WorldWideScience

Sample records for defense software cards

  1. Franchise Plan. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    domain could result in minimal benefits in comparison to the cost). b. Chose a domain analysis method that can take advantage of the well understood...agreement with CARDS that enumer- ates the range and level of services to be provided by CARDS and obtained from the franchisee . 3. shares a model-based

  2. Engineer’s Handbook. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    instance of a domain-specific infrastuctur built utilizing the CARDS Concept of Operations /Franchise franchisee Group to whom a franchise is granted. generic...34• develop and operate a domain-specific library system and necessary tools, "* develop a Franchise Plan which provides a blueprint for...Adoption Handbooks, CARDS Command Center Library development and operation related documents, and training and educational material. The Franchise

  3. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  4. Component Provider’s and Tool Developer’s Handbook. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-03-25

    metrics [DISA93b]. " The Software Engineering Institute (SET) has developed a domain analysis process (Feature-Oriented Domain Analysis - FODA ) and is...and expresses the range of variability of these decisions. 3.2.2.3 Feature Oriented Domain Analysis Feature Oriented Domain Analysis ( FODA ) is a domain...documents created in this phase. From a purely profit-oriented business point of view, a company may develop its own analysis of a government or commercial

  5. Software for a multichannel acquisition card

    International Nuclear Information System (INIS)

    Arista Romeu, E. J.; Diaz Garcia, A.; Vela Morales, O.

    2013-01-01

    A software developed in C++ for a multichannel acquisition card is presented. The use of an acquisition add-on card with multiple channels is a suitable solution to substitute several instruments, allowing simultaneous acquisition with each channel. In this work, the limitations of a concrete hardware are discussed and also several different approaches have been suggested. Some preliminary results obtained in laboratory conditions are shown. (Author)

  6. CARDS: A blueprint and environment for domain-specific software reuse

    Science.gov (United States)

    Wallnau, Kurt C.; Solderitsch, Anne Costa; Smotherman, Catherine

    1992-01-01

    CARDS (Central Archive for Reusable Defense Software) exploits advances in domain analysis and domain modeling to identify, specify, develop, archive, retrieve, understand, and reuse domain-specific software components. An important element of CARDS is to provide visibility into the domain model artifacts produced by, and services provided by, commercial computer-aided software engineering (CASE) technology. The use of commercial CASE technology is important to provide rich, robust support for the varied roles involved in a reuse process. We refer to this kind of use of knowledge representation systems as supporting 'knowledge-based integration.'

  7. A microprocessor card software server to support the Quebec health microprocessor card project.

    Science.gov (United States)

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  8. Applying Formal Methods to the Design of Smart Card Software

    NARCIS (Netherlands)

    Butler, Michael; Hartel, Pieter H.; Longley, Mark; de Jong, Eduard

    1997-01-01

    The goal of this work is the design of a language for the implementation of smart card applications, specifically an operating system, as high integrity software. The integrity of a piece of software is demonstrated by proving various properties of the software. The language must therefore exclude

  9. The operating software of the PHAST PC-MCA Card

    International Nuclear Information System (INIS)

    Mukhopadhyay, P.K.

    2001-01-01

    The operating software of the PHAST PC-MCA Card provides powerful hardware support and data analysis features. Spectrum stabilisation is supported. A periodic spectrum saving option helps recovery of usable data in case of power failure. This feature can also be used for decay studies. Spectra acquired in several other types of MCA cards may be read for offline analysis. Non-linear least square fitting of the peaks in the entire spectrum with exponential tailed model is possible in a single operation. Nuclides may be identified and activity determined by matching energies with the gamma energy library of the program. Two component decay analysis at multiple energies is possible. (author)

  10. Towards software-based signature detection for intrusion prevention on the network card

    NARCIS (Netherlands)

    Bos, H.; Huang, Kaiming

    2006-01-01

    CardGuard is a signature detection system for intrusion detection and prevention that scans the entire payload of packets for suspicious patterns and is implemented in software on a network card equiped with an Intel IXP1200 network processor. One card can be used to protect either a single host, or

  11. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  12. Library Development Handbook. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1993-10-29

    features. This feature benefits the individual not versed in the terminology of the domain. When class requirements become part of the domain criteria, they... franchisee - Group to whom a franchise is granted. generic architecture - A collection of high-level paradigms and constraints that characterize the

  13. Médicarte software developed for the Quebec microprocessor health card project.

    Science.gov (United States)

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the

  14. SDI (Strategic Defense Initiative) Software Technology Program Plan

    Science.gov (United States)

    1987-06-01

    station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass 󈨚

  15. Distributed Software-Attestation Defense against Sensor Worm Propagation

    Directory of Open Access Journals (Sweden)

    Jun-Won Ho

    2015-01-01

    Full Text Available Wireless sensor networks are vulnerable to sensor worm attacks in which the attacker compromises a few nodes and makes these compromised nodes initiate worm spread over the network, targeting the worm infection of the whole nodes in the network. Several defense mechanisms have been proposed to prevent worm propagation in wireless sensor networks. Although these proposed schemes use software diversity technique for worm propagation prevention under the belief that different software versions do not have common vulnerability, they have fundamental drawback in which it is difficult to realize the aforementioned belief in sensor motes. To resolve this problem, we propose on-demand software-attestation based scheme to defend against worm propagation in sensor network. The main idea of our proposed scheme is to perform software attestations against sensor nodes in on-demand manner and detect the infected nodes by worm, resulting in worm propagation block in the network. Through analysis, we show that our proposed scheme defends against worm propagation in efficient and robust manner. Through simulation, we demonstrate that our proposed scheme stops worm propagation at the reasonable overhead while preventing a majority of sensor nodes from being infected by worm.

  16. Supporting Software Evolution for Open Smart Cards by Security-by-Contract

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gadyatskya, Olga; Massacci, Fabio

    2011-01-01

    Open multi-application smart cards that allow post-issuance evolution (i.e. loading of new applets) are potentially very attractive for both smart card developers and card users. Yet we find only few of them on the market as no satisfactory solution exists for the assurance that these coming...

  17. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  18. 75 FR 71560 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS...

    Science.gov (United States)

    2010-11-24

    ... also asked what allowance is provided for contractors with accounting software that does not... RIN 0750-AG46 Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting... Regulation Supplement (DFARS) to address DoD Cost and Software Data Reporting system requirements for Major...

  19. 76 FR 75875 - Defense Federal Acquisition Regulation Supplement; Open Source Software Public Meeting

    Science.gov (United States)

    2011-12-05

    ... Regulation Supplement; Open Source Software Public Meeting AGENCY: Defense Acquisition Regulations System... initiate a dialogue with industry regarding the use of open source software in DoD contracts. DATES: Public... to the risks to the contractors and the Government associated with using open source software on DoD...

  20. Re-engineering software systems in the Department of Defense using integrated computer aided software engineering tools

    OpenAIRE

    Jennings, Charles A.

    1992-01-01

    Approved for public release; distribution is unlimited The Department of Defense (DoD) is plagues with severe cost overruns and delays in developing software systems. Existing software within Dod, some developed 15-to 20 years ago, require continual maintenance and modification. Major difficulties arise with maintaining older systems due to cryptic source code and a lack of adequate documentation. To remedy this situation, the DoD, is pursuing the integrated computer aided software engi...

  1. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 4

    National Research Council Canada - National Science Library

    Jones, Capers; Henderson, Kym; Zwikael, Ofer; Lipke, Walt; Coe, David J; Premeaux, David; Armour, Phillip G

    2008-01-01

    CONTENTS: 1) Software Tracking:The Last Defense Against Failure by Capers Jones: This article concentrates on four worst practices and the factors that most often lead to failure and litigation and gives advice on how to avoid them. 2...

  2. Controls Over Operating System and Security Software Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    McKinney, Terry

    1994-01-01

    This is the final in a series of three audits of management controls over the operating systems and security software used by the information processing centers that support the Defense Finance and Accounting Centers (DFAS...

  3. Identifying Procurement Fraud in Defense Agencies: An Analysis of the Government Purchase Card Program

    Science.gov (United States)

    2011-04-30

    fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase

  4. Software Technology for Adaptable, Reliable Systems (STARS). Software Architecture Seminar Report: Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-01-29

    for arlistic creatio arindidviduul distinction and recognitio which accoimpanies classical architectur. Architects study design becaus their problems...gi sIk metwflog. wu selecte&W aftd iwd eteniwilon CAIM saft -w~eam mFac Wup eede (BAR). Thu Ocmbi@ Faces (OP) meprelead. an wumoted b88cgrqhy cor...ARIOHfL-M pROVIM A MEIHODOLOGY FOR ADD48NUO AND SOLVING UAY OF THE ISUS FACING SWBMI FOR DEVLOPING A COUPLtXCPI CAPAWLITY S72 1, F i ’ ’ = II IIII

  5. Agile Software Development in the Department of Defense Environment

    Science.gov (United States)

    2017-03-31

    traditional project/program life cycle (i.e., waterfall ). In the traditional model , security requirements are not evaluated until development is...2015), which may better facilitate adoption of Agile software development in the DoD. Several models are provided for software-dominant and software...the DoD has historically used a traditional, waterfall approach for acquiring systems and services), and oversight requirements that are

  6. SOFTWARE IMPLEMENTATION OF FORMING OF COLOR-BASED CARDS FOR ASSESSMENT OF EARLY STAGES INNOVATION PROJECTS

    Directory of Open Access Journals (Sweden)

    Ekaterina I. Bragina

    2015-01-01

    Full Text Available The article deals with functional program that allows to generate a visualrepresentation of the shareholder tothe innovative project early stage ofdevelopment, formed a color-based cards.

  7. A Software Product Line Vision for Defense Acquisition

    National Research Council Canada - National Science Library

    Campbell, Grady

    2002-01-01

    Experience in industry and government over the last 10 years has shown that a software product line approach can significantly improve productivity and product quality, facilitate change, and reduce life-cycle costs...

  8. Software Technology Readiness Assessment. Defense Acquisition Guidance with Space Examples

    Science.gov (United States)

    2010-04-01

    are never Software CTE candidates 19 Algorithm Example: Filters • Definitions – Filters in Signal Processing • A filter is a mathematical algorithm...Segment Segment • SOA as a CTE? – Google produced 40 million (!) hits in 0.2 sec for “SOA”. Even if we discount hits on the Society of Actuaries and

  9. Agile Software Development in Defense Acquisition: A Mission Assurance Perspective

    Science.gov (United States)

    2012-03-23

    based information retrieval system, we might say that this program works like a hive of bees , going out for pollen and bringing it back to the hive...developers ® Six Siqma is reqistered in the U. S. Patent and Trademark Office by Motorola ^_ 33 @ AEROSPACE Major Areas in a Typical Software...requirements - Capturing and evaluating quality metrics, identifying common problem areas **» Despite its positive impact on quality, pair programming

  10. Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software

    National Research Council Canada - National Science Library

    2007-01-01

    The Defense Science Board (DSB) Task Force on Mission Impact of Foreign Influence on DoD Software examined areas in software security, security architecture, and risk mitigation and received briefings from industry, academia...

  11. Measuring the electric activity of chick embryos heart through 16 bit audio card monitored by the Goldwavetm software

    Science.gov (United States)

    Silva, Dilson; Cortez, Celia Martins

    2015-12-01

    In the present work we used a high-resolution, low-cost apparatus capable of detecting waves fit inside the sound bandwidth, and the software package GoldwaveTM for graphical display, processing and monitoring the signals, to study aspects of the electric heart activity of early avian embryos, specifically at the 18th Hamburger & Hamilton stage of the embryo development. The species used was the domestic chick (Gallus gallus), and we carried out 23 experiments in which cardiographic spectra of QRS complex waves representing the propagation of depolarization waves through ventricles was recorded using microprobes and reference electrodes directly on the embryos. The results show that technique using 16 bit audio card monitored by the GoldwaveTM software was efficient to study signal aspects of heart electric activity of early avian embryos.

  12. CrossTalk. The Journal of Defense Software Engineering. Volume 15, Number 12, December 2002

    Science.gov (United States)

    2002-12-01

    Journal of Defense Software Engineering. Volume 15, Number 12, December 2002 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...You sit backwards on Disneyland rides to see how they do the special effects. • You’ve tried to repair a $5 radio. • You look forward to Christmas so

  13. Command Center Library Model Document. Comprehensive Approach to Reusable Defense Software (CARDS)

    Science.gov (United States)

    1992-05-31

    system, and functionality for specifying the layout of the document. 3.7.16.1 FrameMaker FrameMaker is a Commercial Off The Shelf (COTS) component...facilitating WYSIWYG creation of formatted reports with embedded graphics. FrameMaker is an advanced publishing tool that integrates word processing...available for the component FrameMaker : * Product evaluation reports in ASCII and postscript formats • Product assessment on line in model 0 Product

  14. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    use and customize those policies and procedures applicable to the implementor’s situation. It is not the intent of this manual to restrict the library...improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are

  15. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 4

    Science.gov (United States)

    2009-06-01

    to measure impacted functions not covered by the International Function Point User’s Group (IFPUG) Counting Practices Manual ( CPM ) 4.2. If you are...foggy on the ins and outs of IFPUG or CPM 4.2, or just want a refresher, Total Metrics has simplified the concepts down to an easily under- stood two...information from your organization’s perspective with the software defense industry. • Dedicated space in each issue. • Advertisements ranging from a full

  16. New Software Performance with Balanced Score Card Assessment: Case Study at LPGI Jakarta

    Directory of Open Access Journals (Sweden)

    Brata Wibawa Djojo

    2011-09-01

    Full Text Available Implementation of information technology (IT, especially new software applications, needs to be evaluated for its impact to organization’s business performance related to its strategic goal. The measurement and evaluation of a new software implementation impact in LPGI Jakarta uses Balanced Scorecard (BSC analysis by making comparison of three-year data. The analysis involves four perspectives of BSC: (1 Financial aspect with the growth of gross premium written (GPW, net premium written (NPW, underwriting profit; (2 internal business aspect: the frequency of policy issued and the average production per policy; (3 people or learning and growth which consists of human error and system error; (4 customer aspect with external endorsement and renewal ratio. This research measures and evaluates for the impact of the implementation of a new software application to the new business performance as Marginal and Fair contribution.  At the end of this paper the writer suggests LPGI Jakarta to increase the sales activities to reach the target which is related directly to financial aspect and internal business process aspect.

  17. CrossTalk: The Journal of Defense Software Engineering. Volume 24, Number 1, Jan/Feb 2011

    Science.gov (United States)

    2011-02-01

    Aircraft Sustainment Group Tony Henderson 309th Software Maintenance Group Lt. Col. Brian Hermann, Ph.D. Defense Information Systems Agency Lt. Col...Solutions, Inc. Gordon Sleve Robbins Gioia LLC Larry Smith Software Technology Support Center Dr. John Sohl Weber State University Elizabeth Starrett OO-ALC

  18. IEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement Award 2016: Raytheon Integrated Defense Systems Design for Six Sigma Team

    Science.gov (United States)

    2017-04-01

    worldwide • $23 billion in sales for 2015 Raytheon Integrated Defense Systems (IDS) is one of five businesses within Raytheon Company and is headquartered...Raytheon Integrated Defense Systems DFSS team has developed and implemented numerous leading-edge improvement and optimization methodologies resulting in...our software systems . In this section, we explain the first methodology, the application of statistical test optimization (STO) using Design of

  19. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  20. 76 FR 58149 - Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card® and...

    Science.gov (United States)

    2011-09-20

    ..., was not subject to review under Section 6(b) of Executive Order 12866, Regulatory Planning and Review... 80% of ``marina-type merchants'' are considered small businesses. Marina-type merchants accepting the SEA Card[reg] will pay a normal fee to the banking institution or processing center, similar to VISA...

  1. 76 FR 21849 - Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card® and...

    Science.gov (United States)

    2011-04-19

    ..., therefore, was not subject to review under Section 6(b) of Executive Order 12866, Regulatory Planning and... their home station. Approximately 80% of ``marina-type merchants'' are considered small businesses. Marina-type merchants accepting the SEA Card[supreg] will pay a normal fee to the banking institution or...

  2. A contribution to the test software for the VXI electronic cards of the Eurogam multidetector in a Unix/VXWorks distributed environment

    International Nuclear Information System (INIS)

    Kadionik, P.

    1992-01-01

    The Eurogam gamma ray multidetector involves, in a first phase, 45 hyper pure Ge detectors, each surrounded by an Anti Compton shield of 10 BGO detectors. In order to ensure the highest reliability and an easy upgrade of the array, the electronic cards have been designed in the new VXI (VME Bus Extension to Instrumentation) standard; this allows to drive the 495 detectors with 4300 parameters to be adjusted by software. The data acquisition architecture is distributed on an Ethernet network. The software for set up and tests of the VXI cards have been written in C, it uses a real time kernel (VxWorks from Wind River Systems) interfaced to the Sun Unix environment. The inter-tasks communications use the Remote Procedure Calls protocol. The inner-shell of the software is connected to a data base and to a graphic interface which allows the engineers or physicists to have a very easy set-up for so many parameters to adjust

  3. Proposal for a New ’Rights in Software’ Clause for Software Acquisitions by the Department of Defense.

    Science.gov (United States)

    1986-09-01

    point here Is that the capital cost of design and development (including the cost of software tools and/or CAD/CAM programs which aided in the development...and capitalization , software Is in many ways more Ike a hardware component than it is Ike the tech- nical documentation which supports the hardware...Invoked, the owner of intelectual property rights in software may attach appropriate copyright notices to software delivered under this contract. 2.2.2

  4. Knowledge-based software design for Defense-in-Depth risk monitor system and application for AP1000

    International Nuclear Information System (INIS)

    Ma Zhanguo; Yoshikawa, Hidekazu; Yang Ming; Nakagawa, Takashi

    2017-01-01

    As part of the new risk monitor system, the software for the plant Defense-in-Depth (DiD) risk monitor system was designed based on the state-transition and finite-state machine, and then the knowledge-based software was developed by object-oriented method utilizing the Unified Modeling Language (UML). Currently, there are mainly two functions in the developed plant DiD risk monitor software that are knowledge-base editor which is used to model the system in a hierarchical manner and the interaction simulator that simulates the interactions between the different actors in the model. In this paper, a model for playing its behavior is called an Actor which is modeled at the top level. The passive safety AP1000 power plant was studied and the small-break loss-of-coolant accident (SBLOCA) design basis accident transient is modeled using the plant DiD risk monitor software. Furthermore, the simulation result is shown for the interactions between the actors which are defined in the plant DiD risk monitor system as PLANT actor, OPERATOR actor, and SUPERVISOR actor. This paper shows that it is feasible to model the nuclear power plant knowledge base using the software modeling technique. The software can make the large knowledge base for the nuclear power plant with small effort. (author)

  5. CrossTalk. The Journal of Defense Software Engineering. Volume 26, Number 1

    Science.gov (United States)

    2013-02-01

    comprehen- sive software development process, which incorporates best practices as well as standards such as IEEE 12207 -2008. The contractor will be...5], defines software quality as the degree to which software possesses a desired combination of attributes. Similarly, ISO /IEC 9126-1:2001 [6], one...attributes of the quality characteristics defined in ISO /IEC 9126-1. It should be noted that the 9126-series is being revised as part of the Software Product

  6. CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 4

    Science.gov (United States)

    2013-07-01

    to 30 pound laptops were about as “portable” as comput- ers could be. Back in the 1960s, when Star Trek first debuted, Star Fleet ensigns walked...have accessible to me almost all recorded history. In the 1960s, when Star Trek had tablets disguised as PADDs, and cell phones and Bluetooth...handle the development at a small fraction of the average defense program cost. The history of defense and NASA programs offers plenty of examples of

  7. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 9

    Science.gov (United States)

    2006-09-01

    activities to ISO /IEC 15288 system life cycle and ISO /IEC 12207 software life cycle processes. • Microsoft Security Development Lifecycle (SDL) [18, 19...Standardization/International Electrotechnical Commission ( ISO / IEC) Standard 15026 System and Software Assurance, which adds securi- ty assurance...Software ProcessSM (TSPSM Secure) [21]. The CMM and ISO /IEC process models are defined at a higher level of abstraction than SDL and CLASP, which

  8. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 8

    Science.gov (United States)

    2008-08-01

    distributed black -and-white copy to its current form and shape. It is my hope that CrossTalk continues to publish insightful articles for another 20...Free: The Art of Making Quality Certain. New York: Mentor, New American Library, 1979. 7. Humphrey, Watts S. Managing the Software Process. Reading, MA...managing editor. The jazz trio worked their magic attracting a broader software audience as they infused topics outside the original embedded software

  9. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  10. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 8, August 2007

    National Research Council Canada - National Science Library

    2007-01-01

    ... organizations in multiple countries. Next, Nelson Perez and Earnest Ambrose relate their story of successful software process improvement in "Lessons Learned in Using Agile Methods for Process Improvement...

  11. A Venture Capital Mixed Model for the Acquisition of Defense Software Products

    National Research Council Canada - National Science Library

    Botsakos, Michael T

    2007-01-01

    .... Cost and schedule overruns are the consequence of the software development models selected, inaccurate estimation of size, time, and cost, the instability of user requirements, and poor decision...

  12. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 2

    National Research Council Canada - National Science Library

    Phillips, Mike; Craig, Rushby; Jackelen, George; Humphrey, Watts S; Konrad, Michael D; Over, James W; Pries-Heje, Jan; Johansen, Joern; Christiansen, Mads; Korsaa, Morten; Laporte, Claude Y; April, Alain; Renault, Alain

    2007-01-01

    ...: This article describes how the 309th Software Maintenance Group used Standard Capability Maturity Model Integration Appraisal Method for Process Improvement B to identify opportunities for additional...

  13. Controls Over Operating System and Security Software Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    1993-01-01

    ... programs from one another. Security software provides access controls that restrict the use of computer resources to authorized individuals and limit those individuals to the computer resources required to perform their jobs...

  14. Emerging Issues in the Acquisition of Open Source Software Within the US Department of Defense

    National Research Council Canada - National Science Library

    Scacchi, Walt; Alspaugh, Thomas A

    2008-01-01

    In the past five or so years, it has become clear that the US Air Force, Army, and Navy have all committed to a strategy of acquiring software-intensive systems that require or utilize an open architecture (OA...

  15. Increasing Open Source Software Integration on the Department of Defense Unclassified Desktop

    National Research Council Canada - National Science Library

    Schearer, Steven A

    2008-01-01

    .... While some of this expenditure goes to fund special-purpose military software, much of it is absorbed by license fees for computer operating systems and general-purpose office automation applications...

  16. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 12

    National Research Council Canada - National Science Library

    Jones, Capers; Huff, Lloyd; Novak, George; Lau, Yun-Tung; Torri, Stephen; Sanders, Derek; Hamilton, Drew; Evans, Gordon; Frost, Alison A; Campo, Michael J

    2007-01-01

    CONTENTS: 1) Geriatric Issues of Aging Software by Capers Jones: Capers Jones discusses the need of every company to evaluate and consider best practices for maintenance and to avoid common worst practices. 2...

  17. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 6

    National Research Council Canada - National Science Library

    Jones, Capers; Jost, Alan C; Perkins, Timothy K; Fleming, Quentin W; Koppelman, Joel M; Lipke, Walt; Olson, Timothy G; Kimmerly, Paul

    2006-01-01

    "Social and Technical Reasons for Software Project Failures," by Capers Jones -- Applying a careful program of risk analysis and risk abatement can lower the effects of the technical and social issues...

  18. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 2, February 2009

    Science.gov (United States)

    2009-02-01

    possible system attacks. by Ron Greenfield and Dr. Charley Tichenor Enforcing Static Program Properties to Enable Safety-Critical Use of Java Software...Assurance by Ron Greenfield and Dr. Charley Tichenor, and Dr. Kelvin Nilsen’s Enforcing Static Program Properties in Safety-Critical Java Software Components...01&lang=en>. 5. Shakespeare, William. The Tempest. 6. Intel. “How Chips are Made.” 2008 <www.intel.com/ education /making chips/preparation.htm>. 7

  19. Defense-in-depth for common cause failure of nuclear power plant safety system software

    International Nuclear Information System (INIS)

    Tian Lu

    2012-01-01

    This paper briefly describes the development of digital I and C system in nuclear power plant, and analyses the viewpoints of NRC and other nuclear safety authorities on Software Common Cause Failure (SWCCF). In view of the SWCCF issue introduced by the digitized platform adopted in nuclear power plant safety system, this paper illustrated a diversified defence strategy for computer software and hardware. A diversified defence-in-depth solution is provided for digital safety system of nuclear power plant. Meanwhile, analysis on problems may be faced during application of nuclear safety license are analyzed, and direction of future nuclear safety I and C system development are put forward. (author)

  20. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 11

    Science.gov (United States)

    2006-11-01

    8>. 7. Wallace, Delores R. Practical Soft- ware Reliability Modeling. Proc. of the 26th Annual NASA Goddard Software Engineering Workshop, Nov. 2001...STAR WARS TO STAR TREK To Request Back Issues on Topics Not Listed Above, Please Contact <stsc. customerservice@hill.af.mil>. About the Authors Kym

  1. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 2

    Science.gov (United States)

    2012-04-01

    both editorial oversight and technical review of the journal. CrossTalk’s mission is to encour- age the engineering development of software to improve...sending e-mail. (Robertson, 2011) Mobile Workers and related products - Telecommuting -- the home office - Pressure to provide tools and access to

  2. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 12, December 2006

    Science.gov (United States)

    2006-12-01

    process. The industry average for project investment in its requirements process is 3 percent of project costs; data from NASA shows that when 8- 14...requirements error is a defect that is dis- covered in delivered code that is a result of a requirement statement. Data from NASA provided by requirements...CENTRICITY AUG2006 c ADA 2005 SEPT2006 c SOFTWARE ASSURANCE OCT2006 c STAR WARS TO STAR TREK NOV2006 c MANAGEMENT BASICS To Request Back Issues on Topics

  3. Contracting for Agile Software Development in the Department of Defense: An Introduction

    Science.gov (United States)

    2015-08-01

    development model behaves differently from traditional waterfall -based development models , and how those differences manifest themselves in program execution...may all be familiar language to a contracting officer. Estimated software size under a waterfall model will drive schedule and cost estimates, and... waterfall development models : In a waterfall -based approach on DoD programs (sometimes called “document-centric”): assigned stakeholders create formal

  4. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 6

    Science.gov (United States)

    2005-06-01

    Bollinger The MITRE Corporation1 Progress brings new dangers: Powerful home computers, inexpensive high-speed Internet access, telecommuting , and software...been using for years. Sure enough, GIANT was able to finish removing the hard - core spyware. At some point, my Internet security package had been... The sad truth is that if you do nothing more than attach a Windows PC to the Internet over a high- speed line, it will be subjected to the first

  5. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  6. Software Reviews.

    Science.gov (United States)

    Miller, Anne, Ed.; Radziemski, Cathy, Ed.

    1988-01-01

    Three pieces of computer software are described and reviewed: HyperCard, to build and use varied applications; Iggy's Gnees, for problem solving with shapes in grades kindergarten-two; and Algebra Shop, for practicing skills and problem solving. (MNS)

  7. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  8. Software

    Energy Technology Data Exchange (ETDEWEB)

    Macedo, R.; Budd, G.; Ross, E.; Wells, P.

    2010-07-15

    The software section of this journal presented new software programs that have been developed to help in the exploration and development of hydrocarbon resources. Software provider IHS Inc. has made additions to its geological and engineering analysis software tool, IHS PETRA, a product used by geoscientists and engineers to visualize, analyze and manage well production, well log, drilling, reservoir, seismic and other related information. IHS PETRA also includes a directional well module and a decline curve analysis module to improve analysis capabilities in unconventional reservoirs. Petris Technology Inc. has developed a software to help manage the large volumes of data. PetrisWinds Enterprise (PWE) helps users find and manage wellbore data, including conventional wireline and MWD core data; analysis core photos and images; waveforms and NMR; and external files documentation. Ottawa-based Ambercore Software Inc. has been collaborating with Nexen on the Petroleum iQ software for steam assisted gravity drainage (SAGD) producers. Petroleum iQ integrates geology and geophysics data with engineering data in 3D and 4D. Calgary-based Envirosoft Corporation has developed a software that reduces the costly and time-consuming effort required to comply with Directive 39 of the Alberta Energy Resources Conservation Board. The product includes an emissions modelling software. Houston-based Seismic Micro-Technology (SMT) has developed the Kingdom software that features the latest in seismic interpretation. Holland-based Joa Oil and Gas and Calgary-based Computer Modelling Group have both supplied the petroleum industry with advanced reservoir simulation software that enables reservoir interpretation. The 2010 software survey included a guide to new software applications designed to facilitate petroleum exploration, drilling and production activities. Oil and gas producers can use the products for a range of functions, including reservoir characterization and accounting. In

  9. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  10. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  11. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  12. Towards an open sound card

    DEFF Research Database (Denmark)

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    The architecture of a sound card can, in simple terms, be described as an electronic board containing a digital bus interface hardware, and analog-to-digital (A/D) and digital-to-analog (D/A) converters; then, a soundcard driver software on a personal computer's (PC) operating system (OS) can con...

  13. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  14. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  15. DoD Purchase Card Program Audit Coverage

    National Research Council Canada - National Science Library

    2001-01-01

    .... We prepared this summary report at the request of the Director, Defense Procurement to provide a central repository of purchase card audit report findings and to identify misuse trends and problems...

  16. CrossTalk, The Journal of Defense Software Engineering. Volume 27, Number 4. July/August 2014

    Science.gov (United States)

    2014-07-01

    his writing. His works include “The Psychology of Computer Program- ming, An Introduction to General Systems Thinking, Becoming a Technical Leader ...en.wikipedia.org/wiki/Six_phases_of_a_big_ project). I am certainly not the originator. In 1997, Robert Glass published a book entitled “Software Runaways ...failures. In fact, to quote from the Amazon.com “blurb” on the book, Runaways brings a software engineer’s perspective to projects like: American

  17. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  18. CrossTalk, The Journal of Defense Software Engineering. Volume 28 Number 1. Jan/Feb 2015

    Science.gov (United States)

    2015-02-01

    minority participation is low [24]. At UT Tyler, we conduct science camps for high-school girl students in the summer to encourage them to pursue STEM ...Intellectual Property Rights (Data Rights for commercial built software applications), CLE074 on Cybersecurity (March 2015 deployment), and CLL

  19. CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 1, Jan/Feb 2010

    Science.gov (United States)

    2010-02-01

    Maintenance Group Weber State University Arrowpoint Solutions, Inc. Robbins Gioia LLC Software Technology Support Center Weber State University OO-ALC...Les Dupaix Monika Fast Robert W. Ferguson Dr. Doretta Gordon Dr. John A. “Drew” Hamilton Jr. Gary Hebert Tony Henderson Lt. Col. Brian Hermann, Ph.D

  20. CrossTalk. The Journal of Defense Software Engineering. Volume 27, Number 2. March/April 2014

    Science.gov (United States)

    2014-04-01

    integrity and authenticity of the end product The Software Maintenance Group at Hill Air Force Base is recruiting civilians (U.S. Citizenship...B.Claise, “ Cisco Systems NetFlow Services Export Version 9”, October 2004, RFC 3954, <http://tools.ietf.org/html/rfc3954> 6. L. Daigle, “WHOIS

  1. CrossTalk: The Journal of Defense Software Engineering. Volume 25, Number 1, January/February 2012

    Science.gov (United States)

    2012-02-01

    February 2012 25 HIGH MATURITY - THE PAYOFF expanded target audience of producers, buyers, and users of software products and systems bring with it...diet Pepsi and Ho-Hos. • You have read this list, and realized that several items apply to you. And it got less and less funny as you kept

  2. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  3. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  4. Followup Audit of Controls Over Operating System and Security Software and Other General Controls for Computer Systems Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    1996-01-01

    This is the third in a series of followup audits made to evaluate the corrective actions taken by the Defense Finance and Accounting Service, the Defense Information Systems Agency, and the Defense...

  5. CrossTalk: The Journal of Defense Software Engineering. Volume 27, Number 6, November/December 2014

    Science.gov (United States)

    2014-12-01

    conclusion lest the analysis is biased . 6 CrossTalk—November/December 2014 SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORT To demonstrate...In some Agile development environments the relative separa- tion between tools and processes is so seamless as to be almost subconscious to process...a well-articulated process description, but if the performer is a tool lover, he will find fault with the defined process, always having a bias for

  6. CrossTalk. The Journal of Defense Software Engineering. Volume 23, Number 6, Nov/Dec 2010

    Science.gov (United States)

    2010-11-01

    such standards are International Standards Organization/ International Electrotechnical Commission ( ISO / IEC) standards 15288 for system engineering...and 12207 for software development. 13. Office of the DoD CIO. White Paper Phase I: A Competency Framework for the DoD Architect. Washington...processes in later phases. DoD-Centric Use Case Current support for net-centric operations is based on iso - lated deployments of relevant services in

  7. CrossTalk. The Journal of Defense Software Engineering. Volume 24, Number 5, Sep/Oct 2011

    Science.gov (United States)

    2011-09-01

    ancillary materials is counterfeit. Coun- terfeiting of ancillary materials may involve copying and slightly altering legitimate product data or...tools that implemented/applied the software protection mechanisms were authentic and trustworthy. IPR Enforcement Efforts In 2005, KPMG and the...2005. 5. KPMG and the Alliance for Gray Market and Counterfeit Abatement. “Managing the Risks of Counterfeiting in the Information Technology Industry

  8. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009

    Science.gov (United States)

    2009-12-01

    anyone, and a public key, which is publicly advertised . A signer encrypts data using the recipient’s public key, and the receiver decrypts it with...of service. 6. Encryption certificates are advertised in the DoD via the Joint Enterprise Directory Service (located at <https:// jeds.gds.disa.mil...mainframe legacy code into an iPhone app. In Hell’s Kitchen, programmers try to find a software bug nestled inside two mil- lion lines of undocumented

  9. CrossTalk: The Journal of Defense Software Engineering. Volume 28, Number 2, March/April 2015

    Science.gov (United States)

    2015-04-01

    software is like striking gold in that you get a very high return on investment for testing. Optimization Technique #2 - Apply the Pareto Principle The... Pareto Principle (the 80/20 rule) that says you can get the majority of value from the minority of people, time or effort. In fact, my experience is...week test in two weeks. So, the client and I worked together to focus on key areas and skip minor areas. The test design was based on critical

  10. CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 3, May-June 2013

    Science.gov (United States)

    2013-06-01

    in which the pieces are being shaped at the same time they are being as- sembled. If I am honest, software is probably more like a Rube Goldberg ...losing the focus on architecting activities that help maintain the desired state, enable cost savings, and ensure delivery tempo when other agile...masters degrees and working as developers), accepted by the same in- structor, with counted LOC identically, yielded variations as great as 22:1, and

  11. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  12. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  13. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  14. Time Delay Measurements of Key Generation Process on Smart Cards

    Science.gov (United States)

    2015-03-01

    delve into the meat of the thesis, describing a java program written to test DOD CAC cards that have ECC algorithms implemented. Test data will be...WICOM.2009.5302782 Defense Enterprise Mobility – A game changer for the Department of Defense. (2012, Jan.). , DISA: DOD Mobility Program. Retrieved

  15. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 6, September/October 2009

    Science.gov (United States)

    2009-10-01

    distinguished intermediate gates (Y6, Y7) known as out- puts. We define a signal as a vertical reading of a column in the truth table (a fully enu...glanced at the EKG and noticed severe brady- cardia. He realized he had never re- started the ventilator. This patient ultimately died. [10] This accident...attacker to achieve his objective. Google “Ariane 5 Flight 501,” “Therac-25 accidents,” or “Toyota Prius software bug” to read about some dramat- ic

  16. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  17. Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

    Directory of Open Access Journals (Sweden)

    Yadong Zhou

    2018-01-01

    Full Text Available As the most competitive solution for next-generation network, SDN and its dominant implementation OpenFlow are attracting more and more interests. But besides convenience and flexibility, SDN/OpenFlow also introduces new kinds of limitations and security issues. Of these limitations, the most obvious and maybe the most neglected one is the flow table capacity of SDN/OpenFlow switches. In this paper, we proposed a novel inference attack targeting at SDN/OpenFlow network, which is motivated by the limited flow table capacities of SDN/OpenFlow switches and the following measurable network performance decrease resulting from frequent interactions between data and control plane when the flow table is full. To the best of our knowledge, this is the first proposed inference attack model of this kind for SDN/OpenFlow. We implemented an inference attack framework according to our model and examined its efficiency and accuracy. The evaluation results demonstrate that our framework can infer the network parameters (flow table capacity and usage with an accuracy of 80% or higher. We also proposed two possible defense strategies for the discovered vulnerability, including routing aggregation algorithm and multilevel flow table architecture. These findings give us a deeper understanding of SDN/OpenFlow limitations and serve as guidelines to future improvements of SDN/OpenFlow.

  18. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  19. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  20. Review of sound card photogates

    International Nuclear Information System (INIS)

    Gingl, Zoltan; Mingesz, Robert; Mellar, Janos; Makra, Peter

    2011-01-01

    Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card - an interface for analogue signals. It is possible to make very simple yet highly accurate photogates for cents, while much more sophisticated solutions are also available at a still very low cost. In our paper we show several experimentally tested ways of implementing sound card photogates in detail, and we also provide full-featured, free, open-source photogate software as a much more efficient experimentation tool than the usually used sound recording programs. Further information is provided on a dedicated web page, www.noise.physx.u-szeged.hu/edudev.

  1. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  2. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  3. Rh-flash acquisition card

    International Nuclear Information System (INIS)

    Bourrion, O.

    2003-01-01

    The rh-flash card main purpose is to convert and store the image of the analog data present at input into an output buffer, namely in a given timing window besides a stop signal (like a digital oscilloscope). It is conceived in VME format 1U wide with an additional connector. Novelty of this card is its ability to sample at a high frequency, due to flash coders, and this at a high repetition rate. To do that the card allows the storage of the data considered 'useful' and that is done by storing only the data exceeding a certain threshold. This can be useful for instance for viewing peaks in a spectrum, and obtaining their relative location. The goal is to stock and process the data sampled before and after the arrival of a stop signal (what entails a storage depth). A threshold is defined and any peak exceeding its level will really be stored in the output buffer which is readable through the VME bus. The peak values will be stored as well as m preceding and n subsequent values (both programmable). Obviously, if the threshold is zero the system of data processing is off and all data will be stored. The document is structured on six sections titled: 1. Description; 2. Specifications; 3. Explaining the design of channels; 4. Explaining the shared part of the design; 5. Addressing (→ user guide); 6. Software precautions. (author)

  4. Signal processing for smart cards

    Science.gov (United States)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  5. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  6. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  7. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  8. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  9. Department of Defense Software Factbook

    Science.gov (United States)

    2017-07-07

    Domain 107 Figure 72: Project Distribution by Operating Environment 108 Figure 73: Program Distribution by Language Family 109 Figure 74: Reported...across system domains, development organizations, and languages , this data summary is most useful to high- level decision makers. The data can be used...reports are provided at the project level or subsystem level, not at the DoD Acquisition Program level. The data points analyzed in this report are

  10. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  11. Using Formal Methods to Cultivate Trust in Smart Card Operating Systems

    NARCIS (Netherlands)

    Alberda, Marjan I.; Hartel, Pieter H.; de Jong, Eduard K.

    To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards contain relatively simple computers, and are used only for a specific class of applications, it is feasible to make the language used to program the software components focused and tiny. Formal

  12. Application of CLIPPER in the design of radiation history card for a radiation worker

    International Nuclear Information System (INIS)

    Datta, D.; Pendharkar, K.A.; Krishnamony, S.

    1994-01-01

    Radiation history card for the plant workers has been designed based on a PC software. The software is developed using CLIPPER language and is menu driven. The card gives instant information about the radiation data of an occupational worker useful for effective exposure control. (author). 1 tab

  13. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  14. Software Acquisition and Software Engineering Best Practices

    National Research Council Canada - National Science Library

    Eslinger, S

    1999-01-01

    The purpose of this white paper is to address the issues raised in the recently published Senate Armed Services Committee Report 106-50 concerning Software Management Improvements for the Department of Defense (DoD...

  15. Selecting e-Purse Smart Card Technology via Fuzzy AHP and ANP

    Directory of Open Access Journals (Sweden)

    Nurgül Demirtaş

    2014-01-01

    Full Text Available Developments in the information technologies provide important advantages to consumers and companies. Nowadays, smart card technology starts to use e-purse applications. The aim of this paper is to identify the most important decision criteria to select the best card technology. In this study, at first smart card and multiple selection techniques were explained. Then the best card technology was selected for an e-purse application. The three types of card technologies were examined and the most important criteria were taken into account by the software developer while they develop card software. Fuzzy analytic hierarchy process (FAHP and analytical network process (ANP techniques were used to compare smart card technologies.

  16. Credit Card Quiz.

    Science.gov (United States)

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  17. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  18. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  19. Evaluation of Department of Defense Compliance With Criminal History Data Reporting Requirements

    National Research Council Canada - National Science Library

    1997-01-01

    ...." The Secretary of Defense was directed to provide a report to Congress on the consistency with which fingerprint cards and final dispositions are reported by the Defense Criminal Investigative Organizations (DCIOs...

  20. THE BASIS OF THE MARKET REGULATION OF PAYMENT CARDS

    Directory of Open Access Journals (Sweden)

    Khetagurov G. V.

    2017-06-01

    Full Text Available The article is devoted to basics and the regulation problems of the modern payment cards market. In particular, it addresses the key participants in a payment system, which include the Central Bank, credit organizations, settlement and clearing centers. The paper explores the basic functions of the participants. The author analyzes approaches of card payment systems to development and implementation monitoring of standards and regulations relative to the technology: hardware and software, communication channels, etc. The article contains analysis of information exchange in the framework of payment cards market and specific features of the design and development of a payment infrastructure. It discusses the economic model of the payment cards market, which is based on commission payments. The paper describes the key fees. At the final stage of the study, the author examines the role of different global regulators in the payment card market, conducts an analysis of the foundations of the Russian legislation regulating this market.

  1. Modelling and Implementation of Catalogue Cards Using FreeMarker

    Science.gov (United States)

    Radjenovic, Jelen; Milosavljevic, Branko; Surla, Dusan

    2009-01-01

    Purpose: The purpose of this paper is to report on a study involving the specification (using Unified Modelling Language (UML) 2.0) of information requirements and implementation of the software components for generating catalogue cards. The implementation in a Java environment is developed using the FreeMarker software.…

  2. Statement of Robert J. Lieberman Assistant Inspector General Department of Defense Before the Subcommittee on Oversight and Investigations House Committee on Veterans Affairs. United States House of Representatives on Procuring Pharmaceuticals for the Department of Defense

    National Research Council Canada - National Science Library

    2000-01-01

    .... Although military treatment facilities also purchase some items on local contracts or by using credit cards for small purchases, the bulk of the Defense procurement activity for pharmaceuticals...

  3. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  4. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  5. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  6. Perspectives on Open Source Software

    National Research Council Canada - National Science Library

    Hissam, Scott

    2001-01-01

    Open source software (OSS) is emerging as the software community's next "silver bullet" and appears to be playing a significant role in the acquisition and development plans of the Department of Defense (DoD) and industry...

  7. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  8. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  9. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Manager at [email protected]us.army.mil . References: Department of Defense Instruction number 8520.2... DEPARTMENT OF DEFENSE Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation Acquisition (ETA) AGENCY: Department of...

  10. Smart Icon Cards

    Science.gov (United States)

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  11. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  12. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  13. Sistem Pencatatan Kehadiran Berbasis Java Card

    Directory of Open Access Journals (Sweden)

    Lidya Octarina

    2010-12-01

    Full Text Available The purposes of this research are to prevent jockey in exams, reduce the occurrence of error in attendance record at practicum or exams, and reduce error in filling students' attendance status to the attendance system. Three main parts of software development method are used; analysis, design, and literature method. Current system survey, analysis of the survey findings, identify the information, and identifying system requirements are implemented in analysis method. The design method that is used in this research is Unified Modeling Language (UML. The using of attendance recording system that uses Java Card-based application makes students identity card has a new function as the tool to make attendance. Conclusion of the research has shown that it can prevent identity fraud, minimize the time wasted in attendance system, reduce the printing paper, and reduce tagging errors eligibility status exam of students. 

  14. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  15. Development of a radiometer based on an Add-ON card for PC

    International Nuclear Information System (INIS)

    Bolanos, L.; Lopez, B.; Fernandez, J.L.; Laria, J.

    1997-01-01

    The design of an add-on card for PC that enables it to record nuclear pulses provided by two channels is described in this paper. This card carries acts as a pulse discriminator, and according to the software it finds many appliances in radioimmunoassay, nuclear medicine, industry and other fields

  16. Japanese Tarot Cards

    Directory of Open Access Journals (Sweden)

    Laura Miller

    2017-04-01

    Full Text Available This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced with images from the world of Japanese art, history, and popular culture. These substitutions either gloss over the gaps between Western and Japanese world views or meld them into a new form, allowing the tarot entry into a different or hybrid metaphysical culture. Attention to tarot cards is important because of their great economic and cultural impact in contemporary Japan. A widespread love of tarot in Japan provides insight into domains of pleasure, spiritual exploration, and fandom.

  17. Japanese Tarot Cards

    OpenAIRE

    Laura Miller

    2017-01-01

    This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced wit...

  18. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  19. Big Memory Elegance: HyperCard Information Processing and Desktop Publishing.

    Science.gov (United States)

    Bitter, Gary G.; Gerson, Charles W., Jr.

    1991-01-01

    Discusses hardware requirements, functions, and applications of five information processing and desktop publishing software packages for the Macintosh: HyperCard, PageMaker, Cricket Presents, Power Point, and Adobe illustrator. Benefits of these programs for schools are considered. (MES)

  20. The impacts of smart cards on hospital information systems--an investigation of the first phase of the national health insurance smart card project in Taiwan.

    Science.gov (United States)

    Liu, Chien-Tsai; Yang, Pei-Tun; Yeh, Yu-Ting; Wang, Bin-Long

    2006-02-01

    % dissatisfied and strongly dissatisfied, that is twice as many hospitals with satisfied (about 10%). Our recommendations for those who are planning to implement similar projects are: (1) provide public-awareness programs or campaigns across the country for elucidating the smart card policy and educate the public on the proper usage and storage of the cards, (2) improve the quality of the NHI-IC cards, (3) conduct comprehensive tests in software and hardware components associated with NHI-IC cards before operating the systems and (4) perform further investigations in authentication approaches and develop tools that can quickly identify where and what the problems are.

  1. SC2: Secure Communication over Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Papini, Davide

    2012-01-01

    The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the c...

  2. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  3. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  4. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  5. Investigation into Plastic Cards

    Directory of Open Access Journals (Sweden)

    Neringa Stašelytė

    2015-03-01

    Full Text Available The article examines the strength of laminating plastic cards at different lamination temperatures. For investigation purposes, two types of plastic substrate and films have been used. Laminate strength has been tested (CMYK to establish the impact of colours on the strength of laminate. The paper compares inks supplied by two different producers. The colour characteristics of CIE L*a*b* space before and after the lamination process have been found. According to lamination strength and characteristics of the colours, the most suitable inks, temperature and films have been chosen.

  6. DIABCARD a smart card for patients with chronic diseases.

    Science.gov (United States)

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  7. Design of a motion JPEG (M/JPEG) adapter card

    Science.gov (United States)

    Lee, D. H.; Sudharsanan, Subramania I.

    1994-05-01

    In this paper we describe a design of a high performance JPEG (Joint Photographic Experts Group) Micro Channel adapter card. The card, tested on a range of PS/2 platforms (models 50 to 95), can complete JPEG operations on a 640 by 240 pixel image within 1/60 of a second, thus enabling real-time capture and display of high quality digital video. The card accepts digital pixels for either a YUV 4:2:2 or an RGB 4:4:4 pixel bus and has been shown to handle up to 2.05 MBytes/second of compressed data. The compressed data is transmitted to a host memory area by Direct Memory Access operations. The card uses a single C-Cube's CL550 JPEG processor that complies with the baseline JPEG. We give broad descriptions of the hardware that controls the video interface, CL550, and the system interface. Some critical design points that enhance the overall performance of the M/JPEG systems are pointed out. The control of the adapter card is achieved by an interrupt driven software that runs under DOS. The software performs a variety of tasks that include change of color space (RGB or YUV), change of quantization and Huffman tables, odd and even field control and some diagnostic operations.

  8. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  9. Design and implementation of a smart card based healthcare information system.

    Science.gov (United States)

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  10. Microprocessor Card for Cuban Series polarimeters Laserpol

    International Nuclear Information System (INIS)

    Arista Romeu, E.; Mora Mazorra, W.

    2012-01-01

    We present the design consists of a card based on a micro-processor 8-bit adds new software components and their basic living, which allow to deliver new services and expand the possibilities for use in other applications of the polarimeter LASERPOL series, as the polarimetric detection. Given the limitations of the original card it was necessary to introduce a series of changes that would allow to address new user requirements, and expand the possible applications of the instruments. This was done the expansion of the capacity of the EPROM and RAM memory, the decoder circuit was implemented memory map using a programmable integrated circuit, and introduced a real time clock with nonvolatile RAM, these features are exploited to the introduction of new features such as the realization of the polarimeter calibration by the user from a sample pattern or a calibration pattern used as a reference, and the incorporation of the time and date to the reports of measurements required industry for quality control processes. Card that is achieved along with the rest of the components is compatible with polarimeters LASERPOL 101M Series, 3M and LP4, pin to pin, which facilitates their incorporation into the polarimeters in operation in the industry 'in situ' replacement cards from previous models, allowing to extend the possibilities of statistical processing, precision and accuracy of the instruments. Improved measurements in the industry, resulting in significant savings by elimination of losses in production and raw materials. The improved response speed of reading the polarimeters LASERPOL Use and polarimetric detectors. (Author)

  11. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  12. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  13. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  14. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  15. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  16. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  17. CARD9-Dependent Neutrophil Recruitment Protects against Fungal Invasion of the Central Nervous System.

    Directory of Open Access Journals (Sweden)

    Rebecca A Drummond

    2015-12-01

    Full Text Available Candida is the most common human fungal pathogen and causes systemic infections that require neutrophils for effective host defense. Humans deficient in the C-type lectin pathway adaptor protein CARD9 develop spontaneous fungal disease that targets the central nervous system (CNS. However, how CARD9 promotes protective antifungal immunity in the CNS remains unclear. Here, we show that a patient with CARD9 deficiency had impaired neutrophil accumulation and induction of neutrophil-recruiting CXC chemokines in the cerebrospinal fluid despite uncontrolled CNS Candida infection. We phenocopied the human susceptibility in Card9-/- mice, which develop uncontrolled brain candidiasis with diminished neutrophil accumulation. The induction of neutrophil-recruiting CXC chemokines is significantly impaired in infected Card9-/- brains, from both myeloid and resident glial cellular sources, whereas cell-intrinsic neutrophil chemotaxis is Card9-independent. Taken together, our data highlight the critical role of CARD9-dependent neutrophil trafficking into the CNS and provide novel insight into the CNS fungal susceptibility of CARD9-deficient humans.

  18. Software quality assurance

    CERN Document Server

    Laporte, Claude Y

    2018-01-01

    This book introduces Software Quality Assurance (SQA) and provides an overview of standards used to implement SQA. It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace. * Includes supplementary website with an instructor's guide and solutions * Applies IEEE software standards as well as the Capability Maturity Model Integration for Development (CMMI) * Illustrates the application of software quality assurance practices through the use of practical examples, quotes from experts, and tips from the authors

  19. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  20. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  1. PC based manual and safety logic card test setup for 235 MWe PHWRs

    International Nuclear Information System (INIS)

    Chandgadkar, G.M.; Kohli, A.K.; Agarwal, R.G.; Chandra, Rajesh

    1992-01-01

    Fuel handling controls for 235 MWe PHWR make use of Manual and Logic cards (MLCs) for providing safety interlocks. These cards consist of various type of logic blocks. By connecting these logic blocks all the safety interlocks required for fuel handling controls have been provided. Previously trouble shooting of these cards was done by means of logic probe. Since the method was manual, it was laborious and time consuming. PC based test setup has overcome this drawback and detects the fault at the component level within few seconds. It also gives printout of status of faulty MLC cards. Here motherboard has been designed having slots for insertion of MLC cards. The input/output connection of these cards are coming to two 50 pin FRC connectors. PC communicates through 144 line digital input/output card with MLC card under test. Software is user friendly and outputs suitable input patterns to the card under test and checks for output pattern. It compares this output pattern with compare pattern and detects the fault and displays the symptoms. This system is currently in use at test facility for fuelling machine for 235 MWe PHWR reactor at Refuelling Technology Division, Hall-7. This test setup has been proposed for use at NAPP and future reactors. (author). 4 figs., 1 annexure

  2. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  3. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  4. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  5. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  6. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  7. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  8. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  10. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  11. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  12. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  13. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  14. Card counting in continuous time

    OpenAIRE

    Andersson, Patrik

    2012-01-01

    We consider the problem of finding an optimal betting strategy for a house-banked casino card game that is played for several coups before reshuffling. The sampling without replacement makes it possible to take advantage of the changes in the expected value as the deck is depleted, making large bets when the game is advantageous. Using such a strategy, which is easy to implement, is known as card counting. We consider the case of a large number of decks, making an approximat...

  15. Play the European card

    International Nuclear Information System (INIS)

    Majewski, O.

    1999-01-01

    Dr. Otto Majewski, Chief Executive Officer of the Bayernwerk AG utility, in his capacity as Chairman of the European Nuclear Council pointed out at ENC 98 in Nice that national energy policies constituted a major danger to the use of nuclear power. At the same time, he indicated ways and means by which to evade that danger. The decisions taken in Sweden and in the Federal Republic of Germany to opt out of the use of nuclear power show that national energy policies can seriously jeopardize the use of nuclear power. Bayernwerk CEO Dr. Majewski urged nuclear power plant operators to counteract these tendencies by playing the European card. Nuclear power anyway was a classical topic of European cooperation which, in the past, had resulted in higher safety standards and in the development of the EPR. It should also be attempted, by working on European institutions, to strengthen the use of nuclear power, even on a national level. He invoked economic arguments against nuclear opponents, especially the preservation of competitiveness by means of lower electricity prices, and arguments of climate protection. (orig.) [de

  16. Anonymity and Software Agents: An Interdiscplinary Challenge

    NARCIS (Netherlands)

    Brazier, F.M.; Oskamp, A.; Prins, J.M.; Schellekens, M.H.M.; Wijngaards, N.J.E.

    2004-01-01

    Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are

  17. Anonymity and Software Agents: An Interdisciplinary Challenge

    NARCIS (Netherlands)

    Oskamp, A.; Brazier, F.M.; Prins, J.E.J.; Schellekens, M.H.M.; Wijngaards, N.J.E.

    2004-01-01

    Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are

  18. Telematics and smart cards in integrated health information system.

    Science.gov (United States)

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole

  19. ECM on graphics cards

    NARCIS (Netherlands)

    Bernstein, D.J.; Chen, T.R.; Cheng, C.M.; Lange, T.; Yang, B.Y.; Joux, A.

    2009-01-01

    This paper reports record-setting performance for the elliptic-curve method of integer factorization: for example, 926.11 curves/second for ECM stage 1 with B 1¿=¿8192 for 280-bit integers on a single PC. The state-of-the-art GMP-ECM software handles 124.71 curves/second for ECM stage 1 with B

  20. Parallel data grabbing card based on PCI bus RS422

    International Nuclear Information System (INIS)

    Zhang Zhenghui; Shen Ji; Wei Dongshan; Chen Ziyu

    2005-01-01

    This article briefly introduces the developments of the parallel data grabbing card based on RS422 and PCI bus. It could be applied for grabbing the 14 bits parallel data in high speed, coming from the devices with RS422 interface. The methods of data acquisition which bases on the PCI protocol, the functions and their usages of the chips employed, the ideas and principles of the hardware and software designing are presented. (authors)

  1. Falling PC Solitaire Cards: An Open-Inquiry Approach

    Science.gov (United States)

    Gonzalez-Espada, Wilson J.

    2012-01-01

    Many of us have played the PC Solitaire game that comes as standard software in many computers. Although I am not a great player, occasionally I win a game or two. The game celebrates my accomplishment by pushing the cards forward, one at a time, falling gracefully in what appears to look like a parabolic path in a drag-free environment. One day,…

  2. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  3. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  4. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  5. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  6. Role of NOD2/CARD15 in coronary heart disease

    Directory of Open Access Journals (Sweden)

    Förster Matti

    2007-11-01

    Full Text Available Abstract Background: Bacterial DNA has been repeatedly detected in atheromatous lesions of coronary heart disease (CHD patients. Phylogenetic signatures in the atheroma lesions that are similar to those of bacterial biofilms on human barrier organs, including the respiratory or gastrointestinal tract, raise the question of a defective barrier function in CHD. NOD2 plays a major role in defense against bacterial invasion. Genetic variation in the CARD15 gene, which encodes NOD2, was previously shown to result in a barrier defect that causes chronic inflammatory disorders (e.g. Crohn disease. In the present study, we investigated the possible involvement of NOD2/CARD15 in the pathology of CHD by i analyzing the local expression of NOD2 in atherectomy versus healthy tissue (n = 5 each using histochemical immunofluorescence and ii by testing the three major functional CARD15 variants (R702W, G908R and 1007fs for association with early-onset CHD in 900 German patients and 632 healthy controls. Results: In atherectomy tissue of CHD patients, NOD2 was detected in inflammatory cells at the luminal sides of the lesions. However, the allele and genotype frequencies of the three major CARD15 polymorphisms did not differ between CHD patients and controls. Conclusion: The NOD2 up-regulation in atheroma lesions indicates an involvement of this protein in the pathology of CHD. Although NOD2 could be important in local immune response mechanisms, none of the analyzed CARD15 variants seem to play a significant role in the etiology of CHD.

  7. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  8. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  10. Reminder: Swiss and French cards

    CERN Multimedia

    2012-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of personnel concerned that they are obliged to: • hold a valid Swiss  Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; • return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken towards the member of personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide. Users and Unpaid Associates must contact the Users Office HR Department Tel.: 729...

  11. Swiss and French cards - Reminder

    CERN Multimedia

    HR Department

    2011-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of the personnel concerned that they are obliged to: hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken with respect to the member of the personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide: https://cern.ch/admin-eguide/cartes/proc_cartes_home.asp Users and Unpaid Associates must ...

  12. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  13. Critical Code: Software Producibility for Defense

    Science.gov (United States)

    2010-01-01

    in fatal x-ray doses being administered to cancer patients. static analysis. The results of tests that fail are manifestations of errors (unit tests...ray doses being administered to cancer patients. static analysis. The results of tests that fail are manifestations of errors (unit tests) or failures...forthcoming. 29 Siobhan O’Mahony, Fernando Cela Diaz, and Evan Mamas , 2005, “IBM and Eclipse (A),” Harvard Business School Case 906007, Cambridge, MA

  14. Implementing the Payment Card Industry (PCI Data Security Standard (DSS

    Directory of Open Access Journals (Sweden)

    John O' Raw

    2011-08-01

    Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.

  15. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  16. Calibration of TOB+ Thermometer's Cards

    CERN Document Server

    Banitt, Daniel

    2014-01-01

    Motivation - Under the new upgrade of the CMS detector the working temperature of the trackers had been reduced to -27 Celsius degrees. Though the thermal sensors themselves (Murata and Fenwal thermistors) are effective at these temperatures, the max1542 PLC (programmable logic controller) cards, interpreting the resistance of the thermal sensors into DC counts usable by the DCS (detector control system), are not designed for these temperatures in which the counts exceed their saturation and therefor had to be replaced. In my project I was in charge of handling the emplacement and calibration of the new PLC cards to the TOB (tracker outer barrel) control system.

  17. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  18. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  19. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  20. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  1. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  2. Palmistry, tarot cards, and psychotherapy.

    Science.gov (United States)

    Pejic, Nicholas G

    2008-01-01

    The author summarizes his experience with palm and Tarot card readers in New Orleans. The history, practice, and psychodynamics of palmistry and Tarot are explored. It's postulated that these practices are forms of archaic psychotherapy, which employ supportive treatment and placebo. These tactics are used to elicit hope for its clients.

  3. Comparing Candidate Hospital Report Cards

    Energy Technology Data Exchange (ETDEWEB)

    Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

    1997-12-31

    We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

  4. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  5. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  6. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  7. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  8. Sustainability Cards: Design for Longevity

    DEFF Research Database (Denmark)

    Hasling, Karen Marie; Ræbild, Ulla

    2017-01-01

    Product longevity is considered widely as a relevant strategic approach, amongst many, within the field of sustainability. Yet, how to design for increased product lifetime may not be so obvious for practitioners. The complexity of the surrounding issues can constitute a barrier for designers...... for designers and other stakeholders in the design process. The paper is based on a developmental project carried out in the Autumn 2017, within a larger research and collaboration project between raw fur manufacturer Kopenhagen Fur and Design School Kolding investigating sustainability perspectives. The paper...... describes the development of a deck of sustainability cards aiming for product longevity and presents the final deck. Furthermore, the paper contributes with insights on how designers may apply design cards in the design process and how this practice can further sustainable considerations and strategies...

  9. Valutazione economica dello studio CARDS

    Directory of Open Access Journals (Sweden)

    Simona de Portu

    2007-10-01

    Full Text Available Introduction: cardiovascular diseases (CVD are the major component of premature mortality, generate disability and are a relevant source of cost. The growing incidence of CVD is associated with lifestyle and other modifiable risk factors. Prevention and preclinical detection of CVD reduce morbidity and mortality. Type 2 diabetes is associated with a substantially increased risk of cardiovascular disease. Objective: the aim of the study was to evaluate the health economic consequence of medical therapy with atorvastatin for primary prevention of major cardiovascular events in patients with type 2 diabetes in Italy. Materials and method: in order to reach our objective we drew clinical information from the CARDS study. This economic evaluation was carried out conducting a cost/effectiveness analysis from the perspective of National Health Service (NHS. The analysis was applied to a time horizon in conformity with the observational period adopted in the CARDS study (3.9 years. An incremental cost/effectiveness ratio (ICER was calculated and is expressed as cost per life years gained (LYG. In order to test the robustness of the results, a one-way sensitivity analysis was performed. Results: the total cost of atorvastatin therapy over 3.9 years amounts to around 1.5 million of euros per 1,000 patients. The total cost of adding atorvastatin to standard care in people treated for primary prevention of major cardiovascular events in type 2 diabetes as those involved in the CARDS study would entail an additional cost of about 1,2 million of euros per 1,000 patients treated per 3.9 years, with an incremental cost/effectiveness ratio (ICER equivalent to 36,566 euros per patient per LYG. Discussion: the current study is the first economic evaluation of CARDS study to the Italian situation. The results of the current study show that hypolipemic therapy with atorvastatin 10 mg in diabetic individuals is to be considered cost effective.

  10. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  11. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  12. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  13. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  14. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  15. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  16. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  17. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  18. Why do card issuers charge proportional fees?

    OpenAIRE

    Oz Shy; Zhu Wang

    2008-01-01

    This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...

  19. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  20. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  1. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  2. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  3. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  4. Standardization of software application development and governance

    OpenAIRE

    Labbe, Peter P.

    2015-01-01

    Approved for public release; distribution is unlimited A number of Defense Department initiatives focus on how to engineer better systems that directly influence software architecture, including Open Architecture, Enterprise Architecture, and Joint Information Enterprise. Additionally, the Department of Defense (DOD) mandates moving applications to consolidated datacenters and cloud computing. When examined from an application development perspective, the DOD lacks a common approach for in...

  5. Toronto Smog Summit Report Card

    International Nuclear Information System (INIS)

    2001-01-01

    This 'report card' provides a summary of actions taken, and progress achieved by the federal government, the provincial government and the City of Toronto, respectively, in response to various previous commitments regarding air quality, sustainable transportation, climate and atmospheric research, investing in green infrastructure (federal government), environmental assessment regulations, transboundary air pollution, improved monitoring and reporting regulations. Ratings also cover efforts in imposing emissions caps on the electric industry, emissions reduction trading system, toll-free public air pollution hotline, regulation of ozone depleting substances (provincial government), public education campaign on smog reduction, energy efficiency initiatives, corporate smog alert response plan, and a number of other environmental issues (City of Toronto)

  6. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  7. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  8. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  9. Software engineering

    CERN Document Server

    Sommerville, Ian

    2010-01-01

    The ninth edition of Software Engineering presents a broad perspective of software engineering, focusing on the processes and techniques fundamental to the creation of reliable, software systems. Increased coverage of agile methods and software reuse, along with coverage of 'traditional' plan-driven software engineering, gives readers the most up-to-date view of the field currently available. Practical case studies, a full set of easy-to-access supplements, and extensive web resources make teaching the course easier than ever.

  10. National Software Reference Library (NSRL)

    Science.gov (United States)

    National Software Reference Library (NSRL) (PC database for purchase)   A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.

  11. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  12. Wire Scanner Motion Control Card

    CERN Document Server

    Forde, S E

    2006-01-01

    Scientists require a certain beam quality produced by the accelerator rings at CERN. The discovery potential of LHC is given by the reachable luminosity at its interaction points. The luminosity is maximized by minimizing the beam size. Therefore an accurate beam size measurement is required for optimizing the luminosity. The wire scanner performs very accurate profile measurements, but as it can not be used at full intensity in the LHC ring, it is used for calibrating other profile monitors. As the current wire scanner system, which is used in the present CERN accelerators, has not been made for the required specification of the LHC, a new design of a wire scanner motion control card is part of the LHC wire scanner project. The main functions of this card are to control the wire scanner motion and to acquire the position of the wire. In case of further upgrades at a later stage, it is required to allow an easy update of the firmware, hence the programmable features of FPGAs will be used for this purpose. The...

  13. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  14. Real Communication through Interview and Conversation Cards

    Science.gov (United States)

    Bonin, Therese M.; Birckbichler, Diane W.

    1975-01-01

    A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)

  15. College Student Performance and Credit Card Usage.

    Science.gov (United States)

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  16. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  17. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  18. Enhancing Students' Learning: Instant Feedback Cards

    Science.gov (United States)

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  19. Overcoming credit card fraud in South Africa

    African Journals Online (AJOL)

    A credit card is a convenient method of payment, but it does carry risks. The enormous ... Identity theft and the exponential ... Unique Security Features of a Credit Card with the Aim of Identifying ..... technology in an attempt to try and curb the.

  20. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  1. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  2. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.

  3. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  4. Prepaid cards: how do they function? how are they regulated?

    OpenAIRE

    Mark Furletti

    2004-01-01

    This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...

  5. Point card compatible automatic vending machine for canned drink; Point card taio kan jido hanbaiki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)

  6. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  7. Design and implementation of a VMEbus system service card

    International Nuclear Information System (INIS)

    Beechy, D.; Mayer, G.

    1989-01-01

    The System Services Card (SSC) is a multi-function VMEbus module designed to provide useful debugging features for code development and system services that are needed in most configuration. The card has the following features: 80 character by 24 line composite video signal (6845 CRT controller), Two serial I/O ports (68661 and 68901), Time of day and date with alarm clock (Dallas Semiconductor DS1286), Slot 1 System Controller (Mizar VME 1000), Four 8 bit timers (68901), System reset watchdog timer, Five front panel 5X7 dot matrix displays, Software readable up/down counter with front panel control, Front panel LED display with test points (32 bits), Front panel DIP switch (8 bits), Front panel push button bit set with interrupts (2 bits), Circuit board DIP switches - software readable (32 bits), General Purpose I/O (8 bits), Front panel system reset button, VMEbus interrupts from on-board devices, Eight channel interrupt generator for inter-processor communications, Audio alarm

  8. SOFTWARE OPEN SOURCE, SOFTWARE GRATIS?

    Directory of Open Access Journals (Sweden)

    Nur Aini Rakhmawati

    2006-01-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 Berlakunya Undang – undang Hak Atas Kekayaan Intelektual (HAKI, memunculkan suatu alternatif baru untuk menggunakan software open source. Penggunaan software open source menyebar seiring dengan isu global pada Information Communication Technology (ICT saat ini. Beberapa organisasi dan perusahaan mulai menjadikan software open source sebagai pertimbangan. Banyak konsep mengenai software open source ini. Mulai dari software yang gratis sampai software tidak berlisensi. Tidak sepenuhnya isu software open source benar, untuk itu perlu dikenalkan konsep software open source mulai dari sejarah, lisensi dan bagaimana cara memilih lisensi, serta pertimbangan dalam memilih software open source yang ada. Kata kunci :Lisensi, Open Source, HAKI

  9. Software Epistemology

    Science.gov (United States)

    2016-03-01

    in-vitro decision to incubate a startup, Lexumo [7], which is developing a commercial Software as a Service ( SaaS ) vulnerability assessment...LTS Label Transition System MUSE Mining and Understanding Software Enclaves RTEMS Real-Time Executive for Multi-processor Systems SaaS Software ...as a Service SSA Static Single Assignment SWE Software Epistemology UD/DU Def-Use/Use-Def Chains (Dataflow Graph)

  10. Insider protection: A report card

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is now focusing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. The authors discuss the general trends in insider protection and the limitations of protection measures currently in use. They also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel

  11. Insider protection: a report card

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is not focussing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. We discuss the general trends in insider protection and the limitations of protection measures currently in use. We also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel

  12. Card - Electronic Money. Comparative Study

    Directory of Open Access Journals (Sweden)

    Mariana Rodica TIRLEA

    2012-11-01

    Full Text Available This type of coin and appeared as a result of the needs for a proper management of the financial resources available in the market, but also to improve the payments system in our country. The card is an alternative to the conventional instruments of payment is a payment instrument with and without cash by means of which the holder disposes of the current account. It is a standardized, secure information and individualized, through which you can perform operations of cash withdrawal, payment for the goods or services purchased, payment obligations by the public administration authorities and funds transfers between accounts, other than those ordered and executed by financial institutions, carried out through the electronic payment instrument.

  13. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The Defense Health Program funds the operations of the Military Departments' medical treatment facilities, the development of DoD medical systems software, and congressionally directed research...

  14. Software reliability

    CERN Document Server

    Bendell, A

    1986-01-01

    Software Reliability reviews some fundamental issues of software reliability as well as the techniques, models, and metrics used to predict the reliability of software. Topics covered include fault avoidance, fault removal, and fault tolerance, along with statistical methods for the objective assessment of predictive accuracy. Development cost models and life-cycle cost models are also discussed. This book is divided into eight sections and begins with a chapter on adaptive modeling used to predict software reliability, followed by a discussion on failure rate in software reliability growth mo

  15. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  16. Computer software.

    Science.gov (United States)

    Rosenthal, L E

    1986-10-01

    Software is the component in a computer system that permits the hardware to perform the various functions that a computer system is capable of doing. The history of software and its development can be traced to the early nineteenth century. All computer systems are designed to utilize the "stored program concept" as first developed by Charles Babbage in the 1850s. The concept was lost until the mid-1940s, when modern computers made their appearance. Today, because of the complex and myriad tasks that a computer system can perform, there has been a differentiation of types of software. There is software designed to perform specific business applications. There is software that controls the overall operation of a computer system. And there is software that is designed to carry out specialized tasks. Regardless of types, software is the most critical component of any computer system. Without it, all one has is a collection of circuits, transistors, and silicone chips.

  17. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  18. SD card projects using the PIC microcontroller

    CERN Document Server

    Ibrahim, Dogan

    2010-01-01

    PIC Microcontrollers are a favorite in industry and with hobbyists. These microcontrollers are versatile, simple, and low cost making them perfect for many different applications. The 8-bit PIC is widely used in consumer electronic goods, office automation, and personal projects. Author, Dogan Ibrahim, author of several PIC books has now written a book using the PIC18 family of microcontrollers to create projects with SD cards. This book is ideal for those practicing engineers, advanced students, and PIC enthusiasts that want to incorporate SD Cards into their devices. SD cards are che

  19. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Jorge Thierer

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la en...

  20. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Thierer, Jorge

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los betabloqueantes vasodilatadores y los inhibidores de la enzim...

  1. 'Smart card' speeds triage, boosts safety.

    Science.gov (United States)

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.

  2. Loyalty Card Promotional Activity in Budget Hotel

    OpenAIRE

    Teng, Fei

    2010-01-01

    Loyalty card is one of the most commonly used promotional activities in business. Thus far, there are some research has been done on luxury hotel, but very few researches are on budget hotel. So, the purpose of the thesis is finding out the Swedish customers’ attitude and behavior towards budget hotel’s loyalty card; getting to know what factors influence Swedish customers’ response towards the loyalty card and budget hotels. In the thesis, the main research problem is “How do Swedish custome...

  3. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  4. Estudo da Mecânica Cardíaca pelo Speckle Tracking

    Directory of Open Access Journals (Sweden)

    Maria Cristina Donadio Abduch

    2014-04-01

    Full Text Available Speckles, ou marcadores naturais do miocárdio, originam se da interferência construtiva e destrutiva do feixe de ultrassom que incide sobre os tecidos, podem fornecer um diagnóstico precoce das alterações miocárdicas e atuar na predição de certos eventos cardíacos. Devido à sua relativa estabilidade temporal, os speckles podem ser rastreados durante o ciclo cardíaco por software dedicados, promovendo a análise da função sistólica e diastólica. São identificados tanto pela escala de cinza da ecocardiografia 2D convencional quanto pela ecocardiografia 3D, sendo independentes do ângulo de incidência do ultrassom, permitindo assim a avaliação da mecânica cardíaca nos três planos espaciais: longitudinal, circunferencial e radial. O objetivo do presente artigo é discutir o papel e o significado da deformação cardíaca obtida por meio do speckle tracking durante a avaliação da fisiologia cardíaca, e discutir as aplicações clínicas desta tecnologia ecocardiográfica inovadora.

  5. Development of Data Storage System for Portable Multichannel Analyzer using S D Card

    International Nuclear Information System (INIS)

    Suksompong, Tanate; Ngernvijit, Narippawaj; Sudprasert, Wanwisa

    2009-07-01

    Full text: The development of data storage system for portable multichannel analyzer (MCA) focused on the application of SD card as a storage device instead of the older devices that could not easily extend their capacity. The entire work consisted of two parts: the first part was the study for pulse detection by designing the input pulse detecting circuit. The second part dealed with the accuracy testing of data storage system for portable MCA, consisting of the design of connecting circuit between micro controller and SD card, the transfer of input pulse data into SD card and the ability of data storage system for radiation detection. It was found that the input pulse detecting circuit could detect the input pulse with the maximum voltage, then the signal was transferred to micro controller for data processing. The micro controller could connect to SD card via SPI MODE. The portable MCA could perfectly verify the input signal ranging from 0.2 to 5.0 volts. The SD card could store the data as . xls file which could easily be accessed by the compatible software such as Microsoft Excel

  6. 12 CFR 226.12 - Special credit card provisions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  7. Fingerprint match-on-card: review and outlook

    CSIR Research Space (South Africa)

    Shabalala, MB

    2015-03-01

    Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...

  8. 75 FR 81721 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2010-12-28

    ... cards not marketed or labeled as a gift card or certificate. EFTA Section 920 provides, however, that... cardholder initiates a purchase by providing his or her card or card information to a merchant. In the case... purchases at retailers in the early 1980s. It was not until the mid-1990s, however, that PIN debit became a...

  9. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  10. Notification: Purchase Card and Convenience Check Audit

    Science.gov (United States)

    Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.

  11. Prefrontal system dysfunction and credit card debt.

    Science.gov (United States)

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.

  12. College Student Credit Card Usage and Debt.

    Science.gov (United States)

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  13. 25 CFR 249.3 - Identification cards.

    Science.gov (United States)

    2010-04-01

    ... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...

  14. FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue are available here.   Human Resources Division Tel. 74469

  15. EuCARD final project report

    CERN Document Server

    Koutchouk, J P

    2014-01-01

    After four years of activity, EuCARD has most of its objectives fulfilled, with some new objectives added and a few others on excellent tracks while requiring additional time. The management has been active in reinforcing the collaborative links between partners and projects, contributing to the preparation of FP7-EuCARD2, initiating FP7-HiLumi-LHC Design Study, to favour sustained collaborations beyond EuCARD. An out-of-contract network has been successfully launched on laser plasma acceleration, to combine forces between accelerator, laser and plasma communities. Communication and dissemination activities have led to two highlights: Accelerating News, an accelerator R&D newsletter initiated by EuCARD and now common to all FP7 accelerator projects (over 1000 subscribers) and a series of monographs on accelerator sciences that is progressively finding its public. The scientific networks have more than fulfilled their initial objectives: roadmaps are defined for neutrino facilities, submitted to the Europe...

  16. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  17. Pc Card Sony Ericsson: Semiotik Dan Iklan

    OpenAIRE

    Mutmainnah, Yulia

    2014-01-01

    Through advertisement, producers send messages for their product strength to consumers. Those messages are conveyed through various kinds of signs either in the form of language, picture, caption, icon, index, or symbol. There is communicative exchange on GC79 PC Card Sony Ericsson advertisement between sender and receiver. Sender (advertisement maker) of this advertisement makes good use of reward polluter style, which is, persuading comsumers to use PC Card Sony Ericsson product.

  18. Prototype ALICE front-end card

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    This circuit board is a prototype 48-channel front end digitizer card for the ALICE time projection chamber (TPC), which takes electrical signals from the wire sensors in the TPC and shapes the data before converting the analogue signal to digital data. A total of 4356 cards will be required to process the data from the ALICE TPC, the largest of this type of detector in the world.

  19. Correlates of credit card ownership in men and women.

    Science.gov (United States)

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  20. The Regulation of the Credit Card Market in Turkey

    OpenAIRE

    Ahmet Faruk Aysan; L. Yildiz

    2006-01-01

    The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...

  1. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  2. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  3. An overview of smart card technology and markets

    OpenAIRE

    Mark Furletti

    2002-01-01

    As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...

  4. Benefits of Using Vocabulary Flash Cards in an EFL Classroom

    OpenAIRE

    Jonathan, Aliponga; Christopher C, Johnston

    2013-01-01

    This paper was written to research and advocate the use of English word cards withregard to vocabulary acquisition and English productive and receptive competency. Also,student perceptions of using and making word cards will be examined to show theimportance of including a word card policy in an EFL classroom. Despite all the positiveresearch done on word cards, it is surprising how many Japanese EFL students do notutilize word cards in their English studies. For this research, 108 students f...

  5. Software Innovation

    DEFF Research Database (Denmark)

    Rose, Jeremy

      Innovation is the forgotten key to modern systems development - the element that defines the enterprising engineer, the thriving software firm and the cutting edge software application.  Traditional forms of technical education pay little attention to creativity - often encouraging overly...

  6. Software engineering

    CERN Document Server

    Sommerville, Ian

    2016-01-01

    For courses in computer science and software engineering The Fundamental Practice of Software Engineering Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world's major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner. The Tenth Edition contains new information that highlights various technological updates of recent years, providing readers with highly relevant and current information. Sommerville's experience in system dependability and systems engineering guides the text through a traditional plan-based approach that incorporates some novel agile methods. The text strives to teach the innovators of tomorrow how to create software that will make our world a better, safer, and more advanced place to live.

  7. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  8. DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    FRANCISCA NONYELUM OGWUELEKA

    2011-06-01

    Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.

  9. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  10. 48 CFR 212.7003 - Technical data and computer software.

    Science.gov (United States)

    2010-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  11. Software requirements

    CERN Document Server

    Wiegers, Karl E

    2003-01-01

    Without formal, verifiable software requirements-and an effective system for managing them-the programs that developers think they've agreed to build often will not be the same products their customers are expecting. In SOFTWARE REQUIREMENTS, Second Edition, requirements engineering authority Karl Wiegers amplifies the best practices presented in his original award-winning text?now a mainstay for anyone participating in the software development process. In this book, you'll discover effective techniques for managing the requirements engineering process all the way through the development cy

  12. Problem and solution of tally segment card in MCNP code

    International Nuclear Information System (INIS)

    Xie Jiachun; Zhao Shouzhi; Sun Zheng; Jia Baoshan

    2010-01-01

    Wrong results may be given when FS card (tally segment card) was used for tally with other tally cards in Monte Carlo code MCNP. According to the comparison of segment tally results which were obtained by FS card of three different models of the same geometry, the tally results of fuel regions were found to be wrong in fill pattern. The reason is that the fuel cells were described by Universe card and FILL card, and the filled cells were always considered at Universe card definition place. A proposed solution was that the segment tally for filled cells was done at Universe card definition place. Radial flux distribution of one example was calculated in this way. The results show that the fault of segment tally with FS card in fill pattern could be solved by this method. (authors)

  13. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  14. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  15. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  17. LabVIEW Interface for PCI-SpaceWire Interface Card

    Science.gov (United States)

    Lux, James; Loya, Frank; Bachmann, Alex

    2005-01-01

    This software provides a LabView interface to the NT drivers for the PCISpaceWire card, which is a peripheral component interface (PCI) bus interface that conforms to the IEEE-1355/ SpaceWire standard. As SpaceWire grows in popularity, the ability to use SpaceWire links within LabVIEW will be important to electronic ground support equipment vendors. In addition, there is a need for a high-level LabVIEW interface to the low-level device- driver software supplied with the card. The LabVIEW virtual instrument (VI) provides graphical interfaces to support all (1) SpaceWire link functions, including message handling and routing; (2) monitoring as a passive tap using specialized hardware; and (3) low-level access to satellite mission-control subsystem functions. The software is supplied in a zip file that contains LabVIEW VI files, which provide various functions of the PCI-SpaceWire card, as well as higher-link-level functions. The VIs are suitably named according to the matching function names in the driver manual. A number of test programs also are provided to exercise various functions.

  18. Software Assurance Best Practices for Air Force Weapon and Information Technology Systems - Are We Bleeding

    National Research Council Canada - National Science Library

    Maxon, Ryan A

    2008-01-01

    .... Most organizations focus their resources on reactive defenses such as firewalls, antivirus software, and encryption, however as demonstrated by the numerous attacks that are successful, those post...

  19. Patient health record on a smart card.

    Science.gov (United States)

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  20. Software Reviews.

    Science.gov (United States)

    Dwyer, Donna; And Others

    1989-01-01

    Reviewed are seven software packages for Apple and IBM computers. Included are: "Toxicology"; "Science Corner: Space Probe"; "Alcohol and Pregnancy"; "Science Tool Kit Plus"; Computer Investigations: Plant Growth"; "Climatrolls"; and "Animal Watch: Whales." (CW)

  1. Software Reviews.

    Science.gov (United States)

    Davis, Shelly J., Ed.; Knaupp, Jon, Ed.

    1984-01-01

    Reviewed is computer software on: (1) classification of living things, a tutorial program for grades 5-10; and (2) polynomial practice using tiles, a drill-and-practice program for algebra students. (MNS)

  2. The effect of Health smart cards for Quality Health care services ( doctor martyr Beheshti medical research center in Qom

    Directory of Open Access Journals (Sweden)

    Saeed zarandi

    2016-03-01

    Full Text Available The main objective of this study was to investigate the effect of the use health smart card on the aspects quality of healthcare services in doctor martyr beheshti medical research center in qom . With regard to the measures taken in the context of the establishment of this card in Qom and the lack of previous experience in this province, one of the concerns of the authorities to investigate the performance and capabilities of the card and its effects on the quality of health services is affecting the present study is to respond to this concerns. This research method is descriptive and applied to the target population of physicians, nurses and medical record experts employed at the Medical Center have formed a martyr Beheshti Qom due to more awareness cognitive advantages associated with its use of smart cards have given. The population is equal to the number of 444 and 124 questionnaire for data analysis is used. The sampling method used in this research was stratified random sampling conducted in the respective classes. Spss software for data analysis & exploratory factor analysis & confirmed, Kolmogorov-Smirnov Test, Wilcoxon Test & matrix of factors were used. The analysis results showed that Health Smart Cards for quality of health care services positive and significant effects on Dimension quality of the reliability & Tangibles . Analysis of demographic variables that influence opinions about the quality of health care Health Smart Cards significantly related to gender and education level, and also no experience discussed the variables significantly associated with age.

  3. Z80 based voltage and temperature monitor for the Main Ring control crate: the CC48 card

    International Nuclear Information System (INIS)

    Seino, K.

    1982-06-01

    Several years ago, there seemed to be a need to monitor the power supply voltages and temperatures in the three bay racks of the Main Ring service buildings. A few years ago, another engineer seemed to have done a preliminary design using analog voltage comparators. In late 1979, it was proposed to use a microprocessor instead of analog voltage comparators. It was dramatic that all the people at a meeting were excited about the idea and unanimously approved the project. The author can remember some of the reasons why they were so enthusiastic about the idea at the time, i.e., (1) it was new to have microprocessor based cards on the Main Ring control system, (2) programmable alarm limits were preferred to resistor dividers or potentiometers with analog voltage comparators, (3) it was the first to try the communication between a host computer and distributed intelligent cards. The author started the design on the CC48 in January, 1980 and completed in April, 1980. We had the prototype card working in July, 1980 and tested the card on the system in September, 1980. Seven CC48s of the pilot production were installed in July, 1981. We mass-produced 35 more cards and finished installing them around the Main Ring in May, 1982. The author talks about the hardware, software and operation on the CC48 card, and he will make some remarks on his experience on the project

  4. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  6. Neural fraud detection in credit card operations.

    Science.gov (United States)

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.

  7. Data card system for filmless radiography

    International Nuclear Information System (INIS)

    Siedband, M.P.

    1987-01-01

    Data cards using the sample principles as music compact discs can store 4 MB of digital data. This is sufficient for 4 uncompressed radiographic images or 16 images with 4:1 average compression. Radiograph memory screens (stimulable phosphors) can be scanned at 1023 lines to provide the input signals. A filmless radiographic x-ray system is described which uses digital data cards of the size of common credit cards. These can be used in the same way as films are now used: placed in patient folders, copied, mailed, seen on view boxes, etc. The techniques of data acquisition, processing, compression, storage and display are described. The advantages of the system are explained in terms of economies, elimination of film (chemicals and processing), and compatibility with other data transmission methods. Suggestions are made for standardization of data storage and control so that this method may be used for other medical imaging applications, such as CT and ultrasound

  8. CRC-cards for Product Modelling

    DEFF Research Database (Denmark)

    Hvam, Lars; Riis, Jesper; Hansen, Benjamin Loer

    2003-01-01

    , transportation, service and decommissioning. A main challenge when building product models is to collect and document the product related data, information and knowledge in a structured way. CRC cards are index cards (or computerized versions of these) which are used to record proposed classes, the behavior......This paper describes the CRC (class, responsibility, collaboration) modelling process for building product models. A product model is normally represented in an IT system which contains data, information and knowledge on industrial products and their life cycle properties e.g. manufacturing...... of the classes, their responsibilities, and their relationship to other classes (collaboration). CRC modelling gives an effective, low-tech method for domain-experts, programmers and users to work closely together to identify, structure, understand and document a product model. CRC cards were originally...

  9. Authoring of digital games via card games

    DEFF Research Database (Denmark)

    Valente, Andrea; Marchetti, Emanuela

    2014-01-01

    Literature and previous studies show that creative play is easy to emerge when children interact with tangible, low-tech toys and games than with digital games. This paradoxical situation is linked to the long-standing problem of end-users (or players) authoring of digital contents and systems. We...... are to show how card games can represent digital games, how playful play can emerge in card games and digital games, and to begin defining a new way to express game behavior without the use of universal programming languages....... propose a new scenario in which trading card games help making sense and re-design computer games, to support players express themselves aesthetically and in a highly creative way. Our aim is to look for a middle ground between players becoming programmers and simply editing levels. The main contributions...

  10. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    Science.gov (United States)

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  11. UTILIZAÇÃO DE JAVA CARD COMO PLATAFORMA PARA O DESENVOLVIMENTO DE APLICAÇÕES EM SMART CARD.

    Directory of Open Access Journals (Sweden)

    Lucas Plis Dolce

    2011-12-01

    Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.

  12. FBCT fast intensity measurement using TRIC cards

    CERN Document Server

    Allica, J C; Belohrad, D; Jensen, L; Lenardon, F; SØby, L

    2015-01-01

    At the CERN PS complex, precise fast intensity measurements are very important in order to optimize the transfer efficiencies between the different accelerators. Over the last two years a complete renovation has been ongoing, where the old electronics, based on analogue integrators, have been replaced by a fully digital system enclosed in a single VME based card. This new system called TRIC (Transformer Integration Card) is based on a 12 bit, 212 MS/s ADC and an FPGA for the signal processing. Also located on the same board one finds a 250 V/1.5 W DCDC converter used to generate precise calibration pulses.

  13. Card controlled beta backscatter thickness measuring instrument

    International Nuclear Information System (INIS)

    Schlesinger, J.

    1978-01-01

    An improved beta backscatter instrument for the nondestructive measurement of the thickness of thin coatings on a substrate is described. Included therein is the utilization of a bank of memory stored data representative of isotope, substrate, coating material and thickness range characteristics in association with a control card having predetermined indicia thereon selectively representative of a particular isotope, substrate material, coating material and thickness range for conditioning electronic circuit means by memory stored data selected in accord with the predetermined indicia on a control card for converting backscattered beta particle counts into indicia of coating thickness

  14. Software reengineering

    Science.gov (United States)

    Fridge, Ernest M., III

    1991-01-01

    Today's software systems generally use obsolete technology, are not integrated properly with other software systems, and are difficult and costly to maintain. The discipline of reverse engineering is becoming prominent as organizations try to move their systems up to more modern and maintainable technology in a cost effective manner. JSC created a significant set of tools to develop and maintain FORTRAN and C code during development of the Space Shuttle. This tool set forms the basis for an integrated environment to re-engineer existing code into modern software engineering structures which are then easier and less costly to maintain and which allow a fairly straightforward translation into other target languages. The environment will support these structures and practices even in areas where the language definition and compilers do not enforce good software engineering. The knowledge and data captured using the reverse engineering tools is passed to standard forward engineering tools to redesign or perform major upgrades to software systems in a much more cost effective manner than using older technologies. A beta vision of the environment was released in Mar. 1991. The commercial potential for such re-engineering tools is very great. CASE TRENDS magazine reported it to be the primary concern of over four hundred of the top MIS executives.

  15. Hardware and software for image acquisition in nuclear medicine

    International Nuclear Information System (INIS)

    Fideles, E.L.; Vilar, G.; Silva, H.S.

    1992-01-01

    A system for image acquisition and processing in nuclear medicine is presented, including the hardware and software referring to acquisition. The hardware is consisted of an analog-digital conversion card, developed in wire-wape. Its function is digitate the analogic signs provided by gamma camera. The acquisitions are made in list or frame mode. (C.G.C.)

  16. Quick Prototyping of Educational Software: An Object-Oriented Approach.

    Science.gov (United States)

    Wong, Simon C-H

    1994-01-01

    Introduces and demonstrates a quick-prototyping model for educational software development that can be used by teachers developing their own courseware using an object-oriented programming system. Development of a courseware package called "The Match-Maker" is explained as an example that uses HyperCard for quick prototyping. (Contains…

  17. NASA Software Engineering Benchmarking Study

    Science.gov (United States)

    Rarick, Heather L.; Godfrey, Sara H.; Kelly, John C.; Crumbley, Robert T.; Wifl, Joel M.

    2013-01-01

    To identify best practices for the improvement of software engineering on projects, NASA's Offices of Chief Engineer (OCE) and Safety and Mission Assurance (OSMA) formed a team led by Heather Rarick and Sally Godfrey to conduct this benchmarking study. The primary goals of the study are to identify best practices that: Improve the management and technical development of software intensive systems; Have a track record of successful deployment by aerospace industries, universities [including research and development (R&D) laboratories], and defense services, as well as NASA's own component Centers; and Identify candidate solutions for NASA's software issues. Beginning in the late fall of 2010, focus topics were chosen and interview questions were developed, based on the NASA top software challenges. Between February 2011 and November 2011, the Benchmark Team interviewed a total of 18 organizations, consisting of five NASA Centers, five industry organizations, four defense services organizations, and four university or university R and D laboratory organizations. A software assurance representative also participated in each of the interviews to focus on assurance and software safety best practices. Interviewees provided a wealth of information on each topic area that included: software policy, software acquisition, software assurance, testing, training, maintaining rigor in small projects, metrics, and use of the Capability Maturity Model Integration (CMMI) framework, as well as a number of special topics that came up in the discussions. NASA's software engineering practices compared favorably with the external organizations in most benchmark areas, but in every topic, there were ways in which NASA could improve its practices. Compared to defense services organizations and some of the industry organizations, one of NASA's notable weaknesses involved communication with contractors regarding its policies and requirements for acquired software. One of NASA's strengths

  18. RENEWAL OF CRIMINAL LAW AGAINST ABUSE OF CREDIT CARDS

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-07-01

    Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people.   On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia.   A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.

  19. Barber's Point, Oahu, Hawaii Drift Card Study 2002-2004

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Drift cards were be released from Barber's Point, Oahu, approximately once a month during the two year span to get an idea of the distribution of card drift under...

  20. Increasing Opportunities for Student Responding: Response Cards in the Classroom

    Science.gov (United States)

    Helf, Shawnna

    2015-01-01

    Response cards are designed to encourage active student engagement during instruction. In this article, the use of response cards is described, along with ways teachers can use the information to inform their work and considerations for implementation.

  1. Credit and Debit Card Usage and Cash Flow Management Control ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Simiyu, Justo Simiyu - Department of Business Management, Chuka. University College ... Key words: Debit cards, credit cards, commercial banks, Kenya. Introduction ..... saving at once convenience without proper planning.

  2. Puppet Visual Adaptation on Playing Cards as Educational Media

    Directory of Open Access Journals (Sweden)

    Joko Wiyoso

    2017-02-01

    Full Text Available This study aims at presenting an effective media in a form of puppet picture playing cards as a means to introduce traditional puppet to the society. Research and Development (R&D was chosen as the method to develop the playing cards. Results were presented in a form of the design of puppet picture playing cards as many as 54 cards as well as 54 puppet characters as the background pictures. The design of the playing cards is adjusted to the common playing cards which are distributed widely in the society, including both the sizes and symbols, like the pictures of spade, heart, diamond, and club. In detail, the design comprises: (1 the size of playing cards which is 6 cm width of the upper and lower sides and 9 cm length for the left and right sides. (2 The playing cards’ background is in a bright color so does the puppet picture on the card can be seen clearly.

  3. Software Authentication

    International Nuclear Information System (INIS)

    Wolford, J.K.; Geelhood, B.D.; Hamilton, V.A.; Ingraham, J.; MacArthur, D.W.; Mitchell, D.J.; Mullens, J.A.; Vanier, P. E.; White, G.K.; Whiteson, R.

    2001-01-01

    The effort to define guidance for authentication of software for arms control and nuclear material transparency measurements draws on a variety of disciplines and has involved synthesizing established criteria and practices with newer methods. Challenges include the need to protect classified information that the software manipulates as well as deal with the rapid pace of innovation in the technology of nuclear material monitoring. The resulting guidance will shape the design of future systems and inform the process of authentication of instruments now being developed. This paper explores the technical issues underlying the guidance and presents its major tenets

  4. Software engineering

    CERN Document Server

    Thorin, Marc

    1985-01-01

    Software Engineering describes the conceptual bases as well as the main methods and rules on computer programming. This book presents software engineering as a coherent and logically built synthesis and makes it possible to properly carry out an application of small or medium difficulty that can later be developed and adapted to more complex cases. This text is comprised of six chapters and begins by introducing the reader to the fundamental notions of entities, actions, and programming. The next two chapters elaborate on the concepts of information and consistency domains and show that a proc

  5. Sample Development on Java Smart-Card Electronic Wallet Application

    OpenAIRE

    Toma Cristian

    2009-01-01

    In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet ...

  6. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  7. Studi Perkembangan Pasar Smart Card Indonesia Pada Sektor Perbankan

    OpenAIRE

    Onny Rafizan

    2017-01-01

    Smart card merupakan salah satu teknologi yang sudah banyak digunakan di Indonesia di berbagai sektor. Dari sisi teknologi, industri dalam negeri sebenarnya sudah mampu memproduksi smart card, sehingga industri ini sangat potensial untuk dikembangkan menuju kemandirian. Penelitian ini dilakukan sebagai bagian dalam USAha pemerintah untuk mendorong perkembangan industri smart card dalam negeri, dengan tujuan memberikan gambaran kondisi pasar smart card di Indonesia saat ini. Pengumpulan data p...

  8. Smart Card sebagai Pengaman Sepeda Motor Berbasis Mikrokontroler

    OpenAIRE

    Yohanes Chrisostomus Purba; Antonius Wibowo

    2010-01-01

    Pengaman sepeda motor yang berbentuk smart card terdiri dari bagian yang memuat chip EEPROM dan bagian pengaman smart card. Pembacaan smart card didesain dan ditempatkan pada sepeda motor. Untuk pembacaan data chip SLE 4442, dan pembacaan data pengaman smart card digunakan mikrokontroler AT89S51. Untuk pengaturan aktif maupun tidak aktifnya CDI, dan starter juga digunakan mikrokontroler AT89S51. Sistem pengaman sepeda motor akan menjadi aktif bila sepeda motor dalam keadaan mati. Smart car...

  9. 75 FR 55392 - Employment Network Report Card

    Science.gov (United States)

    2010-09-10

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0046] Employment Network Report Card AGENCY: Social Security Administration (SSA). ACTION: Notice of Webinar and National Teleconference Call listening sessions--announcing two opportunities for SSA to hear public comments on Employment Network...

  10. Looking at Debit and Credit Card Fraud

    Science.gov (United States)

    Porkess, Roger; Mason, Stephen

    2012-01-01

    This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

  11. Artist Trading Cards: Connecting with Other Communities

    Science.gov (United States)

    Bovio, Deborah

    2011-01-01

    Creating and exchanging Artist Trading Cards (ATCs) has been a rapidly growing trend. These miniature works of art are fun to make--and even more fun to share. The intrigue of developing these handmade treasures begins with the intent of creating art simply for the love of art. In this article, the author describes how her students made their…

  12. Melting Metal on a Playing Card

    Science.gov (United States)

    Greenslade, Thomas B., Jr.

    2016-01-01

    Many of us are familiar with the demonstration of boiling water in a paper cup held over a candle or a Bunsen burner; the ignition temperature of paper is above the temperature of 100°C at which water boils under standard conditions. A more dramatic demonstration is melting tin held in a playing card. This illustration is from Tissandier's book on…

  13. Integration through a Card-Sort Activity

    Science.gov (United States)

    Green, Kris; Ricca, Bernard P.

    2015-01-01

    Learning to compute integrals via the various techniques of integration (e.g., integration by parts, partial fractions, etc.) is difficult for many students. Here, we look at how students in a college level Calculus II course develop the ability to categorize integrals and the difficulties they encounter using a card sort-resort activity. Analysis…

  14. Tumores cardíacos primarios

    Directory of Open Access Journals (Sweden)

    Rosa Eugenia Díaz Garriga

    2013-10-01

    Full Text Available Introducción: los tumores cardíacos primarios son aquellos que se originan en Miocardio o Pericardio. El 90% son benignos, no son invasivos, pero debido a su localización pueden provocar alteraciones hemodinámicas graves y arrítmias. Presentación del caso: dos casos portadores de tumores cardíacos diagnosticados en la etapa prenatal, una gestante de 32 años, portadora de una Neurofribromatosis que en la ecocardiografía fetal de su hijo, se identifican dos tipos de tumores cardíacos, un mixoma auricular y un fibroma, y un niño que desde la etapa prenatal se diagnosticó un rabdomioma, lo cual se confirmó al nacimiento y que regresó espontáneamente. Conclusiones: a ecocardiografía fetal permite cada vez con más frecuencia, el diagnóstico intraútero de tumores cardíacos. Los rabdomiomas regresan en más del 50% de los casos, pero pueden ser un marcador de Esclerosis Tuberosa. Los tumores cardiacos se asocian a otras afecciones congénitas y requieren de tratamiento quirúrgico. Aspectos todos a tener en consideración para realizar el asesoramiento genético a la familia.

  15. Optical security features for plastic card documents

    Science.gov (United States)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  16. Insuficiencia cardíaca y diabetes

    Directory of Open Access Journals (Sweden)

    Jorge Thierer

    2006-01-01

    Full Text Available La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la enzima convertidora ejercen una influencia favorable, en tanto que el uso de glitazonas todavía es controversial. La insuficiencia cardíaca puede a su vez generar diabetes, debido a la activación del sistema nervioso simpático y al efecto del tratamiento. La comprensión adecuada de estos hechos es fundamental para tomar decisiones correctas y mejorar la suerte de los pacientes.

  17. INTERFACE ELECTRONIC MEDICAL CARD ON MOBILE DEVICE

    Directory of Open Access Journals (Sweden)

    Y. L. Nechyporenko

    2013-05-01

    Full Text Available The concept designed by electronic medical card for heterogeneous environment of medical information systems at various levels. Appropriate model and technical solution. Done evaluating operating systems for mobile devices. Designed and produced by the project mobile application on Android OS as an electronic medical record on a Tablet PC Acer.

  18. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  19. FT 3 Flight Test Cards for Export

    Science.gov (United States)

    Marston, Michael L.

    2015-01-01

    These flight test cards will be made available to stakeholders who participated in FT3. NASA entered into the relationship with our stakeholders, including the FAA, to develop requirements that will lead to routine flights of unmanned aircraft systems flying in the national airspace system.

  20. "It's in the Cards": The Contribution of Illustrated Metaphor Cards to Exploring Values Within Narratives.

    Science.gov (United States)

    Karnieli-Miller, Orit; Nissim, Geffen; Goldberg, Miriam

    2017-01-01

    In this article, we present the use of illustrated metaphorical cards as a technique to enrich the qualitative narrative interview. We examine the advantages of incorporating a projective tool to assist in constructing and understanding personal narratives of people living with severe mental illness. We interviewed 25 participants-staff and members of a clubhouse in Israel (an international community model of rehabilitation in mental health)-and sought to understand their stories focused on personal and organizational values. The findings revealed that, in most cases, the cards contributed to data collection by enhancing the interviewees' ability for expression and by facilitating richer, more comprehensive stories and descriptions. This in turn enhanced the researcher's ability to understand the messages and stories presented. The research conclusions discuss the cards' potential contribution to improving data collection and analysis. The cards became an additional channel for expressing participants' experiences, emotions, and unique voice. © The Author(s) 2015.

  1. 8 CFR 1212.6 - Border crossing identification cards.

    Science.gov (United States)

    2010-01-01

    ... combined B-1/B-2 visitor visa and non-biometric border crossing identification card or (a similar stamp in... non-biometric border crossing identification card (or similar stamp in a passport), issued by the DOS... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Border crossing identification cards. 1212...

  2. 25 CFR 11.422 - Unauthorized use of credit cards.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  3. 77 FR 37558 - Disclosure of Certain Credit Card Complaint Data

    Science.gov (United States)

    2012-06-22

    ... Certain Credit Card Complaint Data AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of... Bureau plans to exercise its discretion to publicly disclose certain credit card complaint data that do not include personally identifiable information. The Bureau receives credit card complaints from...

  4. 77 FR 75410 - Request for Information Regarding Credit Card Market

    Science.gov (United States)

    2012-12-20

    ... Regarding Credit Card Market AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice and request for information. SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and Disclosure Act of... review (Review) of the consumer credit card market, within the limits of its existing resources available...

  5. Credit Card Attitudes and Behaviors of College Students

    Science.gov (United States)

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  6. Clinicians completion rate of radiology request card in a Nigerian ...

    African Journals Online (AJOL)

    The importance of adequately completing the radiology request card by the clinicians, in management of patient cannot be overemphasized. Omission of information on the request card may lead to reporting error. This study investigated the compliance rate of filling the radiology request card by clinicians received in a ...

  7. 46 CFR 154.1814 - Cargo information cards.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo information cards. 154.1814 Section 154.1814... cards. (a) No person may operate a vessel unless a cargo information card for each cargo being... accessible to the person in charge of the watch. (b) When a vessel is moored at a terminal, the master shall...

  8. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  9. 76 FR 43393 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2011-07-20

    ... programs and certain reloadable, general-use prepaid cards not marketed or labeled as a gift card or gift... evolved to support payments made by consumers for the purchase of goods or services at merchants... of the purchase transaction. Debit cards are generally issued by depository institutions to their...

  10. 76 FR 3180 - Market Test of Gift Cards

    Science.gov (United States)

    2011-01-19

    ... are very similar to money orders. Id. at 7. The Postal Service asserts that gift cards purchased from... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 647] Market Test of Gift Cards AGENCY... Service proposal to conduct a 2-year market test involving the sale of gift cards. This document describes...

  11. On Cyclic Plans for Scheduling a Smart Card Personalisation System

    NARCIS (Netherlands)

    Nieberg, T.

    An industrial case study for scheduling the personalisation of smart cards is presented and analysed. Smart cards are personalised in several machines that are served by an underlying conveyor belt connecting these. As there are usually a very high number of smart cards to be personalised, the focus

  12. 78 FR 39020 - Market Test on Gift Cards

    Science.gov (United States)

    2013-06-28

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 1755] Market Test on Gift Cards... Service filing requesting a temporary extension of a market test on gift cards. This notice informs the... INFORMATION: On June 18, 2013, the United States Postal Service moved to temporarily extend its Gift Card...

  13. Reviews, Software.

    Science.gov (United States)

    Science Teacher, 1988

    1988-01-01

    Reviews two computer software packages for use in physical science, physics, and chemistry classes. Includes "Physics of Model Rocketry" for Apple II, and "Black Box" for Apple II and IBM compatible computers. "Black Box" is designed to help students understand the concept of indirect evidence. (CW)

  14. Software Reviews.

    Science.gov (United States)

    Kinnaman, Daniel E.; And Others

    1988-01-01

    Reviews four educational software packages for Apple, IBM, and Tandy computers. Includes "How the West was One + Three x Four,""Mavis Beacon Teaches Typing,""Math and Me," and "Write On." Reviews list hardware requirements, emphasis, levels, publisher, purchase agreements, and price. Discusses the strengths…

  15. Software Review.

    Science.gov (United States)

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed is a computer software package entitled "Audubon Wildlife Adventures: Grizzly Bears" for Apple II and IBM microcomputers. Included are availability, hardware requirements, cost, and a description of the program. The murder-mystery flavor of the program is stressed in this program that focuses on illegal hunting and game…

  16. Software Reviews.

    Science.gov (United States)

    Teles, Elizabeth, Ed.; And Others

    1990-01-01

    Reviewed are two computer software packages for Macintosh microcomputers including "Phase Portraits," an exploratory graphics tool for studying first-order planar systems; and "MacMath," a set of programs for exploring differential equations, linear algebra, and other mathematical topics. Features, ease of use, cost, availability, and hardware…

  17. MIAWARE Software

    DEFF Research Database (Denmark)

    Wilkowski, Bartlomiej; Pereira, Oscar N. M.; Dias, Paulo

    2008-01-01

    is automatically generated. Furthermore, MIAWARE software is accompanied with an intelligent search engine for medical reports, based on the relations between parts of the lungs. A logical structure of the lungs is introduced to the search algorithm through the specially developed ontology. As a result...

  18. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  19. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  20. Clearing and settlement of interbank card transactions: a MasterCard tutorial for Federal Reserve payments analysts

    OpenAIRE

    Susan Herbst-Murphy

    2013-01-01

    The Payment Cards Center organized a meeting at which senior officials from MasterCard shared information with Federal Reserve System payments analysts about the clearing and settlement functions that MasterCard performs for its client banks. These functions involve the transfer of information pertaining to card-based transactions (clearing) and the exchange of monetary value (settlement) that takes place between the banks whose customers are cardholders and those banks whose customers are ca...

  1. Digitizing Villanova University's Eclipsing Binary Card Catalogue

    Science.gov (United States)

    Guzman, Giannina; Dalton, Briana; Conroy, Kyle; Prsa, Andrej

    2018-01-01

    Villanova University’s Department of Astrophysics and Planetary Science has years of hand-written archival data on Eclipsing Binaries at its disposal. This card catalog began at Princeton in the 1930’s with notable contributions from scientists such as Henry Norris Russel. During World War II, the archive was moved to the University of Pennsylvania, which was one of the world centers for Eclipsing Binary research, consequently, the contributions to the catalog during this time were immense. It was then moved to University of Florida at Gainesville before being accepted by Villanova in the 1990’s. The catalog has been kept in storage since then. The objective of this project is to digitize this archive and create a fully functional online catalog that contains the information available on the cards, along with the scan of the actual cards. Our group has built a database using a python-powered infrastructure to contain the collected data. The team also built a prototype web-based searchable interface as a front-end to the catalog. Following the data-entry process, information like the Right Ascension and Declination will be run against SIMBAD and any differences between values will be noted as part of the catalog. Information published online from the card catalog and even discrepancies in information for a star, could be a catalyst for new studies on these Eclipsing Binaries. Once completed, the database-driven interface will be made available to astronomers worldwide. The group will also acquire, from the database, a list of referenced articles that have yet to be found online in order to further pursue their digitization. This list will be comprised of references in the cards that were neither found on ADS nor online during the data-entry process. Pursuing the integration of these references to online queries such as ADS will be an ongoing process that will contribute and further facilitate studies on Eclipsing Binaries.

  2. Repository-based software engineering program

    Science.gov (United States)

    Wilson, James

    1992-01-01

    The activities performed during September 1992 in support of Tasks 01 and 02 of the Repository-Based Software Engineering Program are outlined. The recommendations and implementation strategy defined at the September 9-10 meeting of the Reuse Acquisition Action Team (RAAT) are attached along with the viewgraphs and reference information presented at the Institute for Defense Analyses brief on legal and patent issues related to software reuse.

  3. Thermorewritable card by using dyes; Senryo wo mochiita kakikae kanona card

    Energy Technology Data Exchange (ETDEWEB)

    Muto, Y.

    1998-06-01

    Described herein are thermorewritable cards which use dyes. Rewritable cards, mainly used for membership and point cards, are themselves used repeatedly and required to be rewritable repeatedly for information they carry. The dyes and developers used for the conventional heat- and pressure-sensitive papers are colorless, leuco-dye precursors and acidic compounds with a phenolic hydroxyl group or the like. They transfer electrons to each other, opening the lactone ring of the dye precursor to develop the color. Developing and erasing the color are reversible chemical reactions, where the color is developed under heat and maintained by quenching. For erasing the color, it is heated and then slowly cooled to separate the precursor and developer phases from each other. A printer (thermal head) is required for developing and erasing a color. Durability under various conditions is another requirement of the card; it must be adaptable to weather conditions and resistant to sweat. The new thermorewritable card is protected from various adverse effects on its chemical reactions, and made as durable as the conventional cards. 3 refs., 5 figs., 1 tab.

  4. The European Commission's Decision in MasterCard : Issues Facing the Payment Card Industry for the Future

    OpenAIRE

    John Wotton

    2008-01-01

    The Decision in MasterCard displays a fundamental divergence between the Commission’s and MasterCard’s approaches to the analysis of the competitive effects of open payment card schemes.

  5. Investigating the effectiveness of an educational card game for learning how human immunology is regulated.

    Science.gov (United States)

    Su, TzuFen; Cheng, Meng-Tzu; Lin, Shu-Hua

    2014-01-01

    This study was conducted in an attempt to investigate the effectiveness of an educational card game we developed for learning human immunology. Two semesters of evaluation were included to examine the impact of the game on students' understanding and perceptions of the game-based instruction. Ninety-nine senior high school students (11th graders) were recruited for the first evaluation, and the second-semester group consisted of 72 students (also 11th graders). The results obtained indicate that students did learn from the educational card game. Moreover, students who learned from playing the game significantly outperformed their counterparts in terms of their understanding of the processes and connections among different lines of immunological defense (first semester: t = 2.92, p traditional didactic lectures (first semester: t = 2.79, p < 0.01; second semester: t = 2.41, p < 0.05). This finding is evidence that the educational card game has potential to facilitate students' learning of how the immune system works. The implications and suggestions for future work are further discussed. © 2014 T. Su et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  6. A new data acquisition and imaging system for nuclear microscopy based on a Field Programmable Gate Array card

    International Nuclear Information System (INIS)

    Bettiol, A.A.; Udalagama, C.; Watt, F.

    2009-01-01

    The introduction of the new Field Programmable Gate Array (FPGA) cards by National Instruments has made it possible for the first time to develop reconfigurable custom data acquisition hardware easily with the LabVIEW programming environment. Data acquisition issues such as precise timing for scanning and operating system latencies can now be easily overcome using this new technology because the data acquisition software is embedded in the FPGA chip on the card. In this paper we present the first results of the new data acquisition system developed at the Centre for Ion Beam Applications (CIBA), National University of Singapore using the new National Instruments cards in conjunction with rack mountable Wilkinson type ADCs.

  7. Software Tools for Software Maintenance

    Science.gov (United States)

    1988-10-01

    COMMUNICATIONS, AND COMPUTER SCIENCES I ,(AIRMICS) FO~SOFTWARE TOOLS (.o FOR SOF1 ’ARE MAINTENANCE (ASQBG-1-89-001) October, 1988 DTIC ELECTE -ifB...SUNWW~. B..c Program An~Iysw HA.c C-Tractr C Cobol Stncturing Facility VS Cobol 11 F-Scan Foctma Futbol Cobol Fortran Sltiuc Code Anaiyaer Fortran IS

  8. The mother's card: a simplified aid for primary health workers.

    Science.gov (United States)

    Shah, K P; Shah, P M

    1981-02-01

    The Mother's Card and its use are described. The card is filled out by the health worker and provides data on the mother concerning family planning, menstrual cycles, pregnancy period (including whether at risk, state of nutrition, immunization against tetanus, and expected date of birth), and breastfeeding. The card is kept by the mother, and the health worker keeps a copy. Each card has space for 10 years and up to 4 pregnancies. The cards have been used successfully in India since 1976 and in Somalia since early 1980, and were useful in strengthening family planning programs as well as identifying pregnancies at risk for special attention.

  9. Consumer Credit Card Use Intention and Influence Factors Analysis

    Directory of Open Access Journals (Sweden)

    Wang Yantao

    2017-01-01

    Full Text Available Credit card as a kind of advanced means of payment and the new way of consumer credit in the world widely, but in our country is faced with some problems, such as their per capita spending is low, open the card number is small, motionless bank card is a lot. In this paper, using the Logit model to analyze the Anshan city in Liaoning province consumer credit card usage. And combined with empirical analysis to provide banking management Suggestions and marketing countermeasures, including targeted to provide different kinds of credit card.

  10. PC add on card for processing of LSC signals

    International Nuclear Information System (INIS)

    Jadhav, S.R.; Nikhare, D.M.; Gurna, R.K.; Paulson, Molly; Kulkarni, C.P.; Vaidya, P.P.

    2001-01-01

    This paper describes PC- add on card developed at Electronics Division for processing of LSC signals. This card uses highly integrated digital and analog circuits, for entire processing of signals available from preamplifiers to get complete beta energy spectrum corresponding to coincident events in Liquid Scintillation Counting. LSC card along with High Voltage PC-add on card gives complete electronics required for LSC system. This card is also used in automatic LSC system along with interface circuits, which are used to control mechanical movements. (author)

  11. The possibility of using "Job Card" for career education

    OpenAIRE

    横山, 裕; ヨコヤマ, ユタカ; Yutaka, YOKOYAMA

    2009-01-01

    This paper described the advantage of using a "job card" for career education. "The job card system" is a new system that began this year. The original purpose of "the job card system" is to support a person looking for a job. When a job seeker writes a "job card", the job seeker can understand his own work experience and employment possibilities while getting the advice of the career counselor. If a teacher utilized a "job card" for career education in this way, the student can understand hi...

  12. Health care report cards: what about consumers' perspectives?

    Science.gov (United States)

    McGee, J; Knutson, D

    1994-10-01

    Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.

  13. EPIQR software

    Energy Technology Data Exchange (ETDEWEB)

    Flourentzos, F. [Federal Institute of Technology, Lausanne (Switzerland); Droutsa, K. [National Observatory of Athens, Athens (Greece); Wittchen, K.B. [Danish Building Research Institute, Hoersholm (Denmark)

    1999-11-01

    The support of the EPIQR method is a multimedia computer program. Several modules help the users of the method to treat the data collected during a diagnosis survey, to set up refurbishment scenario and calculate their cost or energy performance, and finally to visualize the results in a comprehensive way and to prepare quality reports. This article presents the structure and the main features of the software. (au)

  14. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  15. Card products market in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Ivana Šučur

    2007-12-01

    Full Text Available Card business in the Republic of Croatia started to develop more than 30 years ago in the form of non-bank card products, issued by American Express and Diners Club global payment systems. These card products were defined as standard charge cards and had been the only card products present in the market until bank cards appeared about ten years ago. The situation changed completely when banks started to enter the market as active participants in the card business. In co-operation with bank global payment systems, MasterCard Worldwide and Visa International, banks have issued several millions of various cards in just a few years, while non-bank issuers have followed the same trend with new card products. This paper explores the current situation in the domestic market; it determines who the cardholders of particular products are, which products they are familiar with, whether they use them or not and for what reason. Cardholders’ opinions, attitudes and preferences towards existing products have been explored, as well as the benefits they would like to get. The results obtained imply that cardholders are familiar with all bank and non-bank card brands, but that they use mostly those which provide them with specific benefits. Therefore, instead of focusing on providing more similar products, issuers should concentrate on designing differentiated products that have been tailored to cardholders’ real needs.

  16. The Study of Application System for Small and Medium CTI Based on Voice Card

    Directory of Open Access Journals (Sweden)

    Zhong Dong

    2016-01-01

    Full Text Available With the rapid development of computer telecommunications integration (CTI technology, the development of application system for small and medium CTI are updated constantly, but the study of application system for small and medium CTI, we are lack of a stability and unified model. In this paper, the author analyzes the unified structure platform of application system for small and medium CTI based on voice card. Meanwhile, the author introduces a suitable software architecture model and general procedural framework for application system for small and medium CTI based on voice card by using the idea of hierarchical design, which shows the versatility of the architecture. It provided an efficient channel for the development of small and medium CTI.

  17. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  18. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  19. Establishing software quality assurance

    International Nuclear Information System (INIS)

    Malsbury, J.

    1983-01-01

    This paper is concerned with four questions about establishing software QA: What is software QA. Why have software QA. What is the role of software QA. What is necessary to ensure the success of software QA

  20. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  1. Software Quality Assurance for Nuclear Safety Systems

    International Nuclear Information System (INIS)

    Sparkman, D R; Lagdon, R

    2004-01-01

    -critical software and applies the highest level of rigor for those systems. DOE has further defined a risk approach to nuclear safety system software consistent with the analyses required for operation of nuclear facilities. This requires the grading of software in terms of safety class and safety significant structures, systems and components (SSCs). Safety-class SSCs are related to public safety where as safety-significant SSCs are identified for specific aspects of defense-in-depth and worker safety. Industry standards do not directly categorize nuclear safety software and DOE sites are not consistent in their approach to nuclear safety software quality assurance. DOE is establishing a more detailed graded approach for software associated with safety class and safety significant systems. This paper presents the process and results that DOE utilized to develop a detailed classification scheme for nuclear safety software

  2. Falla cardíaca aguda

    OpenAIRE

    Sénior Sánchez, Juan Manuel; Gándara Ricardo, Jairo Alfonso

    2015-01-01

    Se presenta el caso clínico de una mujer de 26 años de edad, que acudió al Hospital Universitario San Vicente Fundación (Medellín) con síntomas y signos de falla cardíaca aguda y diagnóstico previo de falla cardíaca crónica con fracción de expulsión disminuida, de origen no claro, tromboembolismo pulmonar y ataque cerebrovascular isquémico, sin modulación neurohormonal óptima. Ingresó a la institución con hallazgos clínicos de sobrecarga hídrica y baja perfusión tisular, con requerimiento de ...

  3. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  4. SUPPORT CARD FOR THE FORWARD SCT MODULE

    CERN Document Server

    Greenall, A

    2002-01-01

    Previously in the development and testing stage of ATLAS SCT Forward modules support cards have been used which interface the module to the DAQ by using only the Redundant inputs for the module configuration and the 'spying' of the ABCD Master chip(s) data. As module development has matured there is now a necessity to be able to test modules in the laboratory using also their Primary input/output data routes i.e. using the optical chips DORIC [1] and VDC [2] but without the need of optical fibres. A Forward Kapton Support Card, FKSC, has been developed so that both Primary and Redundant data routes can be used for module testing.

  5. Organic Functional Group Playing Card Deck

    Science.gov (United States)

    Welsh, Michael J.

    2003-04-01

    The recognition and identification of organic functional groups, while essential for chemistry and biology majors, is also very useful for non-science majors in the study of molecules in art and life. In order to make this task more palatable for the non-science major (art and communications students), the images of a traditional playing deck of cards (heart, spade, diamond, and club) have been replaced with four representations of common organic functional groups. The hierarchy rules for naming two groups in a molecule is loosely incorporated to represent the sequence (King, Queen, Jack, ?, Ace) of the deck. Students practice recognizing and identifying organic groups by playing simple card games of "Old Maid" and "Go Fish". To play games like "Poker" or "Gin", a student must not only recognize the functional groups, but also master a naming hierarchy for the organic groups.

  6. ATM Card Cloning and Ethical Considerations.

    Science.gov (United States)

    Kaur, Paramjit; Krishan, Kewal; Sharma, Suresh K; Kanchan, Tanuj

    2018-05-01

    With the advent of modern technology, the way society handles and performs monetary transactions has changed tremendously. The world is moving swiftly towards the digital arena. The use of Automated Teller Machine (ATM) cards (credit and debit) has led to a "cash-less society" and has fostered digital payments and purchases. In addition to this, the trust and reliance of the society upon these small pieces of plastic, having numbers engraved upon them, has increased immensely over the last two decades. In the past few years, the number of ATM fraud cases has increased exponentially. With the money of the people shifting towards the digital platform, ATM skimming has become a problem that has eventually led to a global outcry. The present review discusses the serious repercussions of ATM card cloning and the associated privacy, ethical and legal concerns. The preventive measures which need to be taken and adopted by the government authorities to mitigate the problem have also been discussed.

  7. THE CARD - CURRENCY WITH AND WITHOUT CASH

    Directory of Open Access Journals (Sweden)

    Nicoara Mihaela

    2012-12-01

    Full Text Available Use by individuals and businesses resulting in reduced cash cards in circulation, the corresponding increase in transfer payments and payments accounts also limit exchange risks and make effective use of currency. As a result, we have the effect of reducing cash in circulation. These advantages are also available for businesses and for banks and leads to favorable effects on import-export business. Following this, banks can diversify our products, so to meet customers' new products.

  8. 16 Cards to Get Into Computer Organization

    OpenAIRE

    Tabik, Siham; Romero, Luis F.

    2014-01-01

    This paper presents a novel educative activity for teaching computer architecture fundamentals. This activity is actually a game that uses 16 cards and involves about twenty active participant students. Executing this activity in the fi rst class of the course allows the studentin only 45 minutes to acquire the fundamental concepts of computer organization. The results of the surveys that evaluate the proposed activity together with the grades obtained by the students at the end of course...

  9. Data mining teaching throughout cards game competition

    OpenAIRE

    Antoñanzas-Torres, Javier; Urraca, Ruben; Sodupe-Ortega, Enrique; Martínez-de-Pison, Francisco; Pernía-Espinoza, Alpha

    2015-01-01

    [EN] Data-mining techniques and statistical metrics learning can be complicated because of the complexity and overwhelming nature of this field. In this paper a class competition to improve learning of designing Decision Support Systems (DSS) by playing a classic cards game named "Copo" is proposed. The fact that this game is based on a probabilistic problem and that different solutions can be obtained represents a very typical kind of problem in the field of engineering and compu...

  10. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  11. Co-branding of payment cards

    OpenAIRE

    Přikryl, Jiří

    2012-01-01

    The bachelor thesis deals with possibilities and use of co-branding within the financial institutions. It mainly focuses on co-branding payment cards aiming both, the analysis of the current situation on the market for these products in the Czech Republic as well as the outline of their new usage opportunities. The theoretical part defines not only the basic concepts of the branding phenomenon but also more deeply characterizes its part called co-branding. The paper then offers fundamental in...

  12. Repeated extraction of DNA from FTA cards

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Ferrero, Laura; Børsting, Claus

    2011-01-01

    Extraction of DNA using magnetic bead based techniques on automated DNA extraction instruments provides a fast, reliable and reproducible method for DNA extraction from various matrices. However, the yield of extracted DNA from FTA-cards is typically low. Here, we demonstrate that it is possible...... to repeatedly extract DNA from the processed FTA-disk. The method increases the yield from the nanogram range to the microgram range....

  13. Software Prototyping

    Science.gov (United States)

    Del Fiol, Guilherme; Hanseler, Haley; Crouch, Barbara Insley; Cummins, Mollie R.

    2016-01-01

    Summary Background Health information exchange (HIE) between Poison Control Centers (PCCs) and Emergency Departments (EDs) could improve care of poisoned patients. However, PCC information systems are not designed to facilitate HIE with EDs; therefore, we are developing specialized software to support HIE within the normal workflow of the PCC using user-centered design and rapid prototyping. Objective To describe the design of an HIE dashboard and the refinement of user requirements through rapid prototyping. Methods Using previously elicited user requirements, we designed low-fidelity sketches of designs on paper with iterative refinement. Next, we designed an interactive high-fidelity prototype and conducted scenario-based usability tests with end users. Users were asked to think aloud while accomplishing tasks related to a case vignette. After testing, the users provided feedback and evaluated the prototype using the System Usability Scale (SUS). Results Survey results from three users provided useful feedback that was then incorporated into the design. After achieving a stable design, we used the prototype itself as the specification for development of the actual software. Benefits of prototyping included having 1) subject-matter experts heavily involved with the design; 2) flexibility to make rapid changes, 3) the ability to minimize software development efforts early in the design stage; 4) rapid finalization of requirements; 5) early visualization of designs; 6) and a powerful vehicle for communication of the design to the programmers. Challenges included 1) time and effort to develop the prototypes and case scenarios; 2) no simulation of system performance; 3) not having all proposed functionality available in the final product; and 4) missing needed data elements in the PCC information system. PMID:27081404

  14. The manuscript of Kartoteka (Card Index

    Directory of Open Access Journals (Sweden)

    Zbigniew Władysław Solski

    2009-01-01

    Full Text Available At the beginning of the 70s Tadeusz Różewicz presented the manuscript of Card Index to Professor Józef Kelera. It might have stayed a secret of friendship of the dramatist and the critic, however, Różewicz revealed the initials of his friend when in a commenatry to the play, he posed a question, whether there was a full stop after the last word in the manuscript or not? Posing this question, the author claimed the integrality of his masterpiece which was threatened by the widespread interpretations of Card Index as a play of a loose and dispersed structure. Appreciating the value of this question, I turned to Professor Kelera. This way I have had an access to the autograph of the play. In this manuscript has been preserved the play from before its final editing, which its author must surely have made during typing the text. Handwritten notes contain two unknown versions of the play with fragments which would not have been passed by the censors in the then Polish People’s Republic. In the reading of the manuscript the functions of the word and its graphic shape appeared of equal importance, so this version of Card Index can be recognised as a masterpiece of literature.

  15. NOD1CARD Might Be Using Multiple Interfaces for RIP2-Mediated CARD-CARD Interaction: Insights from Molecular Dynamics Simulation.

    Directory of Open Access Journals (Sweden)

    Jitendra Maharana

    Full Text Available The nucleotide-binding and oligomerization domain (NOD-containing protein 1 (NOD1 plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2 for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2 helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs. The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface, respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes.

  16. The trigger card system for the MAJORANA DEMONSTRATOR

    Science.gov (United States)

    Thompson, William; Anderson, John; Howe, Mark; Meijer, Sam; Wilkerson, John; Majorana Collaboration

    2014-09-01

    The aim of the MAJORANA DEMONSTRATOR is to demonstrate the feasibility of providing low enough background levels to search for neutrinoless double-beta decay (0 νββ) in an array of germanium detectors enriched to 87% in 76Ge. Currently, it is unknown if this decay process occurs; however, observation of such a decay process would show that lepton number is violated, confirm that neutrinos are Majorana particles, and yield information on the absolute mass scale of the neutrino. With current experimental results indicating a half-life greater than 2 x 1025 years for this decay, the minimization of background events is of critical importance. Utilizing time correlation, coincidence testing is able to reject multi-detector events that may otherwise be mistaken for 0 νββ when viewed independently. Here, we present both the hardware and software of the trigger card system, which provides a common clock to all digitizers and the muon veto system, thereby enabling the rejection of background events through coincidence testing. Current experimental results demonstrate the accuracy of the distributed clock to be within two clock pulses (20 ns) across all system components. A test system is used to validate the data acquisition system. The aim of the MAJORANA DEMONSTRATOR is to demonstrate the feasibility of providing low enough background levels to search for neutrinoless double-beta decay (0 νββ) in an array of germanium detectors enriched to 87% in 76Ge. Currently, it is unknown if this decay process occurs; however, observation of such a decay process would show that lepton number is violated, confirm that neutrinos are Majorana particles, and yield information on the absolute mass scale of the neutrino. With current experimental results indicating a half-life greater than 2 x 1025 years for this decay, the minimization of background events is of critical importance. Utilizing time correlation, coincidence testing is able to reject multi-detector events that may

  17. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  18. Global Software Engineering: A Software Process Approach

    Science.gov (United States)

    Richardson, Ita; Casey, Valentine; Burton, John; McCaffery, Fergal

    Our research has shown that many companies are struggling with the successful implementation of global software engineering, due to temporal, cultural and geographical distance, which causes a range of factors to come into play. For example, cultural, project managementproject management and communication difficulties continually cause problems for software engineers and project managers. While the implementation of efficient software processes can be used to improve the quality of the software product, published software process models do not cater explicitly for the recent growth in global software engineering. Our thesis is that global software engineering factors should be included in software process models to ensure their continued usefulness in global organisations. Based on extensive global software engineering research, we have developed a software process, Global Teaming, which includes specific practices and sub-practices. The purpose is to ensure that requirements for successful global software engineering are stipulated so that organisations can ensure successful implementation of global software engineering.

  19. Integrated Cyber Defenses: Towards Cyber Defense Doctrine

    Science.gov (United States)

    2007-12-01

    and spam filters, mail relays, antivirus /antimalware software , router Access Control Lists (ACLs), cryptography and encryption, user access... Cisco ), network protocols (like TCP/IP [Transmission Control Protocol/Internet Protocol]), programs, programming languages (like C++, Java, ActiveX...rules were built into them. Since these are human-made rules, they can be changed by replacing or updating hardware and/or software . Unlike the

  20. Software system safety

    Science.gov (United States)

    Uber, James G.

    1988-01-01

    Software itself is not hazardous, but since software and hardware share common interfaces there is an opportunity for software to create hazards. Further, these software systems are complex, and proven methods for the design, analysis, and measurement of software safety are not yet available. Some past software failures, future NASA software trends, software engineering methods, and tools and techniques for various software safety analyses are reviewed. Recommendations to NASA are made based on this review.

  1. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  2. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  3. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  4. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  5. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  6. Australian healthcare: a smart card for a clever country.

    Science.gov (United States)

    Morris, S; Cooper, J; Bomba, D; Brankovic, L; Miller, M; Pacheco, F

    1995-10-01

    In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone may contain the cardholders name and address. Access to the different zones depends on the level of security of the zone. The higher the security level the more restrictive the access method. Were smart cards adopted for the storage of medical histories it would change the form of medical information recorded, not merely convert paper files to electronic ones. Storage of an individual's medical history on a smart card raises important privacy issues. These privacy issues are discussed particularly as they relate to the Australian community.

  7. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  8. Credit card spending limit and personal finance: system dynamics approach

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2014-03-01

    Full Text Available Credit cards have become one of the major ways for conducting cashless transactions. However, they have a long term impact on the well being of their owner through the debt generated by credit card usage. Credit card issuers approve high credit limits to credit card owners, thereby influencing their credit burden. A system dynamics model has been used to model behavior of a credit card owner in different scenarios according to the size of a credit limit. Experiments with the model demonstrated that a higher credit limit approved on the credit card decreases the budget available for spending in the long run. This is a contribution toward the evaluation of action for credit limit control based on their consequences.

  9. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  10. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  11. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  12. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  13. Designing minimum data sets of health smart card system

    OpenAIRE

    Mohtaram Nematollahi

    2014-01-01

    Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s ...

  14. The design and development of a multilayer RF circuit card

    OpenAIRE

    Ferro, John Francis

    1991-01-01

    The goal of this project was to design an airborne radio frequency circuit card that was very light weight, occupied a small volume, and operated from 20 Mhz to 1500 Mhz. The circuit card being reported on is called an RF multicoupler, and is one of two cards used in a radio frequency distribution unit (RFD). This unit interfaces a large number of receivers to various antennas. In the past this type of circuitry was done by cascading discrete connectorized RF compo...

  15. Modeling intelligent agent beliefs in a card game scenario

    Science.gov (United States)

    Gołuński, Marcel; Tomanek, Roman; WÄ siewicz, Piotr

    In this paper we explore the problem of intelligent agent beliefs. We model agent beliefs using multimodal logics of belief, KD45(m) system implemented as a directed graph depicting Kripke semantics, precisely. We present a card game engine application which allows multiple agents to connect to a given game session and play the card game. As an example simplified version of popular Saboteur card game is used. Implementation was done in Java language using following libraries and applications: Apache Mina, LWJGL.

  16. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  17. Programming a DSP card for generating an ECG signal with possibility of anomalies

    International Nuclear Information System (INIS)

    Hamrouni, Sayma

    2013-01-01

    This project consists of programming a DSP designed to generate an ECG signal with a probability of anomaly. To begin with, we get to know the characteristics of a DSP card and its architecture. As a second step, we programmed the DSP32C using the compiler D3CC associated with Textpad in order to obtain an analog signal in the respective outputs. And then finally, we developed a graphical user interface using the programming software LabVIEW that aims controlling the good operation of DSP. The tests previously made have proved the good operation of the application.

  18. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  19. [Evaluation of a registration card for logging electrocardiographic records into standard personal computers].

    Science.gov (United States)

    Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M

    1997-01-01

    The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and

  20. Design and implementation of a smart card based billing system for ...

    African Journals Online (AJOL)

    A smart card based billing system for petroleum dispenser is just one of the many ways in which smart cards can be employed to make commerce efficient. It incorporates the use of smart card as its legal tender and a smart card reader embedded into the filling station dispenser design. The smart card reader processes the ...

  1. Defense Systems Management Review, Volume I. Numbers 7-8. Autumn 1978,

    Science.gov (United States)

    1978-01-01

    alert for situations or transactions that may involve fraud. Common examp les of such activities include falsification of documents such as time cards...we must build the att itude to utilize the improved programming technologies with the rigor intended, l’his is the ‘Harlan D. Milk , “Software

  2. Determinants of debit cards acceptance: An empirical investigation

    International Nuclear Information System (INIS)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar; Bakri, Mohamed Hariri; Zulkepli, Jafri

    2014-01-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry

  3. Determinants of debit cards acceptance: An empirical investigation

    Energy Technology Data Exchange (ETDEWEB)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar [Faculty of Business and Management, Universiti Teknologi MARA, Melaka 75300 (Malaysia); Bakri, Mohamed Hariri [Faculty of Technology Management And Technopreneurship, Universiti Teknikal Malaysia, Melaka 76100 (Malaysia); Zulkepli, Jafri [Faculty of Quantitative Science, Universiti Utara Malaysia, Sintok Kedah (Malaysia)

    2014-12-04

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  4. Introduction of card payment system in a merchant company

    OpenAIRE

    Štrukelj, Anja

    2015-01-01

    The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...

  5. Volume of Requests for Internet Medicare Replacement Cards

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2008 onwards for Internet Medicare Replacement Card. The dataset includes only...

  6. Determinants of debit cards acceptance: An empirical investigation

    Science.gov (United States)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  7. Impact of Closed-Loop Gift Card Promotions By Businesses

    Directory of Open Access Journals (Sweden)

    Kathryn W. Ernstberger

    2013-07-01

    Full Text Available At their inception, gift cards were sold by businesses to customers to give as gifts to others. More recently, gift cards are beingused strategically by businesses to manage and transform their relationships with customers. Of particular interest here is the closed-loop gift card that can only be redeemed at the business whose name is on it. This analysis discusses the impact of closed-loop gift card promotions and evaluates the impact of these promotions ontotal spending, lift and redemption rates.

  8. WWW + smart card: towards a mobile health care management system.

    Science.gov (United States)

    Chan, A T

    2000-07-01

    This paper highlights the benefits of combining the World Wide Web and smart card technologies to support a highly mobile health management framework. In particular, we describe an approach using the SmartCard-Web Gateway Interface (SGI) as a common interface to communicate and access the medical records residing in a smart card. Importantly, by employing HTTP as the baseline protocol to access information on the smart card, SGI promotes the use of de facto standard web browsers as the common client user interface. The initial implementation of the framework has demonstrated the feasibility of the concept in facilitating a truly mobile access of patient's medical records based on SGI.

  9. Software for the Minsk-32 display station

    International Nuclear Information System (INIS)

    Ehsenski, J.

    1976-01-01

    The software for the combined work of two computers is described. the TRA-1 with a raster display working as a display station for Minsk-32. Due to the two-way communication between the computers each of them acts as two external devices for the other one. The Minsk-32 complex consists of the computer, of an operative magnetic memory (OMM) with capacity of 32K, punch card input device, punch card output device, magnetic tape memory , an alphabetic-digital information type-writer and an electronic timer. The TRA-1 complex consists of a processor, an OMM with capaciti of 16K, a teletype, a punch card input device, a magnetic disc with capacity of 64K and a raster display. Minsk-32 is capable of multiprogram work (its OMM can contain 4 programs at once); the work according to one program may be accompanied by information exchange with the external devices. The composing of the system is described, as well as its basic programs, i.e. the residence and the MONITOR

  10. Sandia software guidelines: Software quality planning

    Energy Technology Data Exchange (ETDEWEB)

    1987-08-01

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standard for Software Quality Assurance Plans, this volume identifies procedures to follow in producing a Software Quality Assurance Plan for an organization or a project, and provides an example project SQA plan. 2 figs., 4 tabs.

  11. Avoidable Software Procurements

    Science.gov (United States)

    2012-09-01

    software license, software usage, ELA, Software as a Service , SaaS , Software Asset...PaaS Platform as a Service SaaS Software as a Service SAM Software Asset Management SMS System Management Server SEWP Solutions for Enterprise Wide...delivery of full Cloud Services , we will see the transition of the Cloud Computing service model from Iaas to SaaS , or Software as a Service . Software

  12. Formal Specification and Run-time Monitoring Within the Ballistic Missile Defense Project

    National Research Council Canada - National Science Library

    Caffall, Dale S; Cook, Thomas; Drusinsky, Doron; Michael, James B; Shing, Man-Tak; Sklavounos, Nicholas

    2005-01-01

    .... Ballistic Missile Defense Advanced Battle Manager (ABM) project in an effort that is amongst the most comprehensive application of formal methods to a large-scale safety-critical software application ever reported...

  13. Software engineering architecture-driven software development

    CERN Document Server

    Schmidt, Richard F

    2013-01-01

    Software Engineering: Architecture-driven Software Development is the first comprehensive guide to the underlying skills embodied in the IEEE's Software Engineering Body of Knowledge (SWEBOK) standard. Standards expert Richard Schmidt explains the traditional software engineering practices recognized for developing projects for government or corporate systems. Software engineering education often lacks standardization, with many institutions focusing on implementation rather than design as it impacts product architecture. Many graduates join the workforce with incomplete skil

  14. Data acquisition and control system for quadrupole mass spectrometer using an add-on card to an IBM PC

    International Nuclear Information System (INIS)

    Paal, A.; Szadai, J.; Szekely, G.

    1991-01-01

    An RF/DC unit, a dedicated interface card and the PCQMS software was designed to upgrade the existing quadrupole mass spectrometer of ATOMKI series Q300C to Q300PC. The new units and the software features are described. Display modes, all in high resolution graphics are provided to include ion monitoring table, ion monitoring analog, intensity vs time or temperature, scan bargraph and scan analog. The quadrupole mass spectrometer performance has been improved by the new modifications for data acquisition and control to be accomplished automatically. (R.P.) 3 refs.; 4 figs

  15. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  16. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  17. Efficiency at Sorting Cards in Compressed Air

    Science.gov (United States)

    Poulton, E. C.; Catton, M. J.; Carpenter, A.

    1964-01-01

    At a site where compressed air was being used in the construction of a tunnel, 34 men sorted cards twice, once at normal atmospheric pressure and once at 3½, 2½, or 2 atmospheres absolute pressure. An additional six men sorted cards twice at normal atmospheric pressure. When the task was carried out for the first time, all the groups of men performing at raised pressure were found to yield a reliably greater proportion of very slow responses than the group of men performing at normal pressure. There was reliably more variability in timing at 3½ and 2½ atmospheres absolute than at normal pressure. At 3½ atmospheres absolute the average performance was also reliably slower. When the task was carried out for the second time, exposure to 3½ atmospheres absolute pressure had no reliable effect. Thus compressed air affected performance only while the task was being learnt; it had little effect after practice. No reliable differences were found related to age, to length of experience in compressed air, or to the duration of the exposure to compressed air, which was never less than 10 minutes at 3½ atmospheres absolute pressure. PMID:14180485

  18. Anesthesia report card - a customizable tool for performance improvement.

    Science.gov (United States)

    Peccora, Christian D; Gimlich, Robert; Cornell, Richard P; Vacanti, Charles A; Ehrenfeld, Jesse M; Urman, Richard D

    2014-09-01

    Measuring and providing performance feedback to physicians has gained momentum not only as a way to comply with regulatory requirements, but also as a way to improve patient care. Measurement of structural, process, and outcome metrics in a reliable, evidence-based, specialty-specific manner maximizes the probability of improving physician performance. The manner in which feedback is provided influences whether the measurement tool will be successful in changing behavior. We created an innovative reporting tool template for anesthesiology practitioners designed to provide detailed, continuous feedback covering many aspects of clinical practice. The literature regarding quality metric measurement and feedback strategies was examined to design a reporting tool that could provide high quality information and result in improved performance of clinical and academic tasks. A committee of department leaders and information technology professionals was tasked with determining the measurement criteria and infrastructure needed to generate these reports. Data was collected in a systematic, unbiased manner, and reports were populated with information from multiple databases and software systems. Feedback would be based on frequently updated information and allow for analysis of historical performance as well as comparison amongst peers. A template for an anesthesia report card was created. Categories included compliance, credentialing and qualifications, education, clinical and operating room responsibilities, and academic achievements. Physicians were able to choose to be evaluated in some of the categories and had to meet a minimum number of criteria within each category. This allowed for customization to each practitioner's practice. Criteria were derived from the measures of academic and clinical proficiency, as well as quality metrics. Criteria were objective measures and data gathering was often automated. Reports could be generated that were updated daily and provided

  19. The software life cycle

    CERN Document Server

    Ince, Darrel

    1990-01-01

    The Software Life Cycle deals with the software lifecycle, that is, what exactly happens when software is developed. Topics covered include aspects of software engineering, structured techniques of software development, and software project management. The use of mathematics to design and develop computer systems is also discussed. This book is comprised of 20 chapters divided into four sections and begins with an overview of software engineering and software development, paying particular attention to the birth of software engineering and the introduction of formal methods of software develop

  20. Communication Software Performance for Linux Clusters with Mesh Connections

    Energy Technology Data Exchange (ETDEWEB)

    Jie Chen; William Watson

    2003-09-01

    Recent progress in copper based commodity Gigabit Ethernet interconnects enables constructing clusters to achieve extremely high I/O bandwidth at low cost with mesh connections. However, the TCP/IP protocol stack cannot match the improved performance of Gigabit Ethernet networks especially in the case of multiple interconnects on a single host. In this paper, we evaluate and compare the performance characteristics of TCP/IP and M-VIA software that is an implementation of VIA.In particular, we focus on the performance of the software systems for a mesh communication architecture and demonstrate the feasibility of using multiple Gigabit Ethernet cards on one host to achieve aggregated bandwidth and latency that are not only better than what TCP provides but also compare favorably to some of the special purpose high-speed networks. In addition, implementation of a new M-VIA driver for one type of Gigabit Ethernet card will be discussed.

  1. ADTool: Security Analysis with Attack-Defense Trees

    NARCIS (Netherlands)

    Kordy, Barbara; Kordy, P.T.; Mauw, Sjouke; Schweitzer, Patrick; Joshi, Kaustubh; Siegle, Markus; Stoelinga, Mariëlle Ida Antoinette; d' Argenio, P.R.

    ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of

  2. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  3. Towards testability in smart card operating system design

    NARCIS (Netherlands)

    Hartel, Pieter H.; Cordonnier, V.; de Jong, Eduard K.; Quisquater, J.J.

    1994-01-01

    The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the

  4. Concretization and animation of Finite Automata with c-cards

    DEFF Research Database (Denmark)

    Valente, Andrea

    2004-01-01

    to classes of 10 to 12 years old, and in general to students with a limited mathematical background. Our approach builds on {\\em computational cards} (or c-cards), a project aiming at scaling-down the learning complexity of computer science core contents, by presenting symbol manipulation via a t...

  5. Predicting credit card behavior: a study in neuroeconomics.

    Science.gov (United States)

    Spinella, Marcello; Lester, David; Yang, Bijou

    2005-06-01

    In a sample of 139 community residents, credit card ownership was associated with age, sex, income, attitudes toward credit cards and toward money, and scores on a verbal measure of prefrontal cortical dysfunction, supporting a neuroeconomic approach to economic decision-making.

  6. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  7. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Science.gov (United States)

    2010-04-01

    ...; adding value. (i) After using the card described in Example 2, P arranges with A by telephone to have 30... EXCISE TAXES FACILITIES AND SERVICES EXCISE TAXES Communications § 49.4251-4 Prepaid telephone cards. (a... section provides rules for the application of the section 4251 tax to PTCs. (b) Definitions. The following...

  8. Developing efficient blinded attribute certificates on smart cards via pairings

    NARCIS (Netherlands)

    Batina, L.; Hoepman, J.H.; Jacobs, B.; Mostowski, W.; Vullers, P.

    2010-01-01

    This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified

  9. Mobile Payment Technology and Competitiveness In the Credit Card Chain

    OpenAIRE

    Martins, Guilherme Silveira; FGV-EAESP; Martins, Michele Esteves; FGV-EAESP; Di Serio, Luiz Carlos; FGV-EAESP; Csillag, João Mário; FGV-EAESP; Santos, Camila Aparecida; Freeddom Tecnologia e Serviços S.A.

    2013-01-01

    This paper discusses the value creation sources of Mobile Payment concept into the Credit Card Chain. A case-study was developed based on the Transaction Cost Theory, Value Chain Analysis, RB V, Schumpeterian Innovation, and Strategic Network Theory. The results illustrate the technology potential to modify the configuration of Credit Card chain.

  10. Medicine and ionizing radiation: help cards for risk analysis

    International Nuclear Information System (INIS)

    Gauron, C.

    2004-01-01

    Following an inquiry in Ile de France on radiation protection, a scientific committee associating several institutions and different experts has elaborated cards for help to risk analysis. A first series of this cards is published in this issue documents for the labour physician and will be next on Internet. the other fields of medical use will be covered in the future. (N.C.)

  11. 78 FR 17183 - Information Collection: Grey Towers Visitor Comment Card

    Science.gov (United States)

    2013-03-20

    ... DEPARTMENT OF AGRICULTURE Forest Service Information Collection: Grey Towers Visitor Comment Card... request: (1) An extension from the Office of Management and Budget; and (2) to merge the currently approved information collection 0596- 0222, ``Grey Towers Visitor Comment Card'' with 0596-0226, ``Forest...

  12. IR Cards: Inquiry-Based Introduction to Infrared Spectroscopy

    Science.gov (United States)

    Bennett, Jacqueline; Forster, Tabetha

    2010-01-01

    As infrared spectroscopy (IR) is frequently used in undergraduate organic chemistry courses, an inductive introduction to IR spectroscopy that uses index cards printed with spectra, structures, and chemical names is described. Groups of students are given an alphabetized deck of these "IR cards" to sort into functional groups. The students then…

  13. Principles for Instructional Stack Development in HyperCard.

    Science.gov (United States)

    McEneaney, John E.

    The purpose of this paper is to provide information about obtaining and using HyperCard stacks that introduce users to principles of stack development. The HyperCard stacks described are available for downloading free of charge from a server at Indiana University South Bend. Specific directions are given for stack use, with advice for beginners. A…

  14. Western North Carolina report card on forest sustainability

    Science.gov (United States)

    Susan Fox; Bill Jackson; Sarah Jackson; Gary Kauffmann; Mary Carol Koester; Robert Mera; Terry Seyden; Charles Van Sickle; Sealy Chipley; Jim Fox; Jeff Hicks; Matt Hutchins; Karin Lichtenstein; Kelsie Nolan; Todd Pierce; Beth Porter

    2011-01-01

    Western North Carolina encompasses 4.8 million acres of highly valued temperate forests. To help address future management and conservation decisions surrounding these resources, the report card evaluates environmental, social, and economic conditions in recent decades across an 18 county area. The report card describes the status of indicators of forest sustainability...

  15. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  16. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  17. Simple solution to the medical instrumentation software problem

    Science.gov (United States)

    Leif, Robert C.; Leif, Suzanne B.; Leif, Stephanie H.; Bingue, E.

    1995-04-01

    Medical devices now include a substantial software component, which is both difficult and expensive to produce and maintain. Medical software must be developed according to `Good Manufacturing Practices', GMP. Good Manufacturing Practices as specified by the FDA and ISO requires the definition and compliance to a software processes which ensures quality products by specifying a detailed method of software construction. The software process should be based on accepted standards. US Department of Defense software standards and technology can both facilitate the development and improve the quality of medical systems. We describe the advantages of employing Mil-Std-498, Software Development and Documentation, and the Ada programming language. Ada provides the very broad range of functionalities, from embedded real-time to management information systems required by many medical devices. It also includes advanced facilities for object oriented programming and software engineering.

  18. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  19. Framework for Small-Scale Experiments in Software Engineering: Guidance and Control Software Project: Software Engineering Case Study

    Science.gov (United States)

    Hayhurst, Kelly J.

    1998-01-01

    Software is becoming increasingly significant in today's critical avionics systems. To achieve safe, reliable software, government regulatory agencies such as the Federal Aviation Administration (FAA) and the Department of Defense mandate the use of certain software development methods. However, little scientific evidence exists to show a correlation between software development methods and product quality. Given this lack of evidence, a series of experiments has been conducted to understand why and how software fails. The Guidance and Control Software (GCS) project is the latest in this series. The GCS project is a case study of the Requirements and Technical Concepts for Aviation RTCA/DO-178B guidelines, Software Considerations in Airborne Systems and Equipment Certification. All civil transport airframe and equipment vendors are expected to comply with these guidelines in building systems to be certified by the FAA for use in commercial aircraft. For the case study, two implementations of a guidance and control application were developed to comply with the DO-178B guidelines for Level A (critical) software. The development included the requirements, design, coding, verification, configuration management, and quality assurance processes. This paper discusses the details of the GCS project and presents the results of the case study.

  20. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    Jathar, M.R.; Vikas, Meshram; Patidar, S.C.

    2015-01-01

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  1. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  2. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  3. Mathematical card magic fifty-two new effects

    CERN Document Server

    Mulcahy, Colm

    2013-01-01

    Mathematical card effects offer both beginning and experienced magicians an opportunity to entertain with a minimum of props. Featuring mostly original creations, Mathematical Card Magic: Fifty-Two New Effects presents an entertaining look at new mathematically based card tricks. Each chapter contains four card effects, generally starting with simple applications of a particular mathematical principle and ending with more complex ones. Practice a handful of the introductory effects and, in no time, you'll establish your reputation as a "mathemagician." Delve a little deeper into each chapter and the mathematics gets more interesting. The author explains the mathematics as needed in an easy-to-follow way. He also provides additional details, background, and suggestions for further explorations.Suitable for recreational math buffs and amateur card lovers or as a text in a first-year seminar, this color book offers a diverse collection of new mathemagic principles and effects.

  4. Introducing Teamwork Challenges in Simulation Using Game Cards.

    Science.gov (United States)

    Chang, Todd P; Kwan, Karen Y; Liberman, Danica; Song, Eric; Dao, Eugene H; Chung, Dayun; Morton, Inge; Festekjian, Ara

    2015-08-01

    Poor teamwork and communication during resuscitations are linked to patient safety problems and poorer outcomes. We present a novel simulation-based educational intervention using game cards to introduce challenges in teamwork. This intervention uses sets of game cards that designate roles, limitations, or communication challenges designed to introduce common communication or teamwork problems. Game cards are designed to be applicable for any simulation-based scenario and are independent from patient physiology. In our example, participants were pediatric emergency medicine fellows undergoing simulation training for orientation. We describe the use of card sets in different scenarios with increasing teamwork challenge and difficulty. Both postscenario and summative debriefings were facilitated to allow participants to reflect on their performance and discover ways to apply their strategies to real resuscitations. In this article, we present our experience with the novel use of game cards to modify simulation scenarios to improve communication and teamwork skills.

  5. A Comparison of Card-sorting Analysis Methods

    DEFF Research Database (Denmark)

    Nawaz, Ather

    2012-01-01

    This study investigates how the choice of analysis method for card sorting studies affects the suggested information structure for websites. In the card sorting technique, a variety of methods are used to analyse the resulting data. The analysis of card sorting data helps user experience (UX......) designers to discover the patterns in how users make classifications and thus to develop an optimal, user-centred website structure. During analysis, the recurrence of patterns of classification between users influences the resulting website structure. However, the algorithm used in the analysis influences...... the recurrent patterns found and thus has consequences for the resulting website design. This paper draws an attention to the choice of card sorting analysis and techniques and shows how it impacts the results. The research focuses on how the same data for card sorting can lead to different website structures...

  6. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  7. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  8. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  9. Cobacabana (control of balance by card-based navigation) : A card-based system for job shop control

    NARCIS (Netherlands)

    Land, M.J.

    Existing card-based production control systems such as Kanban are mostly dedicated to repetitive production environments. Cards-based systems for job shop control are lacking, while particularly this industry segment shows a need for simple control systems. This paper aims at filling the gap by

  10. Maxed out: The Relationship between Credit Card Debt, Credit Card Distress and Grade Point Averages for College Students

    Science.gov (United States)

    Smith, Temple Day

    2011-01-01

    Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…

  11. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    Science.gov (United States)

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  12. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  13. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  14. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  15. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  16. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  17. ESTSC - Software Best Practices

    Science.gov (United States)

    DOE Scientific and Technical Software Best Practices December 2010 Table of Contents 1.0 Introduction 2.0 Responsibilities 2.1 OSTI/ESTSC 2.2 SIACs 2.3 Software Submitting Sites/Creators 2.4 Software Sensitivity Review 3.0 Software Announcement and Submission 3.1 STI Software Appropriate for Announcement 3.2

  18. Software Assurance Competency Model

    Science.gov (United States)

    2013-03-01

    COTS) software , and software as a service ( SaaS ). L2: Define and analyze risks in the acquisition of contracted software , COTS software , and SaaS ...2010a]: Application of technologies and processes to achieve a required level of confidence that software systems and services function in the...

  19. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  20. Authentications of Myanmar National Registration Card

    Directory of Open Access Journals (Sweden)

    Myint Myint Sein

    2013-04-01

    Full Text Available The automatic identification system of Myanmar national registration card (NRC holder is presented in this paper. The proposed system can be handled the identification by the extracted low quality face image and fingerprint image from Myanmar NRC. Both of the facial recognition and fingerprint recognition system are developed for Myanmar citizenship confirmation. Age invariant face recognition algorithm is performed based on combination of DiaPCA (Diagonal principal Component Analysis and KNN (Kth nearest neighbor classifier approaches. An algorithm of the fingerprint recognition is proposed for recognition of the poor quality fingerprint image with fabric background.  Several experiments have been done for confirming the effectiveness of the proposed approach.

  1. Superstrumps: the Card Game with a Mission

    Directory of Open Access Journals (Sweden)

    Syd Moore

    2016-02-01

    Full Text Available The artist interview in this dossier is an example of collaborative work between an artist and a writer. It is a showcase of how popular culture can be re-appropriated. The interviewees are the co-creators of the card game Superstrumps developed to address the issue of stereotyping of women. In the interview, they recount the process of creating the game involving other women from their local community. This exemplifies how a strategy for resisting and reclaiming identities undermined by negative labelling is developed. Their views are strongly shaped by their feminist principles. The interview acknowledges the complex nature of identities, the challenge of media representation and the symbiotic relationship between media and audiences is revealed.

  2. Improved catalyzed reporter deposition, iCARD.

    Science.gov (United States)

    Lohse, Jesper; Petersen, Kenneth Heesche; Woller, Nina Claire; Pedersen, Hans Christian; Skladtchikova, Galina; Jørgensen, Rikke Malene

    2014-06-18

    Novel reporters have been synthesized with extended hydrophilic linkers that in combination with polymerizing cross-linkers result in very efficient reporter deposition. By utilizing antibodies to stain HER2 proteins in a cell line model it is demonstrated that the method is highly specific and sensitive with virtually no background. The detection of HER2 proteins in tissue was used to visualize individual antigens as small dots visible in a microscope. Image analysis-assisted counting of fluorescent or colored dots allowed assessment of relative protein levels in tissue. Taken together, we have developed novel reporters that improve the CARD method allowing highly sensitive in situ detection of proteins in tissue. Our findings suggest that in situ protein quantification in biological samples can be performed by object recognition and enumeration of dots, rather than intensity-based fluorescent or colorimetric assays.

  3. Software attribute visualization for high integrity software

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, G.M.

    1998-03-01

    This report documents a prototype tool developed to investigate the use of visualization and virtual reality technologies for improving software surety confidence. The tool is utilized within the execution phase of the software life cycle. It provides a capability to monitor an executing program against prespecified requirements constraints provided in a program written in the requirements specification language SAGE. The resulting Software Attribute Visual Analysis Tool (SAVAnT) also provides a technique to assess the completeness of a software specification.

  4. Assessment of Grating Acuity in Infants and Toddlers Using an Electronic Acuity Card: The Dobson Card.

    Science.gov (United States)

    Mohan, Kathleen M; Miller, Joseph M; Harvey, Erin M; Gerhart, Kimberly D; Apple, Howard P; Apple, Deborah; Smith, Jordana M; Davis, Amy L; Leonard-Green, Tina; Campus, Irene; Dennis, Leslie K

    2016-01-01

    To determine if testing binocular visual acuity in infants and toddlers using the Acuity Card Procedure (ACP) with electronic grating stimuli yields clinically useful data. Participants were infants and toddlers ages 5 to 36.7 months referred by pediatricians due to failed automated vision screening. The ACP was used to test binocular grating acuity. Stimuli were presented on the Dobson Card. The Dobson Card consists of a handheld matte-black plexiglass frame with two flush-mounted tablet computers and is similar in size and form to commercially available printed grating acuity testing stimuli (Teller Acuity Cards II [TACII]; Stereo Optical, Inc., Chicago, IL). On each trial, one tablet displayed a square-wave grating and the other displayed a luminance-matched uniform gray patch. Stimuli were roughly equivalent to the stimuli available in the printed TACII stimuli. After acuity testing, each child received a cycloplegic eye examination. Based on cycloplegic retinoscopy, patients were categorized as having high or low refractive error per American Association for Pediatric Ophthalmology and Strabismus vision screening referral criteria. Mean acuities for high and low refractive error groups were compared using analysis of covariance, controlling for age. Mean visual acuity was significantly poorer in children with high refractive error than in those with low refractive error (P = .015). Electronic stimuli presented using the ACP can yield clinically useful measurements of grating acuity in infants and toddlers. Further research is needed to determine the optimal conditions and procedures for obtaining accurate and clinically useful automated measurements of visual acuity in infants and toddlers. Copyright 2016, SLACK Incorporated.

  5. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  6. National report card on energy efficiency : 2. annual report card on government activities

    International Nuclear Information System (INIS)

    2000-01-01

    This second annual report card produced by the Canadian Energy Efficiency Alliance is a means by which to monitor the efforts of Canada's federal, provincial and territorial governments in energy efficiency activities. The Alliance works in partnership with manufacturers, utilities, governments, builders, labour, consumer groups and environmental organizations. Energy efficiency is one of the primary tools governments can use to meet the Kyoto climate change commitment. The issue of climate change was examined in greater depth in this second annual report card. Ten specific measures that each government should take in order to be efficiency leaders were identified. These included minimum standards and regulations for buildings and appliances, supporting energy efficiency in the marketplace, and leadership programs to improve energy efficiency and achieve emission reduction targets. Efficiency in transportation was not included in this report card. A brief summary of what the federal government, as well as each provincial and territorial government are doing to promote energy efficiency was included. Each jurisdiction was given a grade. The Yukon received the highest mark of A minus. Saskatchewan received the lowest, and only failed mark. It was emphasized that public and private utilities also play a key role in supporting energy efficiency in Canada. 2 tabs

  7. Qt based control system software for Low Energy Accelerator Facility

    International Nuclear Information System (INIS)

    Basu, A.; Singh, S.; Nagraju, S.B.V.; Gupta, S.; Singh, P.

    2012-01-01

    Qt based control system software for Low Energy Accelerating Facility (LEAF) is operational at Bhabha Atomic Research Centre (BARC), Trombay, Mumbai. LEAF is a 50 keV negative ion electrostatic accelerator based on SNICS ion source. Control system uses Nokia Trolltech's QT 4.x API for control system software. Ni 6008 USB based multifunction cards has been used for control and read back field equipments such as power supplies, pumps, valves etc. Control system architecture is designed to be client server. Qt is chosen for its excellent GUI capability and platform independent nature. Control system follows client server architecture. The paper will describe the control system. (author)

  8. Reliability of software

    International Nuclear Information System (INIS)

    Kopetz, H.

    1980-01-01

    Common factors and differences in the reliability of hardware and software; reliability increase by means of methods of software redundancy. Maintenance of software for long term operating behavior. (HP) [de

  9. Credit Card Risk Behavior on College Campuses: Evidence from Brazil

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-da-Silva

    2012-07-01

    Full Text Available College students frequently show they have little skill when it comes to using a credit card in a responsible manner. This article deals with this issue in an emerging market and in a pioneering manner. University students (n = 769 in São Paulo, Brazil’s main financial center, replied to a questionnaire about their credit card use habits. Using Logit models, associations were discovered between personal characteristics and credit card use habits that involve financially risky behavior. The main results were: (a a larger number of credit cards increases the probability of risky behavior; (b students who alleged they knew what interest rates the card administrators were charging were less inclined to engage in risky behavior. The results are of interest to the financial industry, to university managers and to policy makers. This article points to the advisability, indeed necessity, of providing students with information about the use of financial products (notably credit cards bearing in mind the high interest rates which their users are charged. The findings regarding student behavior in the use of credit cards in emerging economies are both significant and relevant. Furthermore, financial literature, while recognizing the importance of the topic, has not significantly examined the phenomenon in emerging economies.

  10. Smart practice: smart card design considerations in health care.

    Science.gov (United States)

    Lindley, R A; Pacheco, F

    1995-01-01

    Recent innovations in microelectronics and advances in cryptography are driving the appearance of a new generation of smart cards with wider applications; this has important repercussions for our society in the coming years. Essentially, these breakthroughs include built-in microprocessors capable of generating cryptographic transactions (e.g.,Jelectronic blinded signatures, digital pseudonyms, and digital credentials), developments toward a single electronic card offering multi-access to services such as transport, telecommunications, health, financial, and entertainment (Universal Access Services), and incorporation of personal identification technologies such as voice, eye, or skin pattern recognition. For example, by using electronic representatives or cryptographic blinded signatures, a smart card can be used for multi transactions across different organizations and under different generated pseudonyms. These pseudonyms are capable of recognizing an individual unambiguously, while none of her records can be linked [1]. Moreover, tamper-proof electronic observers would make smart cards a very attractive technology for high-security based applications, such as those in the health care field. New trends in smart card technology offer excellent privacy and confidentiality safeguards. Therefore, smart cards constitute a promising technology for the health sector in Australia and other countries around the world in their pursuit of technology to support the delivery of quality care services. This paper addresses the main issues and the key design criteria which may be of strategic importance to the success of future smart card technology in the health care sector.

  11. CQL: a database in smart card for health care applications.

    Science.gov (United States)

    Paradinas, P C; Dufresnes, E; Vandewalle, J J

    1995-01-01

    The CQL-Card is the first smart card in the world to use Database Management Systems (DBMS) concepts. The CQL-Card is particularly suited to a portable file in health applications where the information is required by many different partners, such as health insurance organizations, emergency services, and General Practitioners. All the information required by these different partners can be shared with independent security mechanisms. Database engine functions are carried out by the card, which manages tables, views, and dictionaries. Medical Information is stored in tables and views are logical and dynamic subsets of tables. For owner-partners like MIS (Medical Information System), it is possible to grant privileges (select, insert, update, and delete on table or view) to other partners. Furthermore, dictionaries are structures that contain requested descriptions and which allow adaptation to computer environments. Health information held in the CQL-Card is accessed using CQL (Card Query Language), a high level database query language which is a subset of the standard SQL (Structured Query Language). With this language, CQL-Card can be easily integrated into Medical Information Systems.

  12. Investigating customer racial discrimination in the secondary baseball card market.

    Science.gov (United States)

    Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M

    2011-01-01

    A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price.

  13. Space Flight Software Development Software for Intelligent System Health Management

    Science.gov (United States)

    Trevino, Luis C.; Crumbley, Tim

    2004-01-01

    The slide presentation examines the Marshall Space Flight Center Flight Software Branch, including software development projects, mission critical space flight software development, software technical insight, advanced software development technologies, and continuous improvement in the software development processes and methods.

  14. Activity report for feasibility study on PKI authentication method with IC card in authentication system sub group of J-PARC information system group

    International Nuclear Information System (INIS)

    Teshima, Naoya; Aoyagi, Tetsuo; Nakajima, Norihiro; Hashimoto, Kiyoharu; Manabe, Atsushi; Yuasa, Fukuko

    2009-06-01

    The Authentication System Sub Group of J-PARC Information System Group completed the mapping of the several authentication methods in terms of the level of security. Of the methods, the PKI authentication method with IC card provides the Super High Security Level and will be adopted as the authentication method of several J-PARC Information Systems. We study the feasibility of this method with following four examples; (1) 'The EAP-TLS wireless LAN authentication method'. (2) 'The Web-SSL client authentication method in SSL-VPN connection'. (3) 'The PKI authentication method with a certificate issued by NAREGI-CA software stored in IC card.' (4) 'The PKI authentication method with Dual interface FeliCa card'. In each example, we confirmed the feasibility of the method in a practical way. In this report we present the details of the study. (author)

  15. Software Engineering Guidebook

    Science.gov (United States)

    Connell, John; Wenneson, Greg

    1993-01-01

    The Software Engineering Guidebook describes SEPG (Software Engineering Process Group) supported processes and techniques for engineering quality software in NASA environments. Three process models are supported: structured, object-oriented, and evolutionary rapid-prototyping. The guidebook covers software life-cycles, engineering, assurance, and configuration management. The guidebook is written for managers and engineers who manage, develop, enhance, and/or maintain software under the Computer Software Services Contract.

  16. Estetoscópio digital como ferramenta inovadora no ensino da ausculta cardíaca

    Directory of Open Access Journals (Sweden)

    Claudio Tinoco Mesquita

    2013-02-01

    Full Text Available O exame físico cardiovascular, em particular a ausculta cardíaca, é uma das habilidades clínicas mais difíceis para os alunos durante seu treinamento médico. Estudos sugerem que o uso de tecnologias, como o estetoscópio digital, aumente a acurácia do exame clínico, entretanto, seu impacto no ensino da propedêutica da ausculta cardíaca em alunos de graduação de Medicina não é conhecido. O objetivo é demonstrar a utilidade do estetoscópio digital, em comparação com métodos tradicionais, como instrumento de ensino da ausculta cardíaca. Estudo de intervenção, longitudinal, controlado, unicêntrico e randomizado. Foram inscritos 38 alunos de medicina para um curso de semiologia cardiovascular com duração de oito semanas. Definiu-se um programa com aulas expositivas e à beira do leito nas enfermarias de Cardiologia. Nas aulas práticas, os alunos foram randomizados em dois grupos: 1 (n = 21 estetoscópio digital (Littmann® modelo 3200, 3M; e 2 (n = 17 estetoscópios convencionais. Foi realizada uma avaliação pré-treinamento, através de um teste utilizando o software Heart Sounds®, que foi repetida ao final do curso. As médias das avaliações foram comparadas pelo teste T pareado e não pareado. Observa-se que, ao final do curso, houve uma melhora significativamente maior no grupo que utilizou o estetoscópio digital (51,9% quando comparado ao grupo que utilizou o estetoscópio convencional (29,5%. Intervenções de curta duração para o ensino de semiologia cardíaca são capazes de contribuir de modo significativo para melhora da proficiência da identificação dos sons cardíacos. O uso do estetoscópio digital demonstrou ser um fator positivo no ensino dessas habilidades.

  17. CheMentor Software System by H. A. Peoples

    Science.gov (United States)

    Reid, Brian P.

    1997-09-01

    CheMentor Software System H. A. Peoples. Computerized Learning Enhancements: http://www.ecis.com/~clehap; email: clehap@ecis.com; 1996 - 1997. CheMentor is a series of software packages for introductory-level chemistry, which includes Practice Items (I), Stoichiometry (I), Calculating Chemical Formulae, and the CheMentor Toolkit. The first three packages provide practice problems for students and various types of help to solve them; the Toolkit includes "calculators" for determining chemical quantities as well as the Practice Items (I) set of problems. The set of software packages is designed so that each individual product acts as a module of a common CheMentor program. As the name CheMentor implies, the software is designed as a "mentor" for students learning introductory chemistry concepts and problems. The typical use of the software would be by individual students (or perhaps small groups) as an adjunct to lectures. CheMentor is a HyperCard application and the modules are HyperCard stacks. The requirements to run the packages include a Macintosh computer with at least 1 MB of RAM, a hard drive with several MB of available space depending upon the packages selected (10 MB were required for all the packages reviewed here), and the Mac operating system 6.0.5 or later.

  18. REMINDER - PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2003-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  19. REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2002-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards.Relations with the Host States Service Tel. 72848

  20. REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2002-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848