide to the reported ME sensing device suitable characteristics to be used in non-contact electric current measurement, motor operational status checking, and condition monitoring of rechargeable batteries, among others.

  19. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  20. THEORY OF MUM FOR METAL SPHERICAL ROTOR WITH CONTACTLESS SUSPENSION

    Institute of Scientific and Technical Information of China (English)

    He Xiaoxia; Gao Zhongyu; Wang Yongliang

    2004-01-01

    Based on the motion equations of an unbalanced spherical rotor with contactless suspension,three methods of MUM (mass unbalance measurement) are put forward to measure the total mass unbalance,radical mass unbalance and radical mass unbalance of the rotor.Total mass unbalance is obtained when the unbalanced rotor plays as a simple pendulum in static situation.The pendulant period and pendulant midpoint indicate magnitude and direction of total mass unbalance of the rotor respectively.Analysis of the motion equations by using the averaging method yields that the rotor will do a special side oscillation when an auxiliary system makes the rotor spin about its pole axis which is orientating toward the local vertical.The radical mass unbalance can be obtained by building a proper displacement sensor to sense the amplitude of the side oscillation.Necessary analysis of the motion equations also shows that when the rotor spins at a small angular velocity and the rotary axis is perpendicular to the vertical,the pole axis of the rotor will precess slowly about the vertical by virtue of the axial mass unbalance.The axial mass unbalance can be estimated from the time history of the spin vector of the rotor.Finally,measurement precision of the three methods is compared and how the external torque affects the measurement precision for the three methods are examined.

  1. Smart mobility in smart cities

    Energy Technology Data Exchange (ETDEWEB)

    Baucells, Aleta N.

    2016-07-01

    Cities are currently undergoing a transformation into the Smart concept, like Smartphones or SmartTV. Many initiatives are being developed in the framework of the Smart Cities projects, however, there is a lack of consistent indicators and methodologies to assess, finance, prioritize and implement this kind of projects. Smart Cities projects are classified according to six axes: Government, Mobility, Environment, Economy, People and Living. (Giffinger, 2007). The main objective of this research is to develop an evaluation model in relation to the mobility concept as one of the six axes of the Smart City classification and apply it to the Spanish cities. The evaluation was carried out in the 62 cities that made up in September 2015 the Spanish Network of Smart Cities (RECI- Red Española de Ciudades Inteligentes). This research is part of a larger project about Smart Cities’ evaluation (+CITIES), the project evaluates RECI’s cities in all the axes. The analysis was carried out taking into account sociodemographic indicators such as the size of the city or the municipal budget per inhabitant. The mobility’s evaluation in those cities has been focused in: sustainability mobility urban plans and measures to reduce the number of vehicles. The 62 cities from the RECI have been evaluated according to their degree of progress in several Smart Cities’ initiatives related to smart mobility. The applied methodology has been specifically made for this project. The grading scale has different ranks depending on the deployment level of smart cities’ initiatives. (Author)

  2. What’s in your smart wallet? Challenges and roadblocks

    OpenAIRE

    Haverila, Mikko

    2015-01-01

    The concept of a digital wallet has been around for a few years. Sometimes the words “digital wallet” and “smart wallet” are used interchangeably. This is not the case in this thesis, however. The smart wallet is more than just an electronic payment card embedded into a smart phone; it truly performs all the functions of the traditional wallet but only in digital format. This thesis will discuss the main challenges and roadblocks that need to be addressed in order to build a successful smart ...

  3. Credit Card Quiz.

    Science.gov (United States)

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  4. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  5. Contactless vector network analysis using diversity calibration with capacitive and inductive coupled probes

    Directory of Open Access Journals (Sweden)

    T. Zelder

    2007-06-01

    Full Text Available Contactless vector network analysis based on a diversity calibration is investigated for the measurement of embedded devices in planar circuits. Conventional contactless measurement systems based on two probes for each measurement port have the disadvantage that the signal-to-noise system dynamics strongly depends on the distance between the contactless probes.

    In order to avoid a decrease in system dynamics a diversity based measurement system is presented. The measurement setup uses one inductive and two capacitive probes. As an inductive probe a half magnetic loop in combination with a broadband balun is introduced. In order to eliminate systematic errors from the measurement results a diversity calibration algorithm is presented. Simulation and measurement results for a one-port configuration are shown.

  6. Smart logistics

    NARCIS (Netherlands)

    Woensel, van T.

    2012-01-01

    This lecture focuses on Smart Logistics referring to these intelligent managerial decisions related to the design, operations and control of the transportation chain processes in an efficient and cost-effective way. The starting point for Smart Logistics is the key observation that the real-life

  7. Smart Money

    DEFF Research Database (Denmark)

    Avital, Michel; Hedman, Jonas; Albinsson, Lars

    2017-01-01

    transaction costs by providing seamless real-time payments. In addition, digital legal tender that is based on blockchain technology can provide a foundation for customizable “smart money” which can be used to manage the appropriation of money and its use. In essence, the smart money is a customizable value...

  8. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  9. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    Science.gov (United States)

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  10. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  11. Optimised to Fail: Card Readers for Online Banking

    Science.gov (United States)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  12. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  13. CONSIDERATIONS ON CONTACTLESS ELECTROMAGNETIC MEASUREMENT OF HUMIDITY IN PEDOLOGY

    Directory of Open Access Journals (Sweden)

    Tudor BURLAN-ROTAR

    2017-05-01

    Full Text Available To put into practice the conventional determination of resistivity by the galvanic method, requires a relatively large amount of labor and is, therefore, expensive. At the basis of any interpretation are the lateral or vertical variations of re sistivity. The high cost of resistivity maps execution generally means that fewer measurements are made than desirable, with the result that, either (i the explored area is not large enough to establish a reasonable background, against which the anomaly areas are to be delineated, or (ii the anomaly areas are obscure and lack definition. The application of electromagnetic techniques (EM for measuring soil resistivity or conductivity has been known for a long time. Conductivity is preferable in inductive techniques, as instrumentation readings are generally directly proportional to conductivity and inversely proportional to resistivity. The operating principle of this method is: a Tx coil transmitter, supplied with alternating current at an audio frequency, is placed on the ground. An Rx coil receiver is located at a short distance, s, away from the Tx coil. The magnetic field varies in time and the Tx coil induces very small currents in the ground. These currents generate a secondary magnetic field, Hs, which is sensed by the Rx receiver coil, together with primary magnetic field Hp. The ratio of the secondary field, Hs, to the primary magnetic field, Hp, (Hs/Hp is directly proportional to terrain conductivity. Measuring this ratio, it is possible to construct a device which measures the terrain conductivity by contactless, direct-reading electromagnetic technique. (linear meter. This latest technique for measuring conductivity by electromagnetic induction, using Very Low Frequency (VLF, is a non-invasive, non-destructive sampling method. The measurements can be done quickly and are not expensive. The Electromagnetic induction technology was originally developed for the mining industry, and has been used

  14. Smart biomaterials

    CERN Document Server

    Ebara, Mitsuhiro; Narain, Ravin; Idota, Naokazu; Kim, Young-Jin; Hoffman, John M; Uto, Koichiro; Aoyagi, Takao

    2014-01-01

    This book surveys smart biomaterials, exploring the properties, mechanics and characterization of hydrogels, particles, assemblies, surfaces, fibers and conjugates. Reviews applications such as drug delivery, tissue engineering, bioseparation and more.

  15. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  16. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  17. Study of the determination of inorganic arsenic species by CE with capacitively coupled contactless conductivity detection

    Czech Academy of Sciences Publication Activity Database

    Nguyen, H. T. A.; Kubáň, Pavel; Pham, V. H.; Hauser, P.C.

    2007-01-01

    Roč. 28, č. 19 (2007), s. 3500-3506 ISSN 0173-0835 Institutional research plan: CEZ:AV0Z40310501 Keywords : capillary electrophoresis * arsenic speciation * contactless conductivity detection Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 3.609, year: 2007

  18. New possibilities of complex "Thermodyn" application for contactless remote diagnostics in medical practice

    Science.gov (United States)

    Belov, M. Ye.; Shayko-Shaykovskiy, O. G.; Makhrova, Ye. G.; Kramar, V. M.; Oleksuik, I. S.

    2018-01-01

    We represent here the theoretical justifications, block scheme and experimental sample of a new automated complex "Thermodyn" for remote contactless diagnostics of inflammatory processes of the surfaces and in subcutaneous areas of human body. Also we described here the methods and results of diagnostic measurements, and results of practical applications of this complex.

  19. Fast Lamb wave energy shift approach using fully contactless ultrasonic system to characterize concrete structures

    Science.gov (United States)

    Ham, Suyun; Popovics, John S.

    2015-03-01

    Ultrasonic techniques provide an effective non-destructive evaluation (NDE) method to monitor concrete structures, but the need to perform rapid and accurate structural assessment requires evaluation of hundreds, or even thousands, of measurement datasets. Use of a fully contactless ultrasonic system can save time and labor through rapid implementation, and can enable automated and controlled data acquisition, for example through robotic scanning. Here we present results using a fully contactless ultrasonic system. This paper describes our efforts to develop a contactless ultrasonic guided wave NDE approach to detect and characterize delamination defects in concrete structures. The developed contactless sensors, controlled scanning system, and employed Multi-channel Analysis of Surface Waves (MASW) signal processing scheme are reviewed. Then a guided wave interpretation approach for MASW data is described. The presence of delamination is interpreted by guided plate wave (Lamb wave) behavior, where a shift in excited Lamb mode phase velocity, is monitored. Numerically simulated and experimental ultrasonic data collected from a concrete sample with simulated delamination defects are presented, where the occurrence of delamination is shown to be associated with a mode shift in Lamb wave energy.

  20. Design and implementation of a contactless multiple hand feature acquisition system

    Science.gov (United States)

    Zhao, Qiushi; Bu, Wei; Wu, Xiangqian; Zhang, David

    2012-06-01

    In this work, an integrated contactless multiple hand feature acquisition system is designed. The system can capture palmprint, palm vein, and palm dorsal vein images simultaneously. Moreover, the images are captured in a contactless manner, that is, users need not to touch any part of the device when capturing. Palmprint is imaged under visible illumination while palm vein and palm dorsal vein are imaged under near infrared (NIR) illumination. The capturing is controlled by computer and the whole process is less than 1 second, which is sufficient for online biometric systems. Based on this device, this paper also implements a contactless hand-based multimodal biometric system. Palmprint, palm vein, palm dorsal vein, finger vein, and hand geometry features are extracted from the captured images. After similarity measure, the matching scores are fused using weighted sum fusion rule. Experimental results show that although the verification accuracy of each uni-modality is not as high as that of state-of-the-art, the fusion result is superior to most of the existing hand-based biometric systems. This result indicates that the proposed device is competent in the application of contactless multimodal hand-based biometrics.

  1. 20th anniversary of axial capacitively coupled contactless conductivity detection in capillary electrophoresis

    Czech Academy of Sciences Publication Activity Database

    Kubáň, Pavel; Hauser, P.C.

    2018-01-01

    Roč. 102, MAY (2018), s. 311-321 ISSN 0165-9936 R&D Projects: GA ČR(CZ) GA16-09135S Institutional support: RVO:68081715 Keywords : contactless conductivity detection * analytical techniques * review Subject RIV: CB - Analytical Chemistry, Separation OBOR OECD: Analytical chemistry Impact factor: 8.442, year: 2016

  2. 20th anniversary of axial capacitively coupled contactless conductivity detection in capillary electrophoresis

    Czech Academy of Sciences Publication Activity Database

    Kubáň, Pavel; Hauser, P.C.

    2018-01-01

    Roč. 102, MAY (2018), s. 311-321 ISSN 0165-9936 R&D Projects: GA ČR(CZ) GA16-09135S Institutional support: RVO:68081715 Keywords : contactless conductivity detection * analytical techniques * review Subject RIV: CB - Analytical Chemistry , Separation OBOR OECD: Analytical chemistry Impact factor: 8.442, year: 2016

  3. Contactless multiple wavelength photoplethysmographic imaging: a first step toward "spO2 camera" technology

    NARCIS (Netherlands)

    Wieringa, F.P.; Mastik, F.; Steen, A.F.W. van der

    2005-01-01

    We describe a route toward contactless imaging of arterial oxygen saturation (SpO2) distribution within tissue, based upon detection of a two-dimensional matrix of spatially resolved optical plethysmographic signals at different wavelengths. As a first step toward SpO 2-imaging we built a monochrome

  4. SMART core protection system design

    International Nuclear Information System (INIS)

    Lee, J. K.; Park, H. Y.; Koo, I. S.; Park, H. S.; Kim, J. S.; Son, C. H.

    2003-01-01

    SMART COre Protection System(SCOPS) is designed with real-tims Digital Signal Processor(DSP) board and Network Interface Card(NIC) board. SCOPS has a Control Rod POSition (CRPOS) software module while Core Protection Calculator System(CPCS) consists of Core Protection Calculators(CPCs) and Control Element Assembly(CEA) Calculators(CEACs) in the commercial nuclear plant. It's not necessary to have a independent cabinets for SCOPS because SCOPS is physically very small. Then SCOPS is designed to share the cabinets with Plant Protection System(PPS) of SMART. Therefor it's very easy to maintain the system because CRPOS module is used instead of the computer with operating system

  5. Vehicle Fault Diagnose Based on Smart Sensor

    Science.gov (United States)

    Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng

    In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.

  6. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  7. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  8. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  9. Simple, heart-smart substitutions

    Science.gov (United States)

    Coronary artery disease - heart smart substitutions; Atherosclerosis - heart smart substitutions; Cholesterol - heart smart substitutions; Coronary heart disease - heart smart substitutions; Healthy diet - heart ...

  10. Formalizing the Safety of Java, the Java Virtual Machine and Java Card

    NARCIS (Netherlands)

    Hartel, Pieter H.; Moreau, Luc

    2001-01-01

    We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smart cards. The conclusion is that while a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine readable

  11. Japanese Tarot Cards

    Directory of Open Access Journals (Sweden)

    Laura Miller

    2017-04-01

    Full Text Available This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced with images from the world of Japanese art, history, and popular culture. These substitutions either gloss over the gaps between Western and Japanese world views or meld them into a new form, allowing the tarot entry into a different or hybrid metaphysical culture. Attention to tarot cards is important because of their great economic and cultural impact in contemporary Japan. A widespread love of tarot in Japan provides insight into domains of pleasure, spiritual exploration, and fandom.

  12. Japanese Tarot Cards

    OpenAIRE

    Laura Miller

    2017-01-01

    This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced wit...

  13. SMART PHONE USER ASSISTANCE APPLICATION FOR ANDROID

    Directory of Open Access Journals (Sweden)

    P. PRABHAVATHY

    2015-09-01

    Full Text Available Nowadays people seem to be more dependent on smart phones rather than any other electronic devices. Smart phones act like mini laptops with the mobilecommunication facility. Moreover, people possess more than one SIM card/Smart phone for many purposes. So non-ambiguity between various roles performed by them is crucial. For an example, person can have smart phone for his personal use at the residence and another phone for his official use. Consider a scenario: person at the residence urgently needs the official contact information available on the phone at his office (remote place. This application plays major dual role by acting as Server (official Smart phone and Client (personal Smart phone. Irrespective of geographic area, the server smart phone (SSP provides various services based on the request received from the client smart phone (CSP. The CSP send various requests through the SMS communication. Various requests can be fetching information from SSP such as log for unread messages and missed calls, unread message content, contact numbers, SIM and IMEI numbers. When the SSP is on silent mode and got misplaced, the CSP can be used to change the sound profile of SSP from silent to ringing mode by sending a request through SMS. If the SSP is in audible distance, then a phone call to it will help us to find the misplaced phone. Besides, the CSP can delete secret data available in the SSP’s memory. This application is different from other applications because it provides User Interface having options to send request through SMS and web database login through internet connectivity for phone’s data backup to provide unlimited memory. Upload any information such as contacts and messages from the smart phone into web database and save phone’s memory space. This application will upload the information in encoded format over the internet, which can be decoded using the application’s login password for security purpose.

  14. Investigating the Activities of Children toward a Smart Storytelling Toy

    Science.gov (United States)

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2013-01-01

    This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…

  15. Smart Beta or Smart Alpha

    DEFF Research Database (Denmark)

    Winther, Kenneth Lillelund; Steenstrup, Søren Resen

    2016-01-01

    that smart beta investing probably will do better than passive market capitalization investing over time, we believe many are coming to a conclusion too quickly regarding active managers. Institutional investors are able to guide managers through benchmarks and risk frameworks toward the same well......Smart beta has become the flavor of the decade in the investment world with its low fees, easy access to rewarded risk premiums, and appearance of providing good investment results relative to both traditional passive benchmarks and actively managed funds. Although we consider it well documented......-documented smart beta risk premiums and still motivate active managers to avoid value traps, too highly priced small caps, defensives, etc. By constructing the equity portfolios of active managers that resemble the most widely used risk premiums, we show that the returns and risk-adjusted returns measures...

  16. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  17. User Centric Design of an NFC Mobile Wallet Framework

    OpenAIRE

    Kabir, Ziaul

    2011-01-01

    Near Field Communication (NFC) among various other things, allows end-users to enjoy contactless mobile services such as credit cards, transport tickets, office access etc. using NFC mobile phones. Such services are placed as software applications inside the secure-chip hardware of the NFC phone – often termed as a Secure Element (SE). Bringing these contactless smart-card services into mobile phones raises the need to allow the end-users to interact and control the information and the commun...

  18. Smart roadside.

    Science.gov (United States)

    2012-01-01

    Smart Roadside is a system envisioned to be deployed at strategic points along commercial vehicle routes to : improve the safety, mobility, and efficiency of truck movement and operations on the roadway. It is a concept : where private- and public-se...

  19. Smart Surroundings

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Jansen, P.G.; Lijding, M.E.M.; Scholten, Johan

    2004-01-01

    Ambient systems are networked embedded systems integrated with everyday environments and supporting people in their activities. These systems will create a Smart Surrounding for people to facilitate and enrich daily life and increase productivity at work. Such systems will be quite different from

  20. Design of Contactlessly Powered and Piezoelectrically Actuated Tools for Non-Resonant Vibration Assisted Milling

    Directory of Open Access Journals (Sweden)

    Martin Silge

    2018-04-01

    Full Text Available This contribution presents a novel design approach for vibration assisted machining (VAM. A lot of research has already been done regarding the influence of superimposed vibrations during a milling process, but there is almost no information about how to design a VAM tool where the tool is actually rotating. The proposed system consists of a piezoelectric actuator for vibration excitation, an inductive contactless energy transfer system and an electronic circuit for powering the actuated tool. The main benefit of transferring the required power without mechanical contact is that the maximum spindle speed is no longer restricted by friction of slip rings. A detailed model is shown that enables for preliminary estimation of the system’s response to different excitation signals. Experimental data are provided to validate the model. Finally, some parts are shown that have been manufactured using the contactlessly actuated milling tool.

  1. Proposal of an innovative benchmark for comparison of the performance of contactless digitizers

    Science.gov (United States)

    Iuliano, Luca; Minetola, Paolo; Salmi, Alessandro

    2010-10-01

    Thanks to the improving performances of 3D optical scanners, in terms of accuracy and repeatability, reverse engineering applications have extended from CAD model design or reconstruction to quality control. Today, contactless digitizing devices constitute a good alternative to coordinate measuring machines (CMMs) for the inspection of certain parts. The German guideline VDI/VDE 2634 is the only reference to evaluate whether 3D optical measuring systems comply with the declared or required performance specifications. Nevertheless it is difficult to compare the performance of different scanners referring to such a guideline. An adequate novel benchmark is proposed in this paper: focusing on the inspection of production tools (moulds), the innovative test piece was designed using common geometries and free-form surfaces. The reference part is intended to be employed for the evaluation of the performance of several contactless digitizing devices in computer-aided inspection, considering dimensional and geometrical tolerances as well as other quantitative and qualitative criteria.

  2. Proposal of an innovative benchmark for comparison of the performance of contactless digitizers

    International Nuclear Information System (INIS)

    Iuliano, Luca; Minetola, Paolo; Salmi, Alessandro

    2010-01-01

    Thanks to the improving performances of 3D optical scanners, in terms of accuracy and repeatability, reverse engineering applications have extended from CAD model design or reconstruction to quality control. Today, contactless digitizing devices constitute a good alternative to coordinate measuring machines (CMMs) for the inspection of certain parts. The German guideline VDI/VDE 2634 is the only reference to evaluate whether 3D optical measuring systems comply with the declared or required performance specifications. Nevertheless it is difficult to compare the performance of different scanners referring to such a guideline. An adequate novel benchmark is proposed in this paper: focusing on the inspection of production tools (moulds), the innovative test piece was designed using common geometries and free-form surfaces. The reference part is intended to be employed for the evaluation of the performance of several contactless digitizing devices in computer-aided inspection, considering dimensional and geometrical tolerances as well as other quantitative and qualitative criteria

  3. Contactless Investigations of Yeast Cell Cultivation in the 7 GHz and 240 GHz Ranges

    International Nuclear Information System (INIS)

    Wessel, J; Schmalz, K; Meliani, C; Gastrock, G; Cahill, B P

    2013-01-01

    Using a microfluidic system based on PTFE tubes, experimental results of contactless and label-free characterization techniques of yeast cell cultivation are presented. The PTFE tube has an inner diameter of 0.5 mm resulting in a sample volume of 2 μ1 for 1 cm sample length. Two approaches (at frequencies around 7 GHz and 240 GHz) are presented and compared in terms of sensitivity and applicability. These frequency bands are particularly interesting to gain information on the permittivity of yeast cells in Glucose solution. Measurements from 240 GHz to 300 GHz were conducted with a continuous wave spectrometer from Toptica. At 7 GHz band, measurements have been performed using a rat-race based characterizing system realized on a printed circuit board. The conducted experiments demonstrate that by selecting the phase as characterization parameter, the presented contactless and label-free techniques are suitable for cell cultivation monitoring in a PTFE pipe based microfluidic system.

  4. Morphing Surfaces Enable Acoustophoretic Contactless Transport of Ultrahigh-Density Matter in Air

    Science.gov (United States)

    Foresti, Daniele; Sambatakakis, Giorgio; Bottan, Simone; Poulikakos, Dimos

    2013-01-01

    The controlled contactless transport of heavy drops and particles in air is of fundamental interest and has significant application potential. Acoustic forces do not rely on special material properties, but their utility in transporting heavy matter in air has been restricted by low power and poor controllability. Here we present a new concept of acoustophoresis, based on the morphing of a deformable reflector, which exploits the low reaction forces and low relaxation time of a liquid with enhanced surface tension through the use of thin overlaid membrane. An acoustically induced, mobile deformation (dimple) on the reflector surface enhances the acoustic field emitted by a line of discretized emitters and enables the countinuos motion of heavy levitated samples. With such interplay of emitters and reflecting soft-structure, a 5 mm steel sphere (0.5 grams) was contactlessly transported in air solely by acoustophoresis. PMID:24212104

  5. Analysis of arecoline in Semen Arecae decoction pieces by microchip capillary electrophoresis with contactless conductivity detection

    Directory of Open Access Journals (Sweden)

    Zi-You Cai

    2012-10-01

    Full Text Available A new method for the determination of arecoline in Semen Arecae decoction pieces by microchip capillary electrophoresis with contactless conductivity detection (MCE-CCD was proposed. The effects of various electrophoretic operating parameters on the analysis of arecoline were studied. Under the optimal conditions, arecoline was rapidly separated and detected in 1 min with good linearity over the concentration range of 20–1500 μM (r2=0.9991 and the detection limit of 5 μM (S/N=3. The method was used for the analysis of arecoline satisfactorily with a recovery of 96.8–104%. Keywords: Microchip capillary electrophoresis, Contactless conductivity detection, Arecoline, Semen Arecae

  6. Hydrodynamics during melting of an electroconductive sample in microgravity conditions under contactless positioning by electromagnetic forces

    Science.gov (United States)

    Korovin, V. M.

    MHD-flow during melting of a spherical metal sample under contactless positioning by alternating magnetic field produced by two circular turns with currents, is investigated. It is shown that when the currents supplying the turns are opposite in direction, electromagnetic forces, originating from the interaction of the Foucault currents with alternating magnetic field, induce two torus-like eddies in the interior of the molten metal drop.

  7. Determination of gamma-hydroxybutyric acid in clinical samples using capillary electrophoresis with contactless conductivity detection

    Czech Academy of Sciences Publication Activity Database

    Gong, X.Y.; Kubáň, Pavel; Scholer, A.; Hauser, P.C.

    2008-01-01

    Roč. 1213, 1-2 (2008), s. 100-104 ISSN 0021-9673 R&D Projects: GA AV ČR IAA400310609; GA AV ČR IAA400310703; GA ČR GA203/08/1536 Institutional research plan: CEZ:AV0Z40310501 Keywords : clinical samples * capillary electrophoresis * contactless conductivity detection Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 3.756, year: 2008

  8. Online Behavior and Loyalty Program Participation-parameters Influencing the Acceptance of Contactless Payment Devices

    OpenAIRE

    Martin Fiedler; Ali Öztüren

    2014-01-01

    This study explores the central perceptions of consumers influencing the decision to use contactless payment instruments. Aim is to define a customer core group narrowed down by several variables and to find a basis for a purposeful communication of advantages of the new payment process, as investment into this technology bears the risk of total loss if the customer group is declining acceptance and the image of a company might be excessively damaged. External variables in context with the us...

  9. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  10. Palmprint and Palmvein Recognition Based on DCNN and A New Large-Scale Contactless Palmvein Dataset

    Directory of Open Access Journals (Sweden)

    Lin Zhang

    2018-03-01

    Full Text Available Among the members of biometric identifiers, the palmprint and the palmvein have received significant attention due to their stability, uniqueness, and non-intrusiveness. In this paper, we investigate the problem of palmprint/palmvein recognition and propose a Deep Convolutional Neural Network (DCNN based scheme, namely P a l m R CNN (short for palmprint/palmvein recognition using CNNs. The effectiveness and efficiency of P a l m R CNN have been verified through extensive experiments conducted on benchmark datasets. In addition, though substantial effort has been devoted to palmvein recognition, it is still quite difficult for the researchers to know the potential discriminating capability of the contactless palmvein. One of the root reasons is that a large-scale and publicly available dataset comprising high-quality, contactless palmvein images is still lacking. To this end, a user-friendly acquisition device for collecting high quality contactless palmvein images is at first designed and developed in this work. Then, a large-scale palmvein image dataset is established, comprising 12,000 images acquired from 600 different palms in two separate collection sessions. The collected dataset now is publicly available.

  11. Investigation of contactless detection using a giant magnetoresistance sensor for detecting prostate specific antigen.

    Science.gov (United States)

    Sun, Xuecheng; Zhi, Shaotao; Lei, Chong; Zhou, Yong

    2016-08-01

    This paper presents a contactless detection method for detecting prostate specific antigen with a giant magnetoresistance sensor. In contactless detection case, the prostate specific antigen sample preparation was separated from the sensor that prevented the sensor from being immersed in chemical solvents, and made the sensor implementing in immediately reuse without wash. Experimental results showed that applied an external magnetic field in a range of 50 Oe to 90 Oe, Dynabeads with a concentration as low as 0.1 μg/mL can be detected by this system and could give an approximate quantitation to the logarithmic of Dynabeads concentration. Sandwich immunoassay was employed for preparing PSA samples. The PSA capture was implemented on a gold film modified with a self-assembled monolayer and using biotinylated secondary antibody against PSA and streptavidinylated Dynabeads. With DC magnetic field in the range of 50 to 90 Oe, PSA can be detected with a detection limit as low as 0.1 ng/mL. Samples spiked with different concentrations of PSA can be distinguished clearly. Due to the contactless detection method, the detection system exhibited advantages such as convenient manipulation, reusable, inexpensive, small weight. So, this detection method was a promising candidate in biomarker detection, especially in point of care detection.

  12. Smart governance for smart city

    Science.gov (United States)

    Mutiara, Dewi; Yuniarti, Siti; Pratama, Bambang

    2018-03-01

    Some of the local government in Indonesia claimed they already created a smart city. Mostly the claim based of IT utilization for their governance. In general, a smart city definition is to describe a developed urban area that creates sustainable economic development and high quality of life by excelling in multiple key; economy, mobility, environment, people, living, and government. For public services, the law guarantees good governance by setting the standard for e-government implicitly including for local government or a city. Based on the arguments, this research tries to test the condition of e-government of the Indonesian city in 34 provinces. The purpose is to map e-government condition by measuring indicators of smart government, which are: transparent governance and open data for the public. This research is departing from public information disclosure law and to correspond with the existence law. By examining government transparency, the output of the research can be used to measure the effectiveness of public information disclosure law and to determine the condition of e-government in local government in which as part of a smart city.

  13. GET SMART: EPA'S SMARTE INITIATIVE

    Science.gov (United States)

    The EPA's Office of Research and Development with the assistance of the U.S.-German Bilateral Working Group and the Interstate Technology Regulatory Council (ITRC), is developing Site-specific Management Approaches and Revitalization Tools (SMART) that will help stakeholders over...

  14. Investigation into Plastic Cards

    Directory of Open Access Journals (Sweden)

    Neringa Stašelytė

    2015-03-01

    Full Text Available The article examines the strength of laminating plastic cards at different lamination temperatures. For investigation purposes, two types of plastic substrate and films have been used. Laminate strength has been tested (CMYK to establish the impact of colours on the strength of laminate. The paper compares inks supplied by two different producers. The colour characteristics of CIE L*a*b* space before and after the lamination process have been found. According to lamination strength and characteristics of the colours, the most suitable inks, temperature and films have been chosen.

  15. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  16. Slovenian national health insurance card: the next step.

    Science.gov (United States)

    Kalin, T; Kandus, G; Trcek, D; Zupan, B

    1999-01-01

    The Slovenian national health insurance company started a full-scale deployment of the insurance smart card that is at the present used for insurance data and identification purpose only. There is ample capacity on the cards that were selected, to contain much more data than needed for the purely administrative and charging purposes. There are plans to include some basic medical information, donor information, etc. On the other hand, there are no firm plans to use the security infrastructure and the extensive network, connecting the insurance company with the more than 200 self service terminals positioned at the medical facilities through the country to build an integrated medical information system that would be very beneficial to the patients and the medical community. This paper is proposing some possible future developments and further discusses on the security issues involved with such countrywide medical information system.

  17. E-COMMERCE WITH ONLINE PAYMENT THROUGH BANK CARD

    Directory of Open Access Journals (Sweden)

    OANA ŞEITAN

    2010-01-01

    Full Text Available The e-commerce has become a routine part of human life because it offers major advantages: convenience (it’s no longer necessary to visit a store to be able to shop, efficiency (the buyer can visit several virtual shops in a very short time, the crowd of shops and the frustration caused by the lack of parking spaces available can be avoided, the customer can choose and compare the desired products taking in consideration a set of characteristics such as price, grammage, color, delivery dat, etc. and the development of secure solutions for online payment (through: bank cards, ePay, cybercash, SmartCard, electronic funds transfer, Ecash. In the last decade, the electronic payment systems have been improved, reaching high levels of security and speed, acquiring a private, confidential, decentralization and internationalization character.

  18. Retention of data in heat-damaged SIM cards and potential recovery methods.

    Science.gov (United States)

    Jones, B J; Kenyon, A J

    2008-05-02

    Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.

  19. Smart Factory

    DEFF Research Database (Denmark)

    Bilberg, Arne; Radziwon, Agnieszka; Grube Hansen, David

    2017-01-01

    their innovation and competitive advantage by focusing at their competences, strengths and opportunities. The project suggests innovative solutions and business models through collaboration and use of new technologies. In the Smart Factory, SMEs should be able to collaborate on new products, markets and production......, and to target their challenges and ensure sustainable growth and business in these enterprises. Therefore the focus of the Smart Factory project was to support the growth and sustainable development of the small and medium sized manufacturing industry in Denmark. The project focused on SMEs and how to improve......A large part of Danish Industry is based on Small and Medium Sized Enterprises (SMEs), which account for –99% of the companies in Denmark and about two third of the job positions (source: statistikbanken.dk) . That is why, it is so important also to focus research and development at SMEs...

  20. Smart technology

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1991-01-01

    The success of smart technology in the pursuit of the Gulf War has accentuated the awareness of how the Safeguards and Security disciplines are changing in response to new weaponry. Throughout the Department of Energy Integrated Complex (IC) Safeguards and Security efforts such as: Protection Programs Operations; Materials, Controls and Accountability; Information Security; Computer Security; Operational Security; Personnel Security, Safeguards and/or Security (S and S) surveys, and Inspections and Evaluations are undergoing a reassessment and refocusing. Some of this is in response to such things as the DOE initiated Freeze Report and the Drell Report. An important aspect is also technological, adjusting the way business is done in light of the weapons, tools and processes/procedures becoming available. This paper addresses the S and S issues with the promise of using smart technology to develop new approaches and equipment across the IC

  1. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  2. Measuring Passenger Travel Time Reliability Using Smart Card Data

    NARCIS (Netherlands)

    Bagherian, M.; Cats, O.; van Oort, N.; Hickman, M

    2016-01-01

    Service reliability is a key performance measure for transit agencies in increasing their service quality and thus ridership. Conventional reliability metrics are established based on vehicle movements and thus do not adequately reflect passenger’s experience. In the past few years, the growing

  3. Biometrics and smart card based applications for nuclear industry

    International Nuclear Information System (INIS)

    Nishanth Reddy, J.; Dheeraj Reddy, J.; Narender Reddy, J.

    2004-01-01

    Biometrics has emerged as a convenient, foolproof and well-accepted technology for identification around the globe. Nucleonix has developed innovative solutions based on finger scan biometrics for various industries. This paper closely looks into the application areas for the nuclear industry and how it will benefit this industry, in terms of identification, access control, security of PCs and applications, attendance, machinery usage control and other custom applications. (author)

  4. The Virtual University: A Smart Card Approach to Education?

    Science.gov (United States)

    Recker, Mimi

    1998-01-01

    Argues that the emergence of digital marketplaces for learning has broad implications for the standardization and commercialization of education. Defines the concept of the virtual university and discusses how traditional institutions could be reconceived by adopting an alternative model. (PEN)

  5. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  6. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    2002-01-01

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  7. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  8. Smart Growth and Transportation

    Science.gov (United States)

    Describes the relationship between smart growth and transportation, focusing smart and sustainable street design, transit-oriented development, parking management, sustainable transportation planning, and related resources.

  9. Deep smarts.

    Science.gov (United States)

    Leonard, Dorothy; Swap, Walter

    2004-09-01

    When a person sizes up a complex situation and rapidly comes to a decision that proves to be not just good but brilliant, you think, "That was smart." After you watch him do this a few times, you realize you're in the presence of something special. It's not raw brainpower, though that helps. It's not emotional intelligence, either, though that, too, is often involved. It's deep smarts. Deep smarts are not philosophical--they're not"wisdom" in that sense, but they're as close to wisdom as business gets. You see them in the manager who understands when and how to move into a new international market, in the executive who knows just what kind of talk to give when her organization is in crisis, in the technician who can track a product failure back to an interaction between independently produced elements. These are people whose knowledge would be hard to purchase on the open market. Their insight is based on know-how more than on know-what; it comprises a system view as well as expertise in individual areas. Because deep smarts are experienced based and often context specific, they can't be produced overnight or readily imported into an organization. It takes years for an individual to develop them--and no time at all for an organization to lose them when a valued veteran walks out the door. They can be taught, however, with the right techniques. Drawing on their forthcoming book Deep Smarts, Dorothy Leonard and Walter Swap say the best way to transfer such expertise to novices--and, on a larger scale, to make individual knowledge institutional--isn't through PowerPoint slides, a Web site of best practices, online training, project reports, or lectures. Rather, the sage needs to teach the neophyte individually how to draw wisdom from experience. Companies have to be willing to dedicate time and effort to such extensive training, but the investment more than pays for itself.

  10. Smart Pricing for Smart Grid

    OpenAIRE

    Wang, Zhimin

    2014-01-01

    Flat-rate electricity tariffs in Great Britain, which have no price variation throughout a day or a year, have been ongoing for decades to recover the cost of energy production and delivery. However, this type of electricity tariff has little incentives to encourage customers to modify their demands to suit the condition of the power supply system. Hence, it is challenged in the new smart grid environment, where demand side responses have important roles to play to encourage conventional ener...

  11. Smart Money

    DEFF Research Database (Denmark)

    Avital, Michel; Hedman, Jonas; Albinsson, Lars

    2017-01-01

    Legal tender in the form of coins and banknotes is expected to be replaced at one point in the future by digital legal tender. This transformation is an opportunity for central banks to rethink the idea of money and overhaul the prevailing payment systems. Digital legal tender is expected to reduce...... exchange instrument that relies on computer protocols to facilitate, verify, and enforce certain conditions for its appropriation as payment, e.g. who may use the money, where, and for what. If we believe that digital legal tender will become ubiquitous, then the emergence and diffusion of smart money...

  12. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  13. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  14. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  15. SIMULASI SISTEM KELISTRIKAN KAMAR HOTEL MENGGUNAKAN SMART RELAY

    Directory of Open Access Journals (Sweden)

    I Nyoman Sukarma

    2018-03-01

    Full Text Available Fungsi dari alat key tag atau hotel switch atau key card adalah memutus atau menyambungkan aliran listrik ke dalam suatu area tertentu atau ruang. Key tag memiliki peran penting pada kamar hotel untuk mencegah pemborosan energi pada saat kamar hotel tidak berpenghuni atau belum tersewakan. Untuk itu, penulis merancang simulasi sistem kelistrikan pada kamar hotel yang dikontrol dengan smart relay. Pada simulasi ini digunakan smart relay Zelio Logic buatan Schneider Electric. Pemrograman smart relay ini menggunakan ladder diagram yang disusun menggunakan perangkat lunak ZelioSoft2 dari Schneider Electric. Smart relay menerima sinyal masukan dari sensor, key tag dan sakelar. Sinyal masukan tersebut selanjutnya diproses agar lampu, kotak-kontak, exhaust fan, dan AC (Air Conditioner pada kamar hotel dapat bekerja.

  16. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  17. Combined Simulation of a Micro Permanent Magnetic Linear Contactless Displacement Sensor

    Directory of Open Access Journals (Sweden)

    Jing Gao

    2010-09-01

    Full Text Available The permanent magnetic linear contactless displacement (PLCD sensor is a new type of displacement sensor operating on the magnetic inductive principle. It has many excellent properties and has already been used for many applications. In this article a Micro-PLCD sensor which can be used for microelectromechanical system (MEMS measurements is designed and simulated with the CST EM STUDIO® software, including building a virtual model, magnetostatic calculations, low frequency calculations, steady current calculations and thermal calculations. The influence of some important parameters such as air gap dimension, working frequency, coil current and eddy currents etc. is studied in depth.

  18. Contactless graphene conductance measurements: the effect of device fabrication on terahertz time-domain spectroscopy

    DEFF Research Database (Denmark)

    Mackenzie, David; Buron, Jonas Christian Due; Bøggild, Peter

    2016-01-01

    We perform contactless full-wafer maps of the electrical conductance of a 4-inch wafer of single-layer CVD graphene using terahertz time-domain spectroscopy both before and after deposition of metal contacts and fabrication of devices via laser ablation. We find that there is no significant change...... in the measured conductance of graphene before and after device fabrication. We also show that precise terahertz time-domain spectroscopy can be performed when the beam spot is at sufficient distance (>1.2 mm) from metal contacts....

  19. Contactless measurement of muscles fatigue by tracking facial feature points in a video

    DEFF Research Database (Denmark)

    Irani, Ramin; Nasrollahi, Kamal; Moeslund, Thomas B.

    2014-01-01

    their exercises when the level of the fatigue might be dangerous for the patients. The current technology for measuring tiredness, like Electromyography (EMG), requires installing some sensors on the body. In some applications, like remote patient monitoring, this however might not be possible. To deal...... with such cases, in this paper we present a contactless method based on computer vision techniques to measure tiredness by detecting, tracking, and analyzing some facial feature points during the exercise. Experimental results on several test subjects and comparing them against ground truth data show...... that the proposed system can properly find the temporal point of tiredness of the muscles when the test subjects are doing physical exercises....

  20. A contactless positioning system for monitoring discontinuities in three dimensions with geological and geotechnical applications

    Czech Academy of Sciences Publication Activity Database

    Rinaldi-Montes, N.; Rowberry, Matthew David; Frontera, C.; Baroň, I.; Garcés, G.; Blahůt, Jan; Pérez-López, R.; Pennos, C.; Martí, Xavier

    2017-01-01

    Roč. 88, č. 7 (2017), č. článku 074501. ISSN 0034-6748 R&D Projects: GA MŠk LM2010008 Institutional support: RVO:67985891 ; RVO:68378271 Keywords : mechanical discontinuities * contactless positioning system * magnetoresistive sensing * geotechnical engineering * structural health monitoring Subject RIV: JB - Sensors, Measurment, Regulation; BM - Solid Matter Physics ; Magnetism (FZU-D) OBOR OECD: Environmental and geological engineering , geotechnics; Condensed matter physics (including formerly solid state physics, supercond.) (FZU-D) Impact factor: 1.515, year: 2016

  1. Contactless Inductive Flow Tomography: Brief History and Recent Developments in Its Application to Continuous Casting

    Directory of Open Access Journals (Sweden)

    Matthias Ratajczak

    2014-01-01

    Full Text Available The contactless inductive flow tomography (CIFT aims at reconstructing the velocity field of electrically conducting fluids, with special focus on applications in metallurgy and crystal growth technologies. The method relies on the induction of secondary magnetic fields if the moving fluid is exposed to a primary magnetic field. The theoretical foundation of the method is delineated, and some early experiments on the reconstruction of the three-dimensional flow in a cylinder are sketched. Then, the recent efforts to apply CIFT to various model problems in connection with the continuous casting of steel are summarized.

  2. A simple contactless impedance probe for determination of ethanol in gasoline

    International Nuclear Information System (INIS)

    Opekar, F.; Cabala, R.; Kadlecova, T.

    2011-01-01

    A contactless impedance probe with either a planar or a tubular detection cell has been developed and tested for rapid determination of the ethanol content in gasoline. The probe cell is connected as a capacitor determining the frequency of an electronic astable multivibrator. The multivibrator frequency depends on the permittivity of the test gasoline in the detection cell which is strongly influenced by the ethanol content as one of the major polar additives. The ethanol concentrations obtained with the impedance probe agree, within the reliability interval, with those obtained by GC-MS measurements and fall into the limits recommended by the appropriate European Standard. The gasoline samples are analyzed without any pretreatment.

  3. Analysis of ecstasy tablets using capillary electrophoresis with capacitively coupled contactless conductivity detection.

    Science.gov (United States)

    Porto, Suely K S S; Nogueira, Thiago; Blanes, Lucas; Doble, Philip; Sabino, Bruno D; do Lago, Claudimir L; Angnes, Lúcio

    2014-11-01

    A method for the identification of 3,4-methylenedioxymethamphetamine (MDMA) and meta-chlorophenylpiperazine (mCPP) was developed employing capillary electrophoresis (CE) with capacitively coupled contactless conductivity detection (C(4) D). Sample extraction, separation, and detection of "Ecstasy" tablets were performed in fenproporex, caffeine, lidocaine, and cocaine. Separation was performed in <90 sec. The advantages of using C(4) D instead of traditional CE-UV methods for in-field analysis are also discussed. © 2014 American Academy of Forensic Sciences.

  4. 10 kW Contactless Power Transfer System for Rapid Charger of Electric Vehicle

    OpenAIRE

    Yamanaka, Tomohiro; Kaneko, Yasuyoshi; Abe, Shigeru; Yasuda, Tomio

    2012-01-01

    A contactless power transfer system for charging electric vehicles requires a high efficiency, a large air gap, and a good tolerance to lateral misalignment and needs to be compact and lightweight. A double-sided winding 10 kW transformer based on a 1.5 kW H-shaped core transformer was developed for a rapid charger. Even though the transformer capacity was increased, the dimensions of the 10 kW transformer were almost the same as those of the 1.5 kW transformer. In this paper, the design conc...

  5. Contactless ignition device for an internal combustion engine. Kontaktfreie Zuendanlage fuer eine Brennkraftmaschine

    Energy Technology Data Exchange (ETDEWEB)

    Ohki, Y; Komiya, H

    1980-01-16

    The invention deals with the design of a contactless ignition device with semiconductor elements of the induction discharge type, provided with a self actuator. A short circuit current of the primary transformer coil flows through the transistor system. The emitter is capacitively connected with the primary transformer coil. When the primary short circuit current reaches its maximum, the circuit is interrupted and the ignition begins. Changes of the short circuit current are monitored. The ignition time can be pre-selected. The ignition process is independent from the engine speed.

  6. Smart energy and smart energy systems

    DEFF Research Database (Denmark)

    Lund, Henrik; Østergaard, Poul Alberg; Connolly, David

    2017-01-01

    In recent years, the terms “Smart Energy” and “Smart Energy Systems” have been used to express an approach that reaches broader than the term “Smart grid”. Where Smart Grids focus primarily on the electricity sector, Smart Energy Systems take an integrated holistic focus on the inclusion of more...... sectors (electricity, heating, cooling, industry, buildings and transportation) and allows for the identification of more achievable and affordable solutions to the transformation into future renewable and sustainable energy solutions. This paper first makes a review of the scientific literature within...... the field. Thereafter it discusses the term Smart Energy Systems with regard to the issues of definition, identification of solu- tions, modelling, and integration of storage. The conclusion is that the Smart Energy System concept represents a scientific shift in paradigms away from single-sector thinking...

  7. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  8. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  10. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  11. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  12. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  14. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  15. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  16. Card counting in continuous time

    OpenAIRE

    Andersson, Patrik

    2012-01-01

    We consider the problem of finding an optimal betting strategy for a house-banked casino card game that is played for several coups before reshuffling. The sampling without replacement makes it possible to take advantage of the changes in the expected value as the deck is depleted, making large bets when the game is advantageous. Using such a strategy, which is easy to implement, is known as card counting. We consider the case of a large number of decks, making an approximat...

  17. Play the European card

    International Nuclear Information System (INIS)

    Majewski, O.

    1999-01-01

    Dr. Otto Majewski, Chief Executive Officer of the Bayernwerk AG utility, in his capacity as Chairman of the European Nuclear Council pointed out at ENC 98 in Nice that national energy policies constituted a major danger to the use of nuclear power. At the same time, he indicated ways and means by which to evade that danger. The decisions taken in Sweden and in the Federal Republic of Germany to opt out of the use of nuclear power show that national energy policies can seriously jeopardize the use of nuclear power. Bayernwerk CEO Dr. Majewski urged nuclear power plant operators to counteract these tendencies by playing the European card. Nuclear power anyway was a classical topic of European cooperation which, in the past, had resulted in higher safety standards and in the development of the EPR. It should also be attempted, by working on European institutions, to strengthen the use of nuclear power, even on a national level. He invoked economic arguments against nuclear opponents, especially the preservation of competitiveness by means of lower electricity prices, and arguments of climate protection. (orig.) [de

  18. Smarter energy from smart metering to the smart grid

    CERN Document Server

    Sun, Hongjian; Poor, H Vincent; Carpanini, Laurence; Fornié, Miguel Angel Sánchez

    2016-01-01

    This book presents cutting-edge perspectives and research results in smart energy spanning multiple disciplines across four main topics: smart metering, smart grid modeling, control and optimisation, and smart grid communications and networking.

  19. Smart Houses

    Science.gov (United States)

    1987-01-01

    GWS takes plans for a new home and subjects them to intensive computerized analysis that does 10,000 calculations relative to expected heat loss and heat gain, then provides specifications designed specifically for each structure as to heating, cooling, ventilation and insulation. As construction progresses, GWS inspects the work of the electrical, plumbing and insulation contractors and installs its own Smart House Radiant Barrier. On completion of the home, GWS technicians use a machine that creates a vacuum in the house and enables computer calculation of the air exchanged, a measure of energy efficiency. Key factor is the radiant barrier, borrowed from the Apollo program. This is an adaptation of a highly effective aluminized heat shield as a radiation barrier holding in or keeping out heat, cold air and water vapor.

  20. Smart Manufacturing.

    Science.gov (United States)

    Davis, Jim; Edgar, Thomas; Graybill, Robert; Korambath, Prakashan; Schott, Brian; Swink, Denise; Wang, Jianwu; Wetzel, Jim

    2015-01-01

    Historic manufacturing enterprises based on vertically optimized companies, practices, market share, and competitiveness are giving way to enterprises that are responsive across an entire value chain to demand dynamic markets and customized product value adds; increased expectations for environmental sustainability, reduced energy usage, and zero incidents; and faster technology and product adoption. Agile innovation and manufacturing combined with radically increased productivity become engines for competitiveness and reinvestment, not simply for decreased cost. A focus on agility, productivity, energy, and environmental sustainability produces opportunities that are far beyond reducing market volatility. Agility directly impacts innovation, time-to-market, and faster, broader exploration of the trade space. These changes, the forces driving them, and new network-based information technologies offering unprecedented insights and analysis are motivating the advent of smart manufacturing and new information technology infrastructure for manufacturing.

  1. Smart Grid: Smart Customer Policy Needs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    In September 2010, the International Energy Agency (IEA) held a workshop on the regulatory, market and consumer policies necessary to ensure that smart grids are deployed with adequate consideration of their risks and benefits to all stakeholders. This was one of several workshops that brought together energy providers, network operators, technology developers, regulators, customers and government policy makers to discuss smart grid technology and policy. The Smart Grid - Smart Customer Policies workshop allowed stakeholders to: gain a perspective on key issues and barriers facing early deployment of smart grids; hear expert opinion on regulatory, consumer and market challenges to smart grids; discuss smart grid-smart customer policy priorities; and build consensus on the technology and policy ingredients needed for customer-friendly smart grid deployments. Drawing on workshop discussions, the following paper lays out a logical framework to maximise the benefits and minimise the risks that smart grids pose for customers. The paper also describes key policy research questions that will guide future IEA research on this topic.

  2. Feasible approach of contactless power transfer technology combined with HTS coils based on electromagnetic resonance coupling

    International Nuclear Information System (INIS)

    Chang, Yoon Do; Yim, Seong Woo; Hwang, Si Dole

    2013-01-01

    The contactless power transfer (CPT) systems have been recently gaining popularity widely since it is an available option to realize the power delivery and storage with connector-free devices across a large air gap. Especially, the CPT with electromagnetic resonance coupling method is possible to exchange energy within 2 m efficiently. However, the power transfer efficiency of CPT in commercialized products has been limited because the impedance matching of coupled coils is sensitive. As a reasonable approach, we combined the CPT system with HTS wire technology and called as, superconducting contactless power transfer (SUCPT) system. Since the superconducting coils have an enough current density, the superconducting antenna and receiver coils at CPT system have a merit to deliver and receive a mass amount of electric energy. In this paper, we present the feasibility of the SUCPT system and examine the transmission properties of SUCPT phenomenon between room temperature and very low temperature at 77 K as long as the receiver is within 1.0 m distance.

  3. Contactless Stimulation and Control of Biomimetic Nanotubes by Calcium Ion Gradients.

    Science.gov (United States)

    Kirejev, Vladimir; Ali Doosti, Baharan; Shaali, Mehrnaz; Jeffries, Gavin D M; Lobovkina, Tatsiana

    2018-04-17

    Membrane tubular structures are important communication pathways between cells and cellular compartments. Studying these structures in their native environment is challenging, due to the complexity of membranes and varying chemical conditions within and outside of the cells. This work demonstrates that a calcium ion gradient, applied to a synthetic lipid nanotube, triggers lipid flow directed toward the application site, resulting in the formation of a bulge aggregate. This bulge can be translated in a contactless manner by moving a calcium ion source along the lipid nanotube. Furthermore, entrapment of polystyrene nanobeads within the bulge does not tamper the bulge movement and allows transporting of the nanoparticle cargo along the lipid nanotube. In addition to the synthetic lipid nanotubes, the response of cell plasma membrane tethers to local calcium ion stimulation is investigated. The directed membrane transport in these tethers is observed, but with slower kinetics in comparison to the synthetic lipid nanotubes. The findings of this work demonstrate a novel and contactless mode of transport in lipid nanotubes, guided by local exposure to calcium ions. The observed lipid nanotube behavior can advance the current understanding of the cell membrane tubular structures, which are constantly reshaped during dynamic cellular processes. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Contactless respiratory monitoring system for magnetic resonance imaging applications using a laser range sensor

    Directory of Open Access Journals (Sweden)

    Krug Johannes W.

    2016-09-01

    Full Text Available During a magnetic resonance imaging (MRI exam, a respiratory signal can be required for different purposes, e.g. for patient monitoring, motion compensation or for research studies such as in functional MRI. In addition, respiratory information can be used as a biofeedback for the patient in order to control breath holds or shallow breathing. To reduce patient preparation time or distortions of the MR imaging system, we propose the use of a contactless approach for gathering information about the respiratory activity. An experimental setup based on a commercially available laser range sensor was used to detect respiratory induced motion of the chest or abdomen. This setup was tested using a motion phantom and different human subjects in an MRI scanner. A nasal airflow sensor served as a reference. For both, the phantom as well as the different human subjects, the motion frequency was precisely measured. These results show that a low cost, contactless, laser-based approach can be used to obtain information about the respiratory motion during an MRI exam.

  5. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  6. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  7. Design of a variable-phase contactless energy transfer platform using air-cored planar inductor technology

    NARCIS (Netherlands)

    Sonntag, C.L.W.

    2010-01-01

    Contactless Energy Transfer (CET) describes the process in which electrical energy is transferred among two or more galvanically isolated electrical circuits or devices by means of magnetic induction (magnetic energy). The potential applications can range from the transfer of energy between low

  8. Approaches to contactless optical thermometer in the NIR spectral range based on Nd{sup 3+} doped crystalline nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Kaldvee, K.; Nefedova, A.V. [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Fedorenko, S.G. [Voevodsky Institute of Chemical Kinetics and Combustion SB RAS, Novosibirsk 630090 (Russian Federation); Vanetsev, A.S. [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation); Orlovskaya, E.O. [Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation); Puust, L.; Pärs, M.; Sildos, I. [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Ryabova, A.V. [Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation); National Research Nuclear University Moscow Engineering Physics Institute, Kashirskoe Highway, 31, Moscow 115409 (Russian Federation); Orlovskii, Yu.V., E-mail: orlovski@Lst.gpi.ru [Institute of Physics, University of Tartu, W. Ostwaldi st. 1, Tartu 50411 (Estonia); Prokhorov General Physics Institute RAS, Vavilov st. 38, Moscow 119991 (Russian Federation)

    2017-03-15

    The fluorescence kinetics and spectral intensity ratio (FIR) methods for contactless optical temperature measurement in the NIR spectral range with Nd{sup 3+} doped YAG micro- and YPO{sub 4} nanocrystals are considered and the problems are revealed. The requirements for good temperature RE doped crystalline nanoparticles sensor are formulated.

  9. From Smart Rooms to Smart Hotels

    OpenAIRE

    Petrevska, Biljana; Cingoski, Vlatko; Gelev, Saso

    2016-01-01

    This paper gives an overview of a potential path that new hotels have to satisfy to improve their status from a hotel with smart rooms towards a full-scale smart hotel facility. It presents a possible transitional way including innovative applications based on modern information technology for ambient settings in the domain of hotel industry that aims to improve the quality of offered services towards clients, starting from the present level of smart rooms. The main objective i...

  10. Charge It Right. FDIC Money Smart Financial Education Curriculum = Uso Correcto de su Tarjeta de Credito. FDIC Money Smart Plan de Education para Capacitacion en Finanzas.

    Science.gov (United States)

    Federal Deposit Insurance Corp., Washington, DC.

    This module on managing a credit card is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to describe the costs and benefits of…

  11. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  12. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  13. Smart hydrogel functional materials

    CERN Document Server

    Chu, Liang-Yin; Ju, Xiao-Jie

    2014-01-01

    This book systematically introduces smart hydrogel functional materials with the configurations ranging from hydrogels to microgels. It serves as an excellent reference for designing and fabricating artificial smart hydrogel functional materials.

  14. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  15. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  16. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  17. Reminder: Swiss and French cards

    CERN Multimedia

    2012-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of personnel concerned that they are obliged to: • hold a valid Swiss  Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; • return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken towards the member of personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide. Users and Unpaid Associates must contact the Users Office HR Department Tel.: 729...

  18. Swiss and French cards - Reminder

    CERN Multimedia

    HR Department

    2011-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of the personnel concerned that they are obliged to: hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken with respect to the member of the personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide: https://cern.ch/admin-eguide/cartes/proc_cartes_home.asp Users and Unpaid Associates must ...

  19. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  20. Calibration of TOB+ Thermometer's Cards

    CERN Document Server

    Banitt, Daniel

    2014-01-01

    Motivation - Under the new upgrade of the CMS detector the working temperature of the trackers had been reduced to -27 Celsius degrees. Though the thermal sensors themselves (Murata and Fenwal thermistors) are effective at these temperatures, the max1542 PLC (programmable logic controller) cards, interpreting the resistance of the thermal sensors into DC counts usable by the DCS (detector control system), are not designed for these temperatures in which the counts exceed their saturation and therefor had to be replaced. In my project I was in charge of handling the emplacement and calibration of the new PLC cards to the TOB (tracker outer barrel) control system.

  1. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  2. Smart City project

    KAUST Repository

    Al Harbi, Ayman

    2018-01-24

    A \\'smart city\\' is an urban region that is highly advanced in terms of overall infrastructure, sustainable real estate, communications and market viability. It is a city where information technology is the principal infrastructure and the basis for providing essential services to residents. Yanbu Industrial City- Smart City Project - First large scale smart city in The kingdom.

  3. Smart Chips for Smart Surroundings -- 4S

    NARCIS (Netherlands)

    Schuler, Eberhard; König, Ralf; Becker, Jürgen; Rauwerda, G.K.; van de Burgwal, M.D.; Smit, Gerardus Johannes Maria; Cardoso, João M.P.; Hübner, Michael

    2011-01-01

    The overall mission of the 4S project (Smart Chips for Smart Surroundings) was to define and develop efficient flexible, reconfigurable core building blocks, including the supporting tools, for future Ambient System Devices. Reconfigurability offers the needed flexibility and adaptability, it

  4. Integrative solutions for intelligent energy management. Smart metering, smart home, smart grid; Integrative Loesungsansaetze fuer ein intelligentes Energiemanagement. Smart Metering, Smart Home and Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Jungfleisch, Achim [Hager Vertriebsgesellschaft mbH und Co. KG, Blieskastel (Germany). Marketing

    2011-07-01

    Smart Metering, Smart Home, Smart Grid - these key words significantly determine the current debate about intelligent energy management, or new energy concepts. The author of the contribution under consideration describes the interactions between Smart Metering, Smart Home and Smart Grids and the technical connection of these interactions. Thus, the compact tebis KNX demovea server connects Windows computer and the Internet with the building automation based on KNX. The technically simple combination of smart metering and smart home via Hager radio tower of the building automation provides an access to key energy data for an intelligent load management.

  5. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  6. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  7. Challenging 'smart' in smart city strategies

    DEFF Research Database (Denmark)

    Sandvik, Kjetil; Knudsen, Jacob

    and development. Focusing on processes of citizen participation and co-creation as the main driving force, we introduce a concept of 'smart city at eye level'. The introduction of new media technology and new media uses need to emerge from a profound understanding of the wants, needs and abilities of the citizens......Smart city strategies concern the improvement of economic and political efficiency and the enabling of social, cultural and urban development (Hollands 2008) and covers a variety of fields from improving infrastructures, social and cultural development, resilience strategies (e.g. green energy......), improving schools, social welfare institutions, public and private institutions etc. The 'smart' in smart city strategies implies that these efforts are accomplished by the introduction and embedding of smart media technology into the very fabric of society. This is often done in a top-down and technology...

  8. Determining the feasibility of objective adherence measurement with blister packaging smart technology.

    Science.gov (United States)

    van Onzenoort, Hein A; Neef, Cees; Verberk, Willem W; van Iperen, H Peter; de Leeuw, Peter W; van der Kuy, Paul-Hugo M

    2012-05-15

    The results of a feasibility study of blister-pack smart technology for monitoring medication adherence are reported. Research in the area of objective therapy compliance measurement has led to the development of microprocessor-driven systems that record the time a unit dose is removed from blister packaging. One device under development is the Smart Blister-a label imprinted with event-detection circuitry that can be affixed to standard commercial blister cards. In the first trial of the device in actual clinical practice, 115 community-dwelling Dutch patients receiving valsartan maintenance therapy (160 mg once daily) were given 14-day blister packages equipped with the Smart Blister. On the return of empty blister cards to the 20 participating community pharmacies, the stored information was scanned and downloaded for data analysis and patient counseling purposes. A total of 245 Smart Blister-equipped packages were used by valsartan recipients during the eight-month study. The device was largely effective in recording patient and blister-card identification data and other desired information. However, in 17% of cases, the Smart Blister system registered multiple tablet-removal events at the same time, presumably indicating unintentional breakage of nearby conductive circuits and the need for design refinements. The Smart Blister-equipped medication cards were generally well received by patients and pharmacies. An evaluation of the functionality and robustness of the Smart Blister in a real-world clinical practice situation yielded some promising results, but the findings also indicated a need for design refinements and additional performance testing of the device.

  9. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    KAUST Repository

    Farhat, Mohamed; Cheng, Mark M C; Le, Khai Q; Chen, Pai-Yen

    2015-01-01

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the 'Internet of Nano-Things'.

  10. Simulation and Optimization of Contactless Power Transfer System for Rotary Ultrasonic Machining

    Directory of Open Access Journals (Sweden)

    Wang Xinwei

    2016-01-01

    Full Text Available In today’s rotary ultrasonic machining (RUM, the power transfer system is based on a contactless power system (rotary transformer rather than the slip ring that cannot cope with high-speed rotary of the tool. The efficiency of the rotary transformer is vital to the whole rotary ultrasonic machine. This paper focused on simulation of the rotary transformer and enhancing the efficiency of the rotary transformer by optimizing three main factors that influence its efficiency, including the gap between the two ferrite cores, the ratio of length and width of the ferrite core and the thickness of ferrite. The finite element model of rotary transformer was built on Maxwell platform. Simulation and optimization work was based on the finite element model. The optimization results compared with the initial simulation result showed an approximate 18% enhancement in terms of efficiency, from 77.69% to 95.2%.

  11. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    KAUST Repository

    Farhat, Mohamed

    2015-09-25

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the \\'Internet of Nano-Things\\'.

  12. Contactless flowrate sensors for Na, PbBi and Pb flows

    International Nuclear Information System (INIS)

    Buchenau, D.; Gerbeth, G.; Priede, J.

    2011-01-01

    Accurate and reliable flow rate measurements are required for various liquid metal systems such as the Na or Lead-flows in fast reactors, the PbBi-flows in transmutation systems, or the flows in liquid metal targets. For liquid metal flows, a contactless measurement is preferable. In this paper we report on the recent development of two types of such flow meters. The former operates by detecting the flow-induced disturbance in the phase distribution of an externally applied AC magnetic field. Such a phase-shift flow meter was developed with an emitting coil at one side of the duct and two sensing coils at the opposite side. The second approach uses a rotatable single cylindrical permanent magnet, which is placed close to the liquid metal duct. The rotation rate of this magnet is proportional to the flow rate. (author)

  13. Investigation of a matrix converter for contactless power transmission systems; Untersuchung eines Matrixumrichters fuer kontaktlose Energieuebertragungssysteme

    Energy Technology Data Exchange (ETDEWEB)

    Ecklebe, Andreas

    2009-05-22

    The publication discusses a three- to two-phase matrix converter for contactless power transmission systems. Based on relevant publications, possible resonance setups for contactless power transmission systems are investigated to begin with. An analysis of relevant parameters shows the differences between the various setups, but it also shows that for an investigation focusing on the feeding converter, simple modelling of the three investigated resonance setups is possible with the aid of a serial oscillating circuit. In consequence, it should be possible to apply the results also to the matrix converter with other serially resonant loads. The second part of the investigation focuses on the matrix converter. After a theoretical description, a combination von high-frequency control - e.g. bulk pulsing - and low-frequency pulsing patterns for setting the harmonics level of the grid currents is presented. The similarity to a conventional H bridge circuit enables an assessment of commutation and the identification of the necessary inverter states. These are characterized in that a bidirectional connection between the input system and each output phase is available at any time. The functioning of the commutation and of the inverter as a whole is proved by simulation in a first step, in which also the dynamic switching characteristics of the power semiconductors is taken into account. Finally, the results of laboratory measurements are presented and compared with the theoretical results. The laboratory setup consists of the power section of the matrix converter with input filters and modular gate drivers, a DSP/FPGA control system, and a contactless power transmission system with a current inverter and load on the secondary side. The investigation thus provides information on the use of the three-to-two phase matrix converter as an interesting alternative for feeding of contactless power transmission systems and other serially resonant loads. (orig.) [German] Diese

  14. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    International Nuclear Information System (INIS)

    Farhat, Mohamed; Cheng, Mark M C; Chen, Pai-Yen; Le, Khai Q

    2015-01-01

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the ‘Internet of Nano-Things’. (paper)

  15. Contactless Spectral-dependent Charge Carrier Lifetime Measurements in Silicon Photovoltaic Materials

    Science.gov (United States)

    Roller, John; Hamadani, Behrang; Dagenais, Mario

    Charge carrier lifetime measurements in bulk or unfinished photovoltaic (PV) materials allow for a more accurate estimate of power conversion efficiency in completed solar cells. In this work, carrier lifetimes in PV-grade silicon wafers are obtained by way of quasi-steady state photoconductance measurements. These measurements use a contactless RF system coupled with varying narrow spectrum input LEDs, ranging in wavelength from 460 nm to 1030 nm. Spectral dependent lifetime measurements allow for determination of bulk and surface properties of the material, including the intrinsic bulk lifetime and the surface recombination velocity. The effective lifetimes are fit to an analytical physics-based model to determine the desired parameters. Passivated and non-passivated samples are both studied and are shown to have good agreement with the theoretical model.

  16. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  17. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  18. Palmistry, tarot cards, and psychotherapy.

    Science.gov (United States)

    Pejic, Nicholas G

    2008-01-01

    The author summarizes his experience with palm and Tarot card readers in New Orleans. The history, practice, and psychodynamics of palmistry and Tarot are explored. It's postulated that these practices are forms of archaic psychotherapy, which employ supportive treatment and placebo. These tactics are used to elicit hope for its clients.

  19. Towards an open sound card

    DEFF Research Database (Denmark)

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    The architecture of a sound card can, in simple terms, be described as an electronic board containing a digital bus interface hardware, and analog-to-digital (A/D) and digital-to-analog (D/A) converters; then, a soundcard driver software on a personal computer's (PC) operating system (OS) can con...

  20. Comparing Candidate Hospital Report Cards

    Energy Technology Data Exchange (ETDEWEB)

    Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

    1997-12-31

    We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

  1. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  2. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  3. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  4. Smart Cities - Smart Homes and Smart Home Technology

    OpenAIRE

    Faanes, Erlend Kydland

    2014-01-01

    This master’s thesis consists of two articles where the first article is theoretical and the second is the empirical study. Article I The purpose with this paper is to explore and illuminate how smart home and smart home technology can contribute to enhance health and Quality of Life in elderly citizens and allow them to live longer in their home. The paper provides a brief introduction to health promotion and highlights the thesis theoretical framework and foundation of Aaron Antonov...

  5. SmartCampusAAU

    DEFF Research Database (Denmark)

    Hansen, Rene; Thomsen, Bent; Thomsen, Lone Leth

    2013-01-01

    This paper describes SmartCampusAAU - an open, extendable platform that supports the easy creation of indoor location based systems. SmartCampusAAU offers an app and backend that can be used to enable indoor positioning and navigation in any building. The SmartCampusAAU app is available on all ma...... major mobile platforms (Android, iPhone and Windows Phone) and supports both device- and infrastructure-based positioning. SmartCampusAAU also offers a publicly available OData backend that allows researchers to share radio map and location tracking data.......This paper describes SmartCampusAAU - an open, extendable platform that supports the easy creation of indoor location based systems. SmartCampusAAU offers an app and backend that can be used to enable indoor positioning and navigation in any building. The SmartCampusAAU app is available on all...

  6. Smart Sensors Enable Smart Air Conditioning Control

    Directory of Open Access Journals (Sweden)

    Chin-Chi Cheng

    2014-06-01

    Full Text Available In this study, mobile phones, wearable devices, temperature and human motion detectors are integrated as smart sensors for enabling smart air conditioning control. Smart sensors obtain feedback, especially occupants’ information, from mobile phones and wearable devices placed on human body. The information can be used to adjust air conditioners in advance according to humans’ intentions, in so-called intention causing control. Experimental results show that the indoor temperature can be controlled accurately with errors of less than ±0.1 °C. Rapid cool down can be achieved within 2 min to the optimized indoor capacity after occupants enter a room. It’s also noted that within two-hour operation the total compressor output of the smart air conditioner is 48.4% less than that of the one using On-Off control. The smart air conditioner with wearable devices could detect the human temperature and activity during sleep to determine the sleeping state and adjusting the sleeping function flexibly. The sleeping function optimized by the smart air conditioner with wearable devices could reduce the energy consumption up to 46.9% and keep the human health. The presented smart air conditioner could provide a comfortable environment and achieve the goals of energy conservation and environmental protection.

  7. Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens.

    Science.gov (United States)

    Lai, Jiun-Tze; Hou, Ting-Wei

    2008-04-01

    An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.

  8. Towards smart environments using smart objects.

    Science.gov (United States)

    Sedlmayr, Martin; Prokosch, Hans-Ulrich; Münch, Ulli

    2011-01-01

    Barcodes, RFID, WLAN, Bluetooth and many more technologies are used in hospitals. They are the technological bases for different applications such as patient monitoring, asset management and facility management. However, most of these applications exist side by side with hardly any integration and even interoperability is not guaranteed. Introducing the concept of smart objects inspired by the Internet of Things can improve the situation by separating the capabilities and functions of an object from the implementing technology such as RFID or WLAN. By aligning technological and business developments smart objects have the power to transform a hospital from an agglomeration of technologies into a smart environment.

  9. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  10. Design and Fabrication of 3D-Structured Contactless Capacitive-Type Detector for Capillary Electrophoresis Microchip

    International Nuclear Information System (INIS)

    Lee, C-Y; Lin, C-H; Fu, L-M

    2006-01-01

    Using simple and reliable microfabrication techniques, this study develops a capillary electrophoresis (CE) microchip with 3-dimensional-structured (3D-structured) contactless capacitive detector electrodes mounted parallel to the separation channel. The offchannel electrodes are deposited by Au sputtering and patterned using a standard 'lift-off' process. A vacuum fusion bonding process is employed to seal the lower substrate containing the microchannels and electrodes to an upper glass cover plate. The variation in the capacitance between the electrodes in the side channels is measured as different samples and ions pass through the detection region of the CE separation channel. Samples of Rhodamine B and a commercial sports drink are mixed in different buffer solutions and successfully separated and detected using the developed device. The 3D-structured contactless capacitive-type detection device has microscale dimensions and provides a valuable contribution to the realization of the lab-on-a-chip concept

  11. 3D cellular structures and co-cultures formed through the contactless magnetic manipulation of cells on adherent surfaces.

    Science.gov (United States)

    Abdel Fattah, Abdel Rahman; Mishriki, Sarah; Kammann, Tobias; Sahu, Rakesh P; Geng, Fei; Puri, Ishwar K

    2018-02-27

    A magnet array is employed to manipulate diamagnetic cells that are contained in paramagnetic medium to demonstrate for the first time the contactless bioprinting of three-dimensional (3D) cellular structures and co-cultures of breast cancer MCF-7 and endothelial HUVEC at prescribed locations on tissue culture treated well plates. Sequential seeding of different cell lines and the spatial displacement of the magnet array creates co-cultured cellular structures within a well without using physically intrusive well inserts. Both monotypic and co-culture experiments produce morphologically rich 3D cell structures that are otherwise absent in regular monolayer cell cultures. The magnetic contactless bioprinting of cells provides further insight into cell behaviour, invasion strategies and transformations that are useful for potential applications in drug screening, 3D cell culture formation and tissue engineering.

  12. "Smart pebble" designs for sediment transport monitoring

    Science.gov (United States)

    Valyrakis, Manousos; Alexakis, Athanasios; Pavlovskis, Edgars

    2015-04-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions.

  13. An investigation into a contactless photoplethysmographic mobile application to record heart rate post-exercise: Implications for field testing

    Directory of Open Access Journals (Sweden)

    Peart Daniel J.

    2015-08-01

    Full Text Available Study aim: the aim of this study was to compare the accuracy of a contactless photoplethysmographic mobile application (CPA to record post-exercise heart rate and estimate maximal aerobic capacity after the Queen’s College Step Test. It was hypothesised that the CPA may present a cost effective heart rate measurement tool for educators and practitioners with limited access to specialised laboratory equipment.

  14. Smart infrastructure design for Smart Cities

    OpenAIRE

    OTA, Kaoru; KUMRAI, Teerawat; DONG, Mianxiong; KISHIGAMI, Jay (Junichi); GUO, Minyi

    2017-01-01

    Intelligent Transportation Systems (ITS) is one of the keywords to describe smart cities, aiming at efficient public transport, smart parking, enhanced road safety, intelligent traffic management, onvehicle entertainment, and so on. In ITS, Roadside Unit (RSU) deployment should be well-designed due to it serves as a service provider and a gateway to the Internet for vehicular users. In this article, we propose an RSU deployment strategy which maximizes the communication coverage and reduces t...

  15. Sustainability Cards: Design for Longevity

    DEFF Research Database (Denmark)

    Hasling, Karen Marie; Ræbild, Ulla

    2017-01-01

    Product longevity is considered widely as a relevant strategic approach, amongst many, within the field of sustainability. Yet, how to design for increased product lifetime may not be so obvious for practitioners. The complexity of the surrounding issues can constitute a barrier for designers...... for designers and other stakeholders in the design process. The paper is based on a developmental project carried out in the Autumn 2017, within a larger research and collaboration project between raw fur manufacturer Kopenhagen Fur and Design School Kolding investigating sustainability perspectives. The paper...... describes the development of a deck of sustainability cards aiming for product longevity and presents the final deck. Furthermore, the paper contributes with insights on how designers may apply design cards in the design process and how this practice can further sustainable considerations and strategies...

  16. Review of sound card photogates

    International Nuclear Information System (INIS)

    Gingl, Zoltan; Mingesz, Robert; Mellar, Janos; Makra, Peter

    2011-01-01

    Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card - an interface for analogue signals. It is possible to make very simple yet highly accurate photogates for cents, while much more sophisticated solutions are also available at a still very low cost. In our paper we show several experimentally tested ways of implementing sound card photogates in detail, and we also provide full-featured, free, open-source photogate software as a much more efficient experimentation tool than the usually used sound recording programs. Further information is provided on a dedicated web page, www.noise.physx.u-szeged.hu/edudev.

  17. Contactless grasp of a magnetic particle in a fluid and its application to quantifications of forces affecting its behavior

    International Nuclear Information System (INIS)

    Tokura, S.; Hara, M.; Kawaguchi, N.; Amemiya, N.

    2014-01-01

    In this study, the contactless grasp of a magnetic particle suspended in a fluid at rest or in motion by coil current control, and a method for estimating these forces quantitatively were developed. Four electromagnets were used to apply magnetic fields to magnetic ferrite particles (diameter, 300 nm–300 µm) in a fluid in a vessel. Particle-tracking velocimetry with high-speed image processing was used to visualize the behavior of the magnetic particles in the fluid. In addition, contactless grasp of a magnetic particle using the feedback control was accomplished. Furthermore, by making the magnetic force and the resultant force of the other forces affecting a magnetic particle be in balance, the vertical and horizontal forces affecting the minute magnetic particle, such as the viscous force or the magnetic force between magnetized particles, could be estimated quantitatively from the current in the coil of each electromagnet, without any physical contact with the particle itself. These results constitute useful information for studies on the issues in the handling of micro- or nano-particles. - Highlights: • Four electromagnets are used to apply magnetic field to magnetic ferrite particles. • Motion of magnetic particles suspended in a resting or flowing fluid is visualized. • Contactless grasp of a magnetic particle using feedback control was accomplished. • Vertical and horizontal forces affecting a particle can be estimated quantitatively. • Force between magnetized particles which approach to each other was measured

  18. Valutazione economica dello studio CARDS

    Directory of Open Access Journals (Sweden)

    Simona de Portu

    2007-10-01

    Full Text Available Introduction: cardiovascular diseases (CVD are the major component of premature mortality, generate disability and are a relevant source of cost. The growing incidence of CVD is associated with lifestyle and other modifiable risk factors. Prevention and preclinical detection of CVD reduce morbidity and mortality. Type 2 diabetes is associated with a substantially increased risk of cardiovascular disease. Objective: the aim of the study was to evaluate the health economic consequence of medical therapy with atorvastatin for primary prevention of major cardiovascular events in patients with type 2 diabetes in Italy. Materials and method: in order to reach our objective we drew clinical information from the CARDS study. This economic evaluation was carried out conducting a cost/effectiveness analysis from the perspective of National Health Service (NHS. The analysis was applied to a time horizon in conformity with the observational period adopted in the CARDS study (3.9 years. An incremental cost/effectiveness ratio (ICER was calculated and is expressed as cost per life years gained (LYG. In order to test the robustness of the results, a one-way sensitivity analysis was performed. Results: the total cost of atorvastatin therapy over 3.9 years amounts to around 1.5 million of euros per 1,000 patients. The total cost of adding atorvastatin to standard care in people treated for primary prevention of major cardiovascular events in type 2 diabetes as those involved in the CARDS study would entail an additional cost of about 1,2 million of euros per 1,000 patients treated per 3.9 years, with an incremental cost/effectiveness ratio (ICER equivalent to 36,566 euros per patient per LYG. Discussion: the current study is the first economic evaluation of CARDS study to the Italian situation. The results of the current study show that hypolipemic therapy with atorvastatin 10 mg in diabetic individuals is to be considered cost effective.

  19. Médicarte software developed for the Quebec microprocessor health card project.

    Science.gov (United States)

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the

  20. Rh-flash acquisition card

    International Nuclear Information System (INIS)

    Bourrion, O.

    2003-01-01

    The rh-flash card main purpose is to convert and store the image of the analog data present at input into an output buffer, namely in a given timing window besides a stop signal (like a digital oscilloscope). It is conceived in VME format 1U wide with an additional connector. Novelty of this card is its ability to sample at a high frequency, due to flash coders, and this at a high repetition rate. To do that the card allows the storage of the data considered 'useful' and that is done by storing only the data exceeding a certain threshold. This can be useful for instance for viewing peaks in a spectrum, and obtaining their relative location. The goal is to stock and process the data sampled before and after the arrival of a stop signal (what entails a storage depth). A threshold is defined and any peak exceeding its level will really be stored in the output buffer which is readable through the VME bus. The peak values will be stored as well as m preceding and n subsequent values (both programmable). Obviously, if the threshold is zero the system of data processing is off and all data will be stored. The document is structured on six sections titled: 1. Description; 2. Specifications; 3. Explaining the design of channels; 4. Explaining the shared part of the design; 5. Addressing (→ user guide); 6. Software precautions. (author)

  1. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  2. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. Synergisms between smart metering and smart grid; Synergien zwischen Smart Metering und Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Maas, Peter [IDS GmbH, Ettlingen (Germany)

    2010-04-15

    With the implementation of a smart metering solution, it is not only possible to acquire consumption data for billing but also to acquire relevant data of the distribution grid for grid operation. There is still a wide gap between the actual condition and the target condition. Synergies result from the use of a common infrastructure which takes account both of the requirements of smart metering and of grid operation. An open architecture also enables the future integration of further applications of the fields of smart grid and smart home. (orig.)

  4. Smart Location Database - Service

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Smart Location Database (SLD) summarizes over 80 demographic, built environment, transit service, and destination accessibility attributes for every census block...

  5. Smart space technology innovations

    CERN Document Server

    Chen, Mu-Yen

    2013-01-01

    Recently, ad hoc and wireless communication technologies have made available the device, service and information rich environment for users. Smart Space and ubiquitous computing extend the ""Living Lab"" vision of everyday objects and provide context-awareness services to users in smart living environments. This ebook investigates smart space technology and its innovations around the Living Labs. The final goal is to build context-awareness smart space and location-based service applications that integrate information from independent systems which autonomously and securely support human activ

  6. Conceptualizing smart service systems

    DEFF Research Database (Denmark)

    Beverungen, Daniel; Müller, Oliver; Matzner, Martin

    2017-01-01

    Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service” that is b......Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service......” that is based on monitoring, optimization, remote control, and autonomous adaptation of products, profoundly transform service systems into what we call “smart service systems”. In a multi-method study that includes conceptual research and qualitative data from in-depth interviews, we conceptualize “smart...... service” and “smart service systems” based on using smart products as boundary objects that integrate service consumers’ and service providers’ resources and activities. Smart products allow both actors to retrieve and to analyze aggregated field evidence and to adapt service systems based on contextual...

  7. The People's Smart Sculpture

    OpenAIRE

    Koplin, Martin; Nedelkovski, Igor; Salo, Kari

    2016-01-01

    The People’s Smart Sculpture (PS2) panel discusses future oriented approaches in smart media-art, developed, designed and exploited for artistic and public participation in the change and re-design of our living environment. The actual debate about a smart future is not taking into account any idea of media art as an instrument for to realize the social sculpture, mentioned by Beuys [1] or as social sculpture itself. The People’s Smart Sculpture is the only large scale Creative Europe media-a...

  8. Smart Location Database - Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Smart Location Database (SLD) summarizes over 80 demographic, built environment, transit service, and destination accessibility attributes for every census block...

  9. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  10. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  11. Electricity Markets, Smart Grids and Smart Buildings

    Science.gov (United States)

    Falcey, Jonathan M.

    A smart grid is an electricity network that accommodates two-way power flows, and utilizes two-way communications and increased measurement, in order to provide more information to customers and aid in the development of a more efficient electricity market. The current electrical network is outdated and has many shortcomings relating to power flows, inefficient electricity markets, generation/supply balance, a lack of information for the consumer and insufficient consumer interaction with electricity markets. Many of these challenges can be addressed with a smart grid, but there remain significant barriers to the implementation of a smart grid. This paper proposes a novel method for the development of a smart grid utilizing a bottom up approach (starting with smart buildings/campuses) with the goal of providing the framework and infrastructure necessary for a smart grid instead of the more traditional approach (installing many smart meters and hoping a smart grid emerges). This novel approach involves combining deterministic and statistical methods in order to accurately estimate building electricity use down to the device level. It provides model users with a cheaper alternative to energy audits and extensive sensor networks (the current methods of quantifying electrical use at this level) which increases their ability to modify energy consumption and respond to price signals The results of this method are promising, but they are still preliminary. As a result, there is still room for improvement. On days when there were no missing or inaccurate data, this approach has R2 of about 0.84, sometimes as high as 0.94 when compared to measured results. However, there were many days where missing data brought overall accuracy down significantly. In addition, the development and implementation of the calibration process is still underway and some functional additions must be made in order to maximize accuracy. The calibration process must be completed before a reliable

  12. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  13. "Smart pebble" design for environmental monitoring applications

    Science.gov (United States)

    Valyrakis, Manousos; Pavlovskis, Edgars

    2014-05-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, while focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions. "Smart pebble" allows for a wider range of environmental sensors (e.g. for environmental/pollutant monitoring) to be incorporated so as to extend the range of its application, enabling accurate environmental monitoring which is required to ensure infrastructure resilience and preservation of ecological health.

  14. A Method Using Optical Contactless Displacement Sensors to Measure Vibration Stress of Small-Bore Piping.

    Science.gov (United States)

    Maekawa, Akira; Tsuji, Takashi; Takahashi, Tsuneo; Noda, Michiyasu

    2014-02-01

    In nuclear power plants, vibration stress of piping is frequently evaluated to prevent fatigue failure. A simple and fast measurement method is attractive to evaluate many piping systems efficiently. In this study, a method to measure the vibration stress using optical contactless displacement sensors was proposed, the prototype instrument was developed, and the instrument practicality for the method was verified. In the proposed method, light emitting diodes (LEDs) were used as measurement sensors and the vibration stress was estimated by measuring the deformation geometry of the piping caused by oscillation, which was measured as the piping curvature radius. The method provided fast and simple vibration estimates for small-bore piping. Its verification and practicality were confirmed by vibration tests using a test pipe and mock-up piping. The stress measured by both the proposed method and an accurate conventional method using strain gauges were in agreement, and it was concluded that the proposed method could be used for actual plant piping systems.

  15. Ventilation and Heart Rate Monitoring in Drivers using a Contactless Electrical Bioimpedance System

    Science.gov (United States)

    Macías, R.; García, M. A.; Ramos, J.; Bragós, R.; Fernández, M.

    2013-04-01

    Nowadays, the road safety is one of the most important priorities in the automotive industry. Many times, this safety is jeopardized because of driving under inappropriate states, e.g. drowsiness, drugs and/or alcohol. Therefore several systems for monitoring the behavior of subjects during driving are researched. In this paper, a device based on a contactless electrical bioimpedance system is shown. Using the four-wire technique, this system is capable of obtaining the heart rate and the ventilation of the driver through multiple textile electrodes. These textile electrodes are placed on the car seat and the steering wheel. Moreover, it is also reported several measurements done in a controlled environment, i.e. a test room where there are no artifacts due to the car vibrations or the road state. In the mentioned measurements, the system response can be observed depending on several parameters such as the placement of the electrodes or the number of clothing layers worn by the driver.

  16. Electric field tomography for contactless imaging of resistivity in biomedical applications.

    Science.gov (United States)

    Korjenevsky, A V

    2004-02-01

    The technique of contactless imaging of resistivity distribution inside conductive objects, which can be applied in medical diagnostics, has been suggested and analyzed. The method exploits the interaction of a high-frequency electric field with a conductive medium. Unlike electrical impedance tomography, no electric current is injected into the medium from outside. The interaction is accompanied with excitation of high-frequency currents and redistribution of free charges inside the medium leading to strong and irregular perturbation of the field's magnitude outside and inside the object. Along with this the considered interaction also leads to small and regular phase shifts of the field in the area surrounding the object. Measuring these phase shifts using a set of electrodes placed around the object enables us to reconstruct the internal structure of the medium. The basics of this technique, which we name electric field tomography (EFT), are described, simple analytical estimations are made and requirements for measuring equipment are formulated. The realizability of the technique is verified by numerical simulations based on the finite elements method. Results of simulation have confirmed initial estimations and show that in the case of EFT even a comparatively simple filtered backprojection algorithm can be used for reconstructing the static resistivity distribution in biological tissues.

  17. Ventilation and Heart Rate Monitoring in Drivers using a Contactless Electrical Bioimpedance System

    International Nuclear Information System (INIS)

    Macías, R; García, M A; Ramos, J; Bragós, R; Fernández, M

    2013-01-01

    Nowadays, the road safety is one of the most important priorities in the automotive industry. Many times, this safety is jeopardized because of driving under inappropriate states, e.g. drowsiness, drugs and/or alcohol. Therefore several systems for monitoring the behavior of subjects during driving are researched. In this paper, a device based on a contactless electrical bioimpedance system is shown. Using the four-wire technique, this system is capable of obtaining the heart rate and the ventilation of the driver through multiple textile electrodes. These textile electrodes are placed on the car seat and the steering wheel. Moreover, it is also reported several measurements done in a controlled environment, i.e. a test room where there are no artifacts due to the car vibrations or the road state. In the mentioned measurements, the system response can be observed depending on several parameters such as the placement of the electrodes or the number of clothing layers worn by the driver.

  18. Advances in Contactless Silicon Defect and Impurity Diagnostics Based on Lifetime Spectroscopy and Infrared Imaging

    Directory of Open Access Journals (Sweden)

    Jan Schmidt

    2007-01-01

    Full Text Available This paper gives a review of some recent developments in the field of contactless silicon wafer characterization techniques based on lifetime spectroscopy and infrared imaging. In the first part of the contribution, we outline the status of different lifetime spectroscopy approaches suitable for the identification of impurities in silicon and discuss—in more detail—the technique of temperature- and injection-dependent lifetime spectroscopy. The second part of the paper focuses on the application of infrared cameras to analyze spatial inhomogeneities in silicon wafers. By measuring the infrared signal absorbed or emitted from light-generated free excess carriers, high-resolution recombination lifetime mappings can be generated within seconds to minutes. In addition, mappings of non-recombination-active trapping centers can be deduced from injection-dependent infrared lifetime images. The trap density has been demonstrated to be an important additional parameter in the characterization and assessment of solar-grade multicrystalline silicon wafers, as areas of increased trap density tend to deteriorate during solar cell processing.

  19. Monitoring of Weekly Sleep Pattern Variations at Home with a Contactless Biomotion Sensor.

    Science.gov (United States)

    Hashizaki, Masanori; Nakajima, Hiroshi; Kume, Kazuhiko

    2015-08-03

    Many people find that their sleep is restricted or disturbed by social obligations, including work. Sleep phase delays can affect an individual's circadian rhythms on the following day and cause daytime sleepiness and/or poor performance. In this study, to examine weekly variations in sleep patterns, we analyzed sleep data for seven-day periods (from Sunday to Saturday) that had been collected from 2914 subjects (aged 20-79 years) over a total of 24,899 subject-weeks using contactless biomotion sensors. On the weekend, the subjects' mean sleep midpoint, bedtime, and wake-up time were delayed by 40, 26 and 53 min, respectively, compared with those seen on weekdays. In addition, on weekdays, the mean difference between the maximum and median sleep midpoint ranged from 35 to 47 min among the subjects in their 20 s-70 s. The weekend delay and weekday variation in the subjects' sleep patterns tended to decrease with age. This study detected sleep pattern disturbances on both weekdays and weekends. The serial changes in weekday bedtimes detected in this study suggest that sleep habits are influenced by changes in the temporal patterns of social activities/duties. We need further study the advantages of getting extra sleep and the disadvantages of sleep pattern disturbances in daily lifestyle.

  20. Monitoring of Weekly Sleep Pattern Variations at Home with a Contactless Biomotion Sensor

    Directory of Open Access Journals (Sweden)

    Masanori Hashizaki

    2015-08-01

    Full Text Available Many people find that their sleep is restricted or disturbed by social obligations, including work. Sleep phase delays can affect an individual’s circadian rhythms on the following day and cause daytime sleepiness and/or poor performance. In this study, to examine weekly variations in sleep patterns, we analyzed sleep data for seven-day periods (from Sunday to Saturday that had been collected from 2914 subjects (aged 20–79 years over a total of 24,899 subject-weeks using contactless biomotion sensors. On the weekend, the subjects’ mean sleep midpoint, bedtime, and wake-up time were delayed by 40, 26 and 53 min, respectively, compared with those seen on weekdays. In addition, on weekdays, the mean difference between the maximum and median sleep midpoint ranged from 35 to 47 min among the subjects in their 20 s–70 s. The weekend delay and weekday variation in the subjects’ sleep patterns tended to decrease with age. This study detected sleep pattern disturbances on both weekdays and weekends. The serial changes in weekday bedtimes detected in this study suggest that sleep habits are influenced by changes in the temporal patterns of social activities/duties. We need further study the advantages of getting extra sleep and the disadvantages of sleep pattern disturbances in daily lifestyle.

  1. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  2. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  3. Why do card issuers charge proportional fees?

    OpenAIRE

    Oz Shy; Zhu Wang

    2008-01-01

    This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...

  4. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  5. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  6. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  7. Smart SDHW systems

    DEFF Research Database (Denmark)

    Andersen, Elsa

    2000-01-01

    The aim of the project is to develop smart solar domestic hot water (SDHW) systems. A smart SDHW is a system in which the domestic water can bee heated both by solar collectors and by an auxiliary energy supply system. The auxiliary energy supply system heats up the hot-water tank from the top an...

  8. Making Smart Food Choices

    Science.gov (United States)

    ... turn JavaScript on. Feature: Healthy Aging Making Smart Food Choices Past Issues / Winter 2015 Table of Contents Everyday ... NIH www.nia.nih.gov/Go4Life Making Smart Food Choices To maintain a healthy weight, balance the calories ...

  9. SMART Boards Rock

    Science.gov (United States)

    Giles, Rebecca M.; Shaw, Edward L.

    2011-01-01

    SMART Board is a technology that combines the functionality of a whiteboard, computer, and projector into a single system. The interactive nature of the SMART Board offers many practical uses for providing an introduction to or review of material, while the large work area invites collaboration through social interaction and communication. As a…

  10. Smart grid in China

    DEFF Research Database (Denmark)

    Sommer, Simon; Ma, Zheng; Jørgensen, Bo Nørregaard

    2015-01-01

    China is planning to transform its traditional power grid in favour of a smart grid, since it allows a more economically efficient and a more environmentally friendly transmission and distribution of electricity. Thus, a nationwide smart grid is likely to save tremendous amounts of resources...

  11. Planning in Smart Grids

    NARCIS (Netherlands)

    Bosman, M.G.C.

    2012-01-01

    The electricity supply chain is changing, due to increasing awareness for sustainability and an improved energy efficiency. The traditional infrastructure where demand is supplied by centralized generation is subject to a transition towards a Smart Grid. In this Smart Grid, sustainable generation

  12. Smart Fabrics Technology Development

    Science.gov (United States)

    Simon, Cory; Potter, Elliott; Potter, Elliott; McCabe, Mary; Baggerman, Clint

    2010-01-01

    Advances in Smart Fabrics technology are enabling an exciting array of new applications for NASA exploration missions, the biomedical community, and consumer electronics. This report summarizes the findings of a brief investigation into the state of the art and potential applications of smart fabrics to address challenges in human spaceflight.

  13. Smart City Planning

    DEFF Research Database (Denmark)

    Ekman, Ulrik

    2018-01-01

    This article reflects on the challenges for urban planning posed by the emergence of smart cities in network societies. In particular, it reflects on reductionist tendencies in existing smart city planning. Here the concern is with the implications of prior reductions of complexity which have been...... undertaken by placing primacy in planning on information technology, economical profit, and top-down political government. Rather than pointing urban planning towards a different ordering of these reductions, this article argues in favor of approaches to smart city planning via complexity theory....... Specifically, this article argues in favor of approaching smart city plans holistically as topologies of organized complexity. Here, smart city planning is seen as a theory and practice engaging with a complex adaptive urban system which continuously operates on its potential. The actualizations in the face...

  14. Toronto Smog Summit Report Card

    International Nuclear Information System (INIS)

    2001-01-01

    This 'report card' provides a summary of actions taken, and progress achieved by the federal government, the provincial government and the City of Toronto, respectively, in response to various previous commitments regarding air quality, sustainable transportation, climate and atmospheric research, investing in green infrastructure (federal government), environmental assessment regulations, transboundary air pollution, improved monitoring and reporting regulations. Ratings also cover efforts in imposing emissions caps on the electric industry, emissions reduction trading system, toll-free public air pollution hotline, regulation of ozone depleting substances (provincial government), public education campaign on smog reduction, energy efficiency initiatives, corporate smog alert response plan, and a number of other environmental issues (City of Toronto)

  15. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  16. Smart Sustainable Islands VS Smart Sustainable Cities

    Science.gov (United States)

    Pantazis, D. N.; Moussas, V. C.; Murgante, B.; Daverona, A. C.; Stratakis, P.; Vlissidis, N.; Kavadias, A.; Economou, D.; Santimpantakis, K.; Karathanasis, B.; Kyriakopoulou, V.; Gadolou, E.

    2017-09-01

    This paper has several aims: a) the presentation of a critical analysis of the terms "smart sustainable cities" and "smart sustainable islands" b) the presentation of a number of principles towards to the development methodological framework of concepts and actions, in a form of a manual and actions guide, for the smartification and sustainability of islands. This kind of master plan is divided in thematic sectors (key factors) which concern the insular municipalities c) the creation of an island's smartification and sustainability index d) the first steps towards the creation of a portal for the presentation of our smartification actions manual, together with relative resources, smart applications examples, and, in the near future the first results of our index application in a number of Greek islands and e) the presentation of some proposals of possible actions towards their sustainable development and smartification for the municipalities - islands of Paros and Antiparos in Greece, as case studies.

  17. Smart houses for a smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Kok, J.K.; Warmer, C.J. [ECN Efficiency and Infrastructure, Petten (Netherlands); Karnouskos, S.; Weidlich, A. [SAP Research, Karlsruhe Institute of Technology, (Germany); Nestle, D.; Strauss, P. [The Institut fuer Solare Energieversorgungstechnik ISET, University of Kassel, Kassel (Germany); Dimeas, A.; Hatziargyriou, N. [Institute Computers Communications Systems ICCS, National Technical University of Athens NTUA, Athens (Greece); Buchholz, B.; Drenkard, S. [MVV Energie, Berlin (Germany); Lioliou, V. [Public Power Corporation PPC, Athens (Greece)

    2009-08-15

    Innovative technologies and concepts will emerge as we move towards a more dynamic, service-based, market-driven infrastructure, where energy efficiency and savings can be facilitated by interactive distribution networks. A new generation of fully interactive Information and Communication Technologies (ICT) infrastructure has to be developed to support the optimal exploitation of the changing, complex business processes and to enable the efficient functioning of the deregulated energy market for the benefit of citizens and businesses. The architecture of such distributed system landscapes must be designed and validated, standards need to be created and widely supported, and comprehensive, reliable IT applications will need to be implemented. The collaboration between a smart house and a smart grid is a promising approach which, with the help of ICT can fully unleash the capabilities of the smart electricity network.

  18. Registration system of cloud campus by using android smart tablet.

    Science.gov (United States)

    Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko

    2014-01-01

    Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.

  19. Consumers' Interest In Provider Ratings Grows, And Improved Report Cards And Other Steps Could Accelerate Their Use.

    Science.gov (United States)

    Findlay, Steven D

    2016-04-01

    Encouraging patients and consumers to use data and other information in choosing health care providers is an important way to enhance patient engagement and improve the quality of care. The growing use of technology, including smart phones and near-ubiquitous Internet access, provides consumers with easy access to websites that collect and report assessments and ratings of providers, primarily physicians and hospitals. In addition to new technology, recent laws and changes in society and the delivery of care are laying the foundation for greater use by consumers of provider performance report cards. Such use could be accelerated if the shortcomings of current report card efforts were addressed. Recommendations include making online report cards easier to use and more understandable, engaging, substantive, and relevant to consumers' health and medical concerns and choices. Project HOPE—The People-to-People Health Foundation, Inc.

  20. Smartcards. Smart move.

    Science.gov (United States)

    Mathieson, Steve

    2005-09-08

    European nations outside the UK use smartcards to speed up reimbursements. France has had a card since 1998 and this may soon include health data. The UK is at present only issuing smartcards for healthcare staff's use.

  1. Development of smart nuclear instrumentation for reactors

    International Nuclear Information System (INIS)

    Chaganty, S.P.; Das, D.; Bhatnagar, P.V.; Das, A.; Sreedharan, Preetha; Kataria, S.K.

    2001-01-01

    Variety of nuclear instruments are required for different applications in reactors such as reactor start-up, reactor protection and regulating system, area monitoring, failed fuel detection, stack monitoring etc. Attempts are made to develop a standardized microcomputer based hardware for configuring different types of instruments. PC architecture is chosen due to easy availability of components/boards and software. These instruments have dual redundant Network Interface Cards for connecting to a Primary Radiation Data LAN which in turn can be connected to Plant Information Bus through Gateways. These SMART instruments can be tested/calibrated through specific commands from remote computers connected over the LAN. This paper describes the various issues involved and the design details. (author)

  2. Big data, smart cities and city planning.

    Science.gov (United States)

    Batty, Michael

    2013-11-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London's public transport systems.

  3. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    Science.gov (United States)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  4. Wire Scanner Motion Control Card

    CERN Document Server

    Forde, S E

    2006-01-01

    Scientists require a certain beam quality produced by the accelerator rings at CERN. The discovery potential of LHC is given by the reachable luminosity at its interaction points. The luminosity is maximized by minimizing the beam size. Therefore an accurate beam size measurement is required for optimizing the luminosity. The wire scanner performs very accurate profile measurements, but as it can not be used at full intensity in the LHC ring, it is used for calibrating other profile monitors. As the current wire scanner system, which is used in the present CERN accelerators, has not been made for the required specification of the LHC, a new design of a wire scanner motion control card is part of the LHC wire scanner project. The main functions of this card are to control the wire scanner motion and to acquire the position of the wire. In case of further upgrades at a later stage, it is required to allow an easy update of the firmware, hence the programmable features of FPGAs will be used for this purpose. The...

  5. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System.

    Science.gov (United States)

    Xiao, Changjiang; Chen, Nengcheng; Li, Dandan; Lv, You; Gong, Jianya

    2016-12-30

    Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web-enabled smart cultural relics management system (SCRMS). In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID) is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  6. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System

    Directory of Open Access Journals (Sweden)

    Changjiang Xiao

    2016-12-01

    Full Text Available Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web–enabled smart cultural relics management system (SCRMS. In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  7. Towards a smart home framework

    OpenAIRE

    Alam, Muddasser; Alan, Alper; Rogers, Alex; Ramchurn, Sarvapali D.

    2013-01-01

    We present our Smart Home Framework (SHF) which simplifies the modelling, prototyping and simulation of smart infrastructure (i.e., smart home and smart communities). It provides the buildings blocks (e.g., home appliances) that can be extended and assembled together to build a smart infrastructure model to which appropriate AI techniques can be applied. This approach enables rapid modelling where new research initiatives can build on existing work.

  8. Real Communication through Interview and Conversation Cards

    Science.gov (United States)

    Bonin, Therese M.; Birckbichler, Diane W.

    1975-01-01

    A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)

  9. College Student Performance and Credit Card Usage.

    Science.gov (United States)

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  10. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  11. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  12. Enhancing Students' Learning: Instant Feedback Cards

    Science.gov (United States)

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  13. Overcoming credit card fraud in South Africa

    African Journals Online (AJOL)

    A credit card is a convenient method of payment, but it does carry risks. The enormous ... Identity theft and the exponential ... Unique Security Features of a Credit Card with the Aim of Identifying ..... technology in an attempt to try and curb the.

  14. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  15. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.

  16. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  17. Prepaid cards: how do they function? how are they regulated?

    OpenAIRE

    Mark Furletti

    2004-01-01

    This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...

  18. Point card compatible automatic vending machine for canned drink; Point card taio kan jido hanbaiki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)

  19. Formalising the Safety of Java, the Java Virtual Machine and Java Card

    OpenAIRE

    Hartel, Pieter H.; Moreau, Luc

    2001-01-01

    We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smart cards. The conclusion is that while a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine readable formal models of the whole of Java and its implementation. This is a formidable task but we believe it is essential to building trust in Java safety, and thence to achieve ITSEC level 6 or Common C...

  20. Smart grids for smart cities: Smart energy management

    International Nuclear Information System (INIS)

    Kieny, Christophe

    2013-01-01

    Smart grids are currently a hot topic. Growing numbers of municipalities are experimenting with smart grids as the foundation for tomorrow's smart cities. And yet, end users are struggling to understand the innovative new energy distribution models just over the horizon. Our energy system is at a crossroads. And the coming years will tell us whether smart grids - whether they integrate renewable energy sources or not - will develop as a hybrid industry combining energy and IT or emerge as a full-fledged sector in and of itself. First and foremost, smart grids must be considered from a local, micro-economic standpoint, but one that also takes into account issues and interactions at the regional, national, EU, and global levels. Today, fighting climate change is a major challenge at both the national and global levels. The Kyoto Protocol and the Copenhagen Summit established a framework for crucial initiatives to combat climate change. The EU and France followed suit with their Climate and Energy Package and Grenelle de l'environnement environmental agenda. These policies set forth measures to fight climate change and to adapt to its impacts on people and the economy. France, for instance, set two basic targets to be achieved by 2020: - Make renewable energy a priority by promoting the development of energy from renewable sources to achieve the target of 23% renewables in the final energy mix. - Promote energy savings and increase energy efficiency by 20% and limit global warming to less than 2 deg. C over pre-industrial temperatures in industrialized nations by 2050 (around 1.2 deg. C above current temperatures). Tomorrow's grids will have to be smarter, which means incorporating information and communication technologies to provide the responsiveness and enhanced communication capabilities needed to meet the following challenges: - Integrating electricity from renewable sources; - Controlling demand; - Managing peak consumption; - Promoting widespread adoption of

  1. Contactless ultrasonic energy transfer for wireless systems: acoustic-piezoelectric structure interaction modeling and performance enhancement

    International Nuclear Information System (INIS)

    Shahab, S; Erturk, A

    2014-01-01

    There are several applications of wireless electronic components with little or no ambient energy available to harvest, yet wireless battery charging for such systems is still of great interest. Example applications range from biomedical implants to sensors located in hazardous environments. Energy transfer based on the propagation of acoustic waves at ultrasonic frequencies is a recently explored alternative that offers increased transmitter-receiver distance, reduced loss and the elimination of electromagnetic fields. As this research area receives growing attention, there is an increased need for fully coupled model development to quantify the energy transfer characteristics, with a focus on the transmitter, receiver, medium, geometric and material parameters. We present multiphysics modeling and case studies of the contactless ultrasonic energy transfer for wireless electronic components submerged in fluid. The source is a pulsating sphere, and the receiver is a piezoelectric bar operating in the 33-mode of piezoelectricity with a fundamental resonance frequency above the audible frequency range. The goal is to quantify the electrical power delivered to the load (connected to the receiver) in terms of the source strength. Both the analytical and finite element models have been developed for the resulting acoustic-piezoelectric structure interaction problem. Resistive and resistive–inductive electrical loading cases are presented, and optimality conditions are discussed. Broadband power transfer is achieved by optimal resistive-reactive load tuning for performance enhancement and frequency-wise robustness. Significant enhancement of the power output is reported due to the use of a hard piezoelectric receiver (PZT-8) instead of a soft counterpart (PZT-5H) as a result of reduced material damping. The analytical multiphysics modeling approach given in this work can be used to predict and optimize the coupled system dynamics with very good accuracy and

  2. Contactless Abdominal Fat Reduction With Selective RF™ Evaluated by Magnetic Resonance Imaging (MRI): Case Study.

    Science.gov (United States)

    Downie, Jeanine; Kaspar, Miroslav

    2016-04-01

    Noninvasive body shaping methods seem to be an ascending part of the aesthetics market. As a result, the pressure to develop reliable methods for the collection and presentation of their results has also increased. The most used techniques currently include ultrasound measurements of fat thickness in the treated area, caliper measurements, bioimpedance-based scale measurements or circumferential tape measurements. Although these are the most used techniques, almost all of them have some limitations in reproducibility and/or accuracy. This study shows Magnetic Resonance Imaging (MRI) as the new method for the presentation of results in the body shaping industry. Six subjects were treated by a contactless selective radiofrequency device (BTL Vanquish ME, BTL Industries Inc., Boston, MA). The MRI fat thickness was measured at the baseline and at 4-weeks following the treatment. In addition to MRI images and measurements, digital photographs and anthropometric evaluations such as weight, abdominal circumference, and caliper fat thickness measurements were recorded. Abdominal fat thickness measurements from the MRI were performed from the same slices determined by the same tissue artefacts. The MRI fat thickness difference between the baseline measurement and follow up visit showed an average reduction of 5.36 mm as calculated from the data of 5 subjects. One subject dropped out of study due to non-study related issues. The results were statistically significant based on the Student's T-test evaluation. Magnetic resonance imaging abdominal fat thickness measurements seems to be the best method for the evaluation of fat thickness reduction after non-invasive body shaping treatments. In this study, this method shows average fat thickness reduction of 5.36 mm while the weight of the subjects didn't change significantly. A large spot size measuring 1317 cm(2) (204 square inches) covers the abdomen flank to flank. The average thickness of 5.36 mm of the fat layer reduced

  3. Combined contactless conductometric, photometric, and fluorimetric single point detector for capillary separation methods.

    Science.gov (United States)

    Ryvolová, Markéta; Preisler, Jan; Foret, Frantisek; Hauser, Peter C; Krásenský, Pavel; Paull, Brett; Macka, Mirek

    2010-01-01

    This work for the first time combines three on-capillary detection methods, namely, capacitively coupled contactless conductometric (C(4)D), photometric (PD), and fluorimetric (FD), in a single (identical) point of detection cell, allowing concurrent measurements at a single point of detection for use in capillary electrophoresis, capillary electrochromatography, and capillary/nanoliquid chromatography. The novel design is based on a standard 6.3 mm i.d. fiber-optic SMA adapter with a drilled opening for the separation capillary to go through, to which two concentrically positioned C(4)D detection electrodes with a detection gap of 7 mm were added on each side acting simultaneously as capillary guides. The optical fibers in the SMA adapter were used for the photometric signal (absorbance), and another optical fiber at a 45 degrees angle to the capillary was applied to collect the emitted light for FD. Light emitting diodes (255 and 470 nm) were used as light sources for the PD and FD detection modes. LOD values were determined under flow-injection conditions to exclude any stacking effects: For the 470 nm LED limits of detection (LODs) for FD and PD were for fluorescein (1 x 10(-8) mol/L) and tartrazine (6 x 10(-6) mol/L), respectively, and the LOD for the C(4)D was for magnesium chloride (5 x 10(-7) mol/L). The advantage of the three different detection signals in a single point is demonstrated in capillary electrophoresis using model mixtures and samples including a mixture of fluorescent and nonfluorescent dyes and common ions, underivatized amino acids, and a fluorescently labeled digest of bovine serum albumin.

  4. Smart sensors and systems

    CERN Document Server

    Kyung, Chong-Min; Yasuura, Hiroto; Liu, Yongpan

    2015-01-01

     This book describes for readers technology used for effective sensing of our physical world and intelligent processing techniques for sensed information, which are essential to the success of Internet of Things (IoTs).  The authors provide a multidisciplinary view of sensor technology from MEMS, biological, chemical, and electrical domains and showcase smart sensor systems in real applications including smart home, transportation, medical, environmental, agricultural, etc.  Unlike earlier books on sensors, this book will provide a “global” view on smart sensors covering abstraction levels from device, circuit, systems, and algorithms.  .

  5. Becoming a smart student

    DEFF Research Database (Denmark)

    Lundqvist, Ulla

    English abstract When teachers and students interact in everyday academic activities, some students are ascribed social roles as “smart”, which lead other students to contest these roles. Such struggles around what it means to be smart and which students come to be viewed as smart are a pertinent...... as smart and favoured by the teacher are at risk of being ostracized by peers, of encountering greater pressure for classroom performance and of suffering reduced learning opportunities. The study inspires teachers to create wiggle room for their students by becoming aware of the conventional definitions...

  6. Corporate Smart Phones

    DEFF Research Database (Denmark)

    Cavazotte, Flávia; Heloisa Lemos, Ana; Villadsen, Kaspar

    2014-01-01

    This article explores how the adoption of company sponsored smart phones inflicts upon the lives of professionals. Drawing upon qualitative interviews at a law firm in Brazil, the experiences of new smart phone users are reported upon in detail. Increased accessibility, accuracy and speed...... that negatively affected their private spheres, yet many of them paradoxically requested more efficient smart phone connectivity. The article focuses on the justifications, the different narrative strategies, employed by professionals for their conscious engagement in escalating work connectivity. It is suggested...

  7. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  8. A contact-less method to evaluate the state of charge of nickel batteries using Foucault's eddy currents

    Science.gov (United States)

    Mancier, V.; Metrot, A.; Willmann, P.

    A nickel hydroxide electrode and a commercial battery have been studied by a new and contact-less impedance method, based on Foucault's eddy currents, with the aim of determining their state of charge. Four different current line distributions have been employed and the impedance versus time graphs obtained show a linear variation of this impedance during charge and discharge for all configurations. This new method allows the determination of the state of charge and, furthermore some "artifacts" obvious on these graphs may be useful to detect a deterioration of the studied material.

  9. Development and Test of a Contactless Position and Angular Sensor Device for the Application in Synchronous Micro Motors

    Directory of Open Access Journals (Sweden)

    Andreas WALDSCHIK

    2009-09-01

    Full Text Available In this work, we present a contactless micro position and angular sensor system which consists of fixed commercial magnetic sensor elements, such as hall sensors and a movable part with integrated micro structured polymer magnets. This system serves particularly for linear and rotatory synchronous micro motors which we have developed and successfully tested. In order to achieve high precision and control of these motors an integration of the special micro position and angular sensors is pursued to increase the resolution and accuracy of the devices.

  10. Monitoring the enzymatic conversion of urea to ammonium by conventional or microchip capillary electrophoresis with contactless conductivity detection.

    Science.gov (United States)

    Schuchert-Shi, Aiping; Hauser, Peter C

    2008-05-15

    Capillary electrophoresis with contactless conductivity detection was used to directly quantify the ammonium produced in the enzymatic conversion of urea with urease. This allowed the characterization of the reaction without having to use more elaborate indirect optical methods for quantification. The maximum rate of reaction, V(max), was determined as 5.1 mmol x mL(-1) x min(-1), and the Michaelis-Menten constant, K(m), was determined as 16 mM. Furthermore, the method was successfully applied to the determination of urea in clinical samples of human blood by using a conventional capillary and a microchip device.

  11. A Smart Home Center Platform Solution Based on Smart Mirror

    Directory of Open Access Journals (Sweden)

    Deng Xibo

    2017-01-01

    Full Text Available With the popularization of the concept of smart home, people have raised requirements on the experience of smart living. A smart home platform center solution is put forward in order to solve the intelligent interoperability and information integration of smart home, which enable people to have a more intelligent and convenient life experience. This platform center is achieved through the Smart Mirror. The Smart Mirror refers to a smart furniture, on the basis of the traditional concept of mirror, combining Raspberry Pi, the application of one-way mirror imaging principle, the touch-enabled design, voice and video interaction. Smart Mirror can provide a series of intelligent experience for the residents, such as controlling all the intelligent furniture through Smart Mirror; accessing and displaying the weather, time, news and other life information; monitoring the home environment; remote interconnection operation.

  12. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  13. Insider protection: A report card

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is now focusing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. The authors discuss the general trends in insider protection and the limitations of protection measures currently in use. They also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel

  14. Insider protection: a report card

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is not focussing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. We discuss the general trends in insider protection and the limitations of protection measures currently in use. We also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel

  15. Card - Electronic Money. Comparative Study

    Directory of Open Access Journals (Sweden)

    Mariana Rodica TIRLEA

    2012-11-01

    Full Text Available This type of coin and appeared as a result of the needs for a proper management of the financial resources available in the market, but also to improve the payments system in our country. The card is an alternative to the conventional instruments of payment is a payment instrument with and without cash by means of which the holder disposes of the current account. It is a standardized, secure information and individualized, through which you can perform operations of cash withdrawal, payment for the goods or services purchased, payment obligations by the public administration authorities and funds transfers between accounts, other than those ordered and executed by financial institutions, carried out through the electronic payment instrument.

  16. Smart City project

    KAUST Repository

    Al Harbi, Ayman

    2018-01-01

    A 'smart city' is an urban region that is highly advanced in terms of overall infrastructure, sustainable real estate, communications and market viability. It is a city where information technology is the principal infrastructure and the basis

  17. Test Your Sodium Smarts

    Science.gov (United States)

    ... You may be surprised to learn how much sodium is in many foods. Sodium, including sodium chloride ... foods with little or no salt. Test your sodium smarts by answering these 10 questions about which ...

  18. Smart Location Mapping

    Science.gov (United States)

    The Smart Location Database, Access to Jobs and Workers via Transit, and National Walkability Index tools can help assess indicators related to the built environment, transit accessibility, and walkability.

  19. Guest Editorial - Smart materials

    Czech Academy of Sciences Publication Activity Database

    Barber, Z. H.; Clyne, T. W.; Šittner, Petr

    2014-01-01

    Roč. 30, 13a (2014), s. 1515-1516 ISSN 0267-0836 Institutional support: RVO:68378271 Keywords : smart materials * shape memory effect (SME) Subject RIV: BM - Solid Matter Physics ; Magnetism Impact factor: 0.995, year: 2014

  20. Smart Book Charts

    Science.gov (United States)

    Chinnapongse, Ronald L.

    2015-01-01

    Smart book charts for TPSM: Heatshield for Extreme Entry Environment Technology (HEEET), Conformal Ablative TPS (CA-TPS), 3D Woven Multifunctional Ablative TPS (3D MAT), and Adaptable, Deployable, Entry and Placement Technology (ADEPT).