WorldWideScience

Sample records for registration card smart

  1. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  2. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  3. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  4. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  5. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    Science.gov (United States)

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  6. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  7. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  8. Smart practice: smart card design considerations in health care.

    Science.gov (United States)

    Lindley, R A; Pacheco, F

    1995-01-01

    Recent innovations in microelectronics and advances in cryptography are driving the appearance of a new generation of smart cards with wider applications; this has important repercussions for our society in the coming years. Essentially, these breakthroughs include built-in microprocessors capable of generating cryptographic transactions (e.g.,Jelectronic blinded signatures, digital pseudonyms, and digital credentials), developments toward a single electronic card offering multi-access to services such as transport, telecommunications, health, financial, and entertainment (Universal Access Services), and incorporation of personal identification technologies such as voice, eye, or skin pattern recognition. For example, by using electronic representatives or cryptographic blinded signatures, a smart card can be used for multi transactions across different organizations and under different generated pseudonyms. These pseudonyms are capable of recognizing an individual unambiguously, while none of her records can be linked [1]. Moreover, tamper-proof electronic observers would make smart cards a very attractive technology for high-security based applications, such as those in the health care field. New trends in smart card technology offer excellent privacy and confidentiality safeguards. Therefore, smart cards constitute a promising technology for the health sector in Australia and other countries around the world in their pursuit of technology to support the delivery of quality care services. This paper addresses the main issues and the key design criteria which may be of strategic importance to the success of future smart card technology in the health care sector.

  9. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  10. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  11. Smart Card sebagai Pengaman Sepeda Motor Berbasis Mikrokontroler

    OpenAIRE

    Yohanes Chrisostomus Purba; Antonius Wibowo

    2010-01-01

    Pengaman sepeda motor yang berbentuk smart card terdiri dari bagian yang memuat chip EEPROM dan bagian pengaman smart card. Pembacaan smart card didesain dan ditempatkan pada sepeda motor. Untuk pembacaan data chip SLE 4442, dan pembacaan data pengaman smart card digunakan mikrokontroler AT89S51. Untuk pengaturan aktif maupun tidak aktifnya CDI, dan starter juga digunakan mikrokontroler AT89S51. Sistem pengaman sepeda motor akan menjadi aktif bila sepeda motor dalam keadaan mati. Smart car...

  12. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  13. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  14. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  15. Smart Icon Cards

    Science.gov (United States)

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  16. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  17. An overview of smart card technology and markets

    OpenAIRE

    Mark Furletti

    2002-01-01

    As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...

  18. Studi Perkembangan Pasar Smart Card Indonesia Pada Sektor Perbankan

    OpenAIRE

    Onny Rafizan

    2017-01-01

    Smart card merupakan salah satu teknologi yang sudah banyak digunakan di Indonesia di berbagai sektor. Dari sisi teknologi, industri dalam negeri sebenarnya sudah mampu memproduksi smart card, sehingga industri ini sangat potensial untuk dikembangkan menuju kemandirian. Penelitian ini dilakukan sebagai bagian dalam USAha pemerintah untuk mendorong perkembangan industri smart card dalam negeri, dengan tujuan memberikan gambaran kondisi pasar smart card di Indonesia saat ini. Pengumpulan data p...

  19. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  20. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  1. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  2. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  3. Design and implementation of a smart card based billing system for ...

    African Journals Online (AJOL)

    A smart card based billing system for petroleum dispenser is just one of the many ways in which smart cards can be employed to make commerce efficient. It incorporates the use of smart card as its legal tender and a smart card reader embedded into the filling station dispenser design. The smart card reader processes the ...

  4. Design and implementation of a smart card based healthcare information system.

    Science.gov (United States)

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  5. Prevention of Information Leakage by Photo-Coupling in Smart Card

    Science.gov (United States)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  6. Australian healthcare: a smart card for a clever country.

    Science.gov (United States)

    Morris, S; Cooper, J; Bomba, D; Brankovic, L; Miller, M; Pacheco, F

    1995-10-01

    In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone may contain the cardholders name and address. Access to the different zones depends on the level of security of the zone. The higher the security level the more restrictive the access method. Were smart cards adopted for the storage of medical histories it would change the form of medical information recorded, not merely convert paper files to electronic ones. Storage of an individual's medical history on a smart card raises important privacy issues. These privacy issues are discussed particularly as they relate to the Australian community.

  7. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  8. BİYOMETRIC FINGER PRINT USED AND APPLIED ON SMART CARD

    Directory of Open Access Journals (Sweden)

    Makbule KARAKÜLAH

    2004-04-01

    Full Text Available During the last years, the authors are trying to integrate biometrics, inside a smart card. In this study the first step, as in every biometric system is to obtain an image of the user's fingerprint. After this, a preprocessing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae. The minutiae are ridges and valleys of the fingerprint. We researched these minutiae which are used with smart cards. A lot of smart card readers /writers were used for data writing and reading. Fingerprint minutiae and identify information were wrote on smart cards successfully using development kits (smart cards of fingerprint and so were identified.

  9. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  10. On Cyclic Plans for Scheduling a Smart Card Personalisation System

    NARCIS (Netherlands)

    Nieberg, T.

    An industrial case study for scheduling the personalisation of smart cards is presented and analysed. Smart cards are personalised in several machines that are served by an underlying conveyor belt connecting these. As there are usually a very high number of smart cards to be personalised, the focus

  11. Registration system of cloud campus by using android smart tablet.

    Science.gov (United States)

    Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko

    2014-01-01

    Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.

  12. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  13. Smart Card Based Integrated Electronic Health Record System For Clinical Practice

    OpenAIRE

    N. Anju Latha; B. Rama Murthy; U. Sunitha

    2012-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Smart cards are used as a Electronic Health Record (EHR) Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in hospitals. In this paper, a smart card based Integrated Electronic health Reco...

  14. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  15. Signal processing for smart cards

    Science.gov (United States)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  16. Towards testability in smart card operating system design

    NARCIS (Netherlands)

    Hartel, Pieter H.; Cordonnier, V.; de Jong, Eduard K.; Quisquater, J.J.

    1994-01-01

    The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the

  17. WWW + smart card: towards a mobile health care management system.

    Science.gov (United States)

    Chan, A T

    2000-07-01

    This paper highlights the benefits of combining the World Wide Web and smart card technologies to support a highly mobile health management framework. In particular, we describe an approach using the SmartCard-Web Gateway Interface (SGI) as a common interface to communicate and access the medical records residing in a smart card. Importantly, by employing HTTP as the baseline protocol to access information on the smart card, SGI promotes the use of de facto standard web browsers as the common client user interface. The initial implementation of the framework has demonstrated the feasibility of the concept in facilitating a truly mobile access of patient's medical records based on SGI.

  18. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  19. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  20. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  1. Selecting e-Purse Smart Card Technology via Fuzzy AHP and ANP

    Directory of Open Access Journals (Sweden)

    Nurgül Demirtaş

    2014-01-01

    Full Text Available Developments in the information technologies provide important advantages to consumers and companies. Nowadays, smart card technology starts to use e-purse applications. The aim of this paper is to identify the most important decision criteria to select the best card technology. In this study, at first smart card and multiple selection techniques were explained. Then the best card technology was selected for an e-purse application. The three types of card technologies were examined and the most important criteria were taken into account by the software developer while they develop card software. Fuzzy analytic hierarchy process (FAHP and analytical network process (ANP techniques were used to compare smart card technologies.

  2. SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

    Directory of Open Access Journals (Sweden)

    _ Sukamto

    2012-01-01

    Full Text Available Dalam penelitian ini, system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data Tujuan dari penelitian ini adalah menerapkan teknologi smart card sebagai sarana atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas yang tinggi, sehingga meningkatkan jaminan ketersediaan data pada sebuah sistem rekam medik.Tahapan pembuatan rancang bangun sistem rekam medis ini meliputi perancangan data flow diagram, rentity relationshipp diagram, database dan program aplikasi. Hasil dari penelitian ini menunjukan bahwa smart card dapat digunakan sebagai sarana atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas yang tinggi.

  3. SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

    Directory of Open Access Journals (Sweden)

    _ Sukamto

    2013-04-01

    Full Text Available Dalam penelitian ini,  system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data  Tujuan dari penelitian ini adalah  menerapkan teknologi smart card sebagai sarana  atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas  yang tinggi, sehingga meningkatkan jaminan ketersediaan data pada sebuah sistem rekam medik.Tahapan pembuatan rancang bangun sistem rekam medis ini meliputi  perancangan data flow diagram, rentity relationshipp diagram, database dan program aplikasi. Hasil dari penelitian ini menunjukan bahwa smart  card dapat digunakan  sebagai sarana  atau media penyimpan informasi pasien yang mempunyai kesederhana, keandalan, dan portabilitas  yang tinggi.

  4. Evaluation of an Electronic Smart-Card Based School Absenteeism Surveillance System

    OpenAIRE

    So, HC; Lam, CK; Tam, YH; Cowling, BJ; Leung, GM; Lau, EHY; Ip, DKM

    2014-01-01

    We evaluated the performance of an electronic smart-card based school absenteeism surveillance system which was initiated in 2008 in Hong Kong. The result demonstrated the feasibility and potential benefit of employing electronic school absenteeism data as captured automatically by a smart card system as an alternative data stream for monitoring influenza activities, and flexibility in establishing surveillance for emerging diseases. The increasing popularity of usage of smart card technology...

  5. Designing minimum data sets of health smart card system

    OpenAIRE

    Mohtaram Nematollahi

    2014-01-01

    Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s ...

  6. Supporting Software Evolution for Open Smart Cards by Security-by-Contract

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gadyatskya, Olga; Massacci, Fabio

    2011-01-01

    Open multi-application smart cards that allow post-issuance evolution (i.e. loading of new applets) are potentially very attractive for both smart card developers and card users. Yet we find only few of them on the market as no satisfactory solution exists for the assurance that these coming...

  7. The suggested system for health insurance Application based on Smart Cards

    OpenAIRE

    Esam Mohamed El Gohary; Mohamed El-Sayed Waheed

    2013-01-01

    This paper concentrates on designing a system for Health insurance using smart card technology .The system is called HISS (Health insurance system using smart card).As we will see the system is web based application based on central database ,uses smart card for two reasons first, as a data carrier for patient and professionals. Second reason is for authentication purposes. There are some figures that describe system architecture and processes then each component well be explained.

  8. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  9. UTILIZAÇÃO DE JAVA CARD COMO PLATAFORMA PARA O DESENVOLVIMENTO DE APLICAÇÕES EM SMART CARD.

    Directory of Open Access Journals (Sweden)

    Lucas Plis Dolce

    2011-12-01

    Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.

  10. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  11. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  12. Telematics and smart cards in integrated health information system.

    Science.gov (United States)

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole

  13. Using Formal Methods to Cultivate Trust in Smart Card Operating Systems

    NARCIS (Netherlands)

    Alberda, Marjan I.; Hartel, Pieter H.; de Jong, Eduard K.

    To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards contain relatively simple computers, and are used only for a specific class of applications, it is feasible to make the language used to program the software components focused and tiny. Formal

  14. 'Smart card' speeds triage, boosts safety.

    Science.gov (United States)

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.

  15. Adoption of smart cards in the medical sector: the Canadian experience.

    Science.gov (United States)

    Auber, B A; Hamel, G

    2001-10-01

    This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.

  16. Chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  17. An Improvement on Remote User Authentication Schemes Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2018-01-01

    Full Text Available In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.

  18. An advanced mutual-authentication algorithm using 3DES for smart card systems

    CSIR Research Space (South Africa)

    Tsague, HD

    2012-11-01

    Full Text Available One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core feature...

  19. Identification of Clusters in Travel Patterns using Smart Card Data

    DEFF Research Database (Denmark)

    Reinau, Kristian Hegner; Harder, Henrik

    2016-01-01

    This article is the first contribution, which explores the potential of smart card data in relation to optimization of public transport in a peripheral monocentric region. A modularity analysis is made using smart card data collected in Northern Jutland in Marts and July 2014, and the analysis...... reveals first, that smart card data can be used to identify clusters within flows of public transport passengers in a peripheral region. Second, that the presence of such clusters suggest that public transport should be planned to give the users the possibility of travelling with good connectivity...... and easiness within these clusters. Third, the presence of such clusters in peripheral areas of the monocentric region suggest, that the overall current focus in public transport planning on transport possibilities to and from the central city in monocentric regions is questionable....

  20. Sample Development on Java Smart-Card Electronic Wallet Application

    OpenAIRE

    Toma Cristian

    2009-01-01

    In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet ...

  1. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    Science.gov (United States)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  2. Clinical information system based on the medical smart card.

    Science.gov (United States)

    Danon, Y L; Saiag, E

    2000-07-01

    Over the last 5 years Israel has implemented a nationwide health insurance plan covering the entire population of the country. We have developed a clinical information system based on electronic-chip health care medical smart cards. Health care cards are used in several European countries and chip smart cards have been successful in many sectors. Our project involves the community use of the MSC, thereby enabling health care professionals to skillfully employ card systems in the health care sector. This system can easily arrange electronic medical charts in clinics, facilitating the confidential sharing of personal health databases among health professionals. To develop an MSC applicable for daily use in the community and hospital system. The MSC project, currently underway in Israel and the USA, will aid in determining the costs, benefits and feasibility of the MSC. Successful implementation of the MSC in chosen clinics will promote a nationwide willingness to adopt this promising technology.

  3. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  4. An Association Rule Based Method to Integrate Metro-Public Bicycle Smart Card Data for Trip Chain Analysis

    Directory of Open Access Journals (Sweden)

    De Zhao

    2018-01-01

    Full Text Available Smart card data provide valuable insights and massive samples for enhancing the understanding of transfer behavior between metro and public bicycle. However, smart cards for metro and public bicycle are often issued and managed by independent companies and this results in the same commuter having different identity tags in the metro and public bicycle smart card systems. The primary objective of this study is to develop a data fusion methodology for matching metro and public bicycle smart cards for the same commuter using historical smart card data. A novel method with association rules to match the data derived from the two systems is proposed and validation was performed. The results showed that our proposed method successfully matched 573 pairs of smart cards with an accuracy of 100%. We also validated the association rules method through visualization of individual metro and public bicycle trips. Based on the matched cards, interesting findings of metro-bicycle transfer have been derived, including the spatial pattern of the public bicycle as first/last mile solution as well as the duration of a metro trip chain.

  5. Managing medical and insurance information through a smart-card-based information system.

    Science.gov (United States)

    Lambrinoudakis, C; Gritzalis, S

    2000-08-01

    The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.

  6. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  7. Developing efficient blinded attribute certificates on smart cards via pairings

    NARCIS (Netherlands)

    Batina, L.; Hoepman, J.H.; Jacobs, B.; Mostowski, W.; Vullers, P.

    2010-01-01

    This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified

  8. Extended applications with smart cards for integration of health care and health insurance services.

    Science.gov (United States)

    Sucholotiuc, M; Stefan, L; Dobre, I; Teseleanu, M

    2000-01-01

    In 1999 in Romania has initiated the reformation of the national health care system based on health insurance. In 1998 we analyzed this system from the point of view of its IT support and we studied methods of optimisation with relational, distributed databases and new technologies such as Our objectives were to make a model of the information and services flow in a modern health insurance system, to study the smart card technology and to demonstrate how smart card can improve health care services. The paper presents only the smart cards implementations.

  9. Rancang Bangun Sistem Pilkades Menggunakan Teknologi Smart Card Sebagai Kartu Pemilih

    Directory of Open Access Journals (Sweden)

    I Putu Indra Permana

    2016-08-01

    Full Text Available Pemilihan Kepala Desa (Pilkades merupakan proses yang tidak terpisahkan dari Negara Indonesia sebagai negara demokrasi. Pilkades saat ini masih menggunakan sistem pemungutan suara (voting secara konvensional, menggunakan media kertas untuk melakukan proses pemilihan. Pelaksanaan sistem voting konvensional tersebut mempunyai banyak kelemahan seperti menghitung hasil voting relatif lebih lama dan menggunakan perhitungan manual. Perkembangan dan kemajuan teknologi informasi saat ini dapat dimanfaatkan untuk mendukung pelaksanaan voting Pilkades secara lebih baik yang menjadi solusi cerdas akan kemajuan teknologi yang dapat menggantikan sistem voting konvensional, yaitu dengan media sistem elektronik voting (e-voting menggunakan teknologi smart card sebagai kartu pemilih. Sistem dikemas dalam bentuk aplikasi yang dipasang/di-install pada komputer dan reader/writer tools sebagai media untuk membaca/menulis pada smart card. Sistem e-voting Pilkades dengan teknologi smart card telah berhasil dijalankan dan menghasilkan dashboard hasil voting Pilkades dengan menunjukkan jumlah voting dalam bentuk angka, persentase (%, grafik dan diagram.

  10. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  11. The impacts of smart cards on hospital information systems--an investigation of the first phase of the national health insurance smart card project in Taiwan.

    Science.gov (United States)

    Liu, Chien-Tsai; Yang, Pei-Tun; Yeh, Yu-Ting; Wang, Bin-Long

    2006-02-01

    To investigate the impacts of the first phase of Taiwan's Bureau of National Health Insurance (TBNHI) smart card project on existing hospital information systems. TBNHI has launched a nationwide project for replacement of its paper-based health insurance cards by smart cards (or NHI-IC cards) since November 1999. The NHI-IC cards have been used since 1 July 2003, and they have fully replaced the paper-based cards since 1 January 2004. Hospitals must support the cards in order to provide medical services for insured patients. We made a comprehensive study of the current phase of the NHI-IC card system, and conducted a questionnaire survey (from 1 October to 30 November, 2003) to investigate the impacts of NHI-IC cards on the existing hospital information systems. A questionnaire was distributed by mail to 479 hospitals, including 23 medical centers, 71 regional hospitals, and 355 district hospitals. The returned questionnaires were also collected by prepaid mail. The questionnaire return rates of the medical centers, regional hospitals and district hospitals were 39.1, 29.6 and 20.9%, respectively. In phase 1 of the project, the average number of card readers purchased per medical center, regional hospital, and district hospital were 202, 45 and 10, respectively. The average person-days for the enhancement of existing information systems of a medical center, regional hospital and district hospital were 175, 74 and 58, respectively. Three months after using the NHI-IC cards most hospitals (60.6%) experienced prolonged service time for their patients due to more interruptions caused mainly by: (1) impairment of the NHI-IC cards (31.2%), (2) failure in authentication of the SAMs (17.0%), (3) malfunction in card readers (15.3%) and (4) problems with interfaces between the card readers and hospital information systems (15.8%). The overall hospital satisfaction on the 5-point Likert scale was 2.86. Although most hospitals were OK with the project, there was about 22

  12. Health smart cards: differing perceptions of emergency department patients and staff.

    Science.gov (United States)

    Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

    2009-02-01

    An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.

  13. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  14. Smart Card Data Mining of Public Transport Destination: A Literature Review

    Directory of Open Access Journals (Sweden)

    Tian Li

    2018-01-01

    Full Text Available Smart card data is increasingly used to investigate passenger behavior and the demand characteristics of public transport. The destination estimation of public transport is one of the major concerns for the implementation of smart card data. In recent years, numerous studies concerning destination estimation have been carried out—most automatic fare collection (AFC systems only record boarding information but not passenger alighting information. This study provides a comprehensive review of the practice of using smart card data for destination estimation. The results show that the land use factor is not discussed in more than three quarters of papers and sensitivity analysis is not applied in two thirds of papers. In addition, the results are not validated in half the relevant studies. In the future, more research should be done to improve the current model, such as considering additional factors or making sensitivity analysis of parameters as well as validating the results with multi-source data and new methods.

  15. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  16. SMART INTERFACE: FERRAMENTA DE AUXÍLIO AO DESENVOLVIMENTO DE APLICAÇÕES JAVA CARD

    Directory of Open Access Journals (Sweden)

    Leonardo Ataíde Minora

    2008-05-01

    Full Text Available Com a evolução da tecnologia de microprocessadores, hoje é possível colocar um minúsculo chip em um cartão de plástico, nas dimensões de um cartão de crédito convencional. Chip este com capacidade de armazenamento de informação e processamento. Esse tipo de cartão é chamado de Smart Card. É possível desenvolver aplicações para esses cartões utilizando um subconjunto da plataforma Java – Java Card. O subconjunto da plataforma Java para o desenvolvimento de aplicações próprias para executar em Smart Cards é bastante limitado, em virtude das limitações do hardware envolvido. O desenvolvimento deste tipo de aplicação implica invariavelmente em se trabalhar no nível de bytes, pois toda a comunicação com o cartão acontece através de APDUs (Applicaion Protocol Data Unit montadas como uma sequência de bytes. Para auxiliar nesse trabalho, foi desenvolvido o SMART SHELL: ferramenta, modo texto, que interpreta comandos para a interação com a aplicação gerente do cartão – card manager. Os objetivos deste trabalho são: aperfeiçoar as funcionalidades do SMART SHELL e desenvolver uma interface gráfica para o mesmo, denominada de SMART INTERFACE. A aplicação em questão visa oferecer ao desenvolvedor de aplicações Java Card um mecanismo simples e ágil para a realização de atividades comuns de manipulação de um cartão, tais como: (1 realizar o processo de autenticação para operar com o card manager, (2 listar as aplicações – applets Java Card – instalados em um cartão, (3 preparar uma aplicação para ser instalada em um cartão, (4 instalação de uma aplicação no cartão, (5 remoção de uma aplicação instalada no cartão, entre outras. Para a realização do trabalho serão seguida a seguinte metodologia: levantamento bibliográfico sobre o tema; definição dos aperfeiçoamentos necessários ao SMART SHELL; implementação dos aperfeiçoamentos propostos; e implementação da interface gr

  17. A smart-card-enabled privacy preserving E-prescription system.

    Science.gov (United States)

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  18. Patient health record on a smart card.

    Science.gov (United States)

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  19. Using smart card technology to prevent sales of alcohol to underage persons

    Science.gov (United States)

    2001-07-01

    This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...

  20. Deriving Schedules for a Smart Card Personalisation System

    NARCIS (Netherlands)

    Mader, Angelika H.

    We report on an industrial case study on the synthesis of (close) optimal schedules for a smart card personalisation system. The basic technique used is model checking. In most cases, the pure model checking approach has to be enriched by other techniques to fight the state space explosion. Other

  1. Ridership impacts of South Florida's EASY smart card : [summary].

    Science.gov (United States)

    2013-07-01

    Transit agencies across the U.S. increasingly are replacing electronic fare reading systems with Advanced Fare Collection (AFC) or smart card systems. In 2009, Miami-Dade Transit (MDT) was the first Florida transit agency to deploy AFC, branded...

  2. Real Electronic Commerce: Smart Cards on the Superhighway.

    Science.gov (United States)

    Birch, David

    1997-01-01

    Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…

  3. A security review of proximity identification based smart cards

    CSIR Research Space (South Africa)

    Lefophane, S

    2015-03-01

    Full Text Available International Conference on Cyber warfare and Security, Mpumalanga, Kruger National Park, South Africa, 24-25 March 2015 A SECURITY REVIEW OF PROXIMITY IDENTIFICATION BASED SMART CARDS S.Lefophane, J. Van der Merwe Modelling and Digital Science: CSIR...

  4. Interoperable computerized smart card based system for health insurance and health services applied in cardiology.

    Science.gov (United States)

    Cocei, Horia-Delatebea; Stefan, Livia; Dobre, Ioana; Croitoriu, Mihai; Sinescu, Crina; Ovricenco, Eduard

    2002-01-01

    In 1999 Romania started its health care reform by promulgating the Health Insurance Law. A functional and efficient health care system needs procedures for monitoring and evaluation of the medical services, communication between different service providers and entities involved in the system, integration and availability of the information. The final goal is a good response to the needs and demands of the patients and of the real life. For this project we took into account, on one hand, the immediate need for computerized systems for the health care providers and, on the other hand, the large number of trials and experiments with health smart cards across Europe. Our project will implement a management system based on electronic patient records to be used in all cardiology clinics and will experiment the health smart cards, will promote and demonstrate the capabilities of the smart card technology. We focused our attention towards a specific and also critical category of patients, those with heart diseases, and also towards a critical sector of the health care system--the emergency care. The patient card was tested on a number of 150 patients at a cardiology clinic in Bucharest. This was the first trial of a health smart card in Romania.

  5. The Internet and healthcare in Taiwan: value-added applications on the medical network in the National Health Insurance smart card system.

    Science.gov (United States)

    Tsai, Wen-Hsien; Kuo, Hsiao-Chiao

    2007-01-01

    The introduction of smart card technology has ushered in a new era of electronic medical information systems. Taiwan's Bureau of National Health Insurance (BNHI) implemented the National Health Insurance (NHI) smart card project in 2004. The purpose of the project was to replace all paper cards with one smart card. The NHI medical network now provides three kinds of services. In this paper, we illustrate the status of the NHI smart card system in Taiwan and propose three kinds of value-added applications for the medical network, which are electronic exchange of medical information, retrieval of personal medical records and medical e-learning for future development of health information systems.

  6. Can a patient smart card improve decision making in a clinical setting?.

    Science.gov (United States)

    Bérubé, J; Papillon, M J; Lavoie, G; Durant, P; Fortin, J P

    1995-01-01

    In the health field, clinical information is the raw material for the clinician delivering health services. Therefore, the clinical information available to the physician is often incomplete or even non¿existent upon consultation. Furthermore, the reconstruction of the medical history, which is the most important source of data for the clinician to establish a diagnosis and initiate a treatment, suffers from many constraints. The smart card, like the one used in Quebec's project, could ease the physician's decision-making by allowing fast access to accurate and pertinent data. The smart card is a major asset in the present health system.

  7. Constructing activity–mobility trajectories of college students based on smart card transaction data

    Directory of Open Access Journals (Sweden)

    Negin Ebadi

    2017-12-01

    Full Text Available In this research, we use UB card as a convenient source of combined smart transaction data in order to define a campus-wide model for constructing students’ activity–mobility trajectories in time–space dimension. UB Card is a student’s official ID at the University at Buffalo and is used across campus for various activities including Stampedes and Shuttles (on-campus bus system, facilities access, library services, dining, shopping, and etc. Two activity–mobility trajectory construction algorithms are developed. The base algorithm constructs students’ activity–mobility patterns in space–time dimension using a set of smart card transaction data points as the only inputs. The modified individualized algorithm constructs activity–mobility patterns with prior knowledge of students’ previous patterns as they have similar patterns for certain days of the week. A database of 37 students’ travel survey and UB card transactions that contains a period of 5 days have been used to illustrate the results of the study. Three measures of errors have been proposed to capture the time allocation, location deviation, and activity sequences. These errors present an acceptable accuracy (12–25% error ranges for activity types and average 0.04–0.16 miles of error for location predictions and show the potential of inferring activity–mobility behaviors based on smart card transaction type data sets.

  8. Deduction of passengers' route choices from smart card data

    NARCIS (Netherlands)

    van der Hurk, E.; Kroon, L.G.; Maroti, G.; Vervest, P.

    2015-01-01

    Deducing passengers' route choices from smart card data provides public transport operators the opportunity to evaluate and improve their passenger service. Particularly in the case of disruptions, when traditional route choice models may not be valid, this is an advantage. This paper proposes a

  9. Deduction of passengers' route choice from smart card data

    NARCIS (Netherlands)

    Van Der Hurk, Evelien; Kroon, Leo; Maroti, Gabor; Vervest, Peter

    2013-01-01

    Deducing passengers' route choice from smart card data provides public transport operators the opportunity to evaluate passenger service. Especially in case of disruptions when route choice models may not be valid this is an advantage. This paper proposes a method for deducing the chosen route of

  10. A Proposed Solution for Managing Doctor's Smart Cards in Hospitals Using a Single Sign-On Central Architecture

    OpenAIRE

    Mauro, Christian;Sunyaev, Ali;Leimeister, Jan Marco;Schweiger, Andreas;Krcmar, Helmut

    2014-01-01

    This paper describes a single sign-on solution for the central management of health care provider?s smart cards in hospitals. The proposed approach which is expected to be an improvement over current methods is made possible through the introduction of a national healthcare telematics infrastructure in Germany where every physician and every patient will automatically be given an electronic health smart card (for patients) and a corresponding health professional card (for health care provider...

  11. CQL: a database in smart card for health care applications.

    Science.gov (United States)

    Paradinas, P C; Dufresnes, E; Vandewalle, J J

    1995-01-01

    The CQL-Card is the first smart card in the world to use Database Management Systems (DBMS) concepts. The CQL-Card is particularly suited to a portable file in health applications where the information is required by many different partners, such as health insurance organizations, emergency services, and General Practitioners. All the information required by these different partners can be shared with independent security mechanisms. Database engine functions are carried out by the card, which manages tables, views, and dictionaries. Medical Information is stored in tables and views are logical and dynamic subsets of tables. For owner-partners like MIS (Medical Information System), it is possible to grant privileges (select, insert, update, and delete on table or view) to other partners. Furthermore, dictionaries are structures that contain requested descriptions and which allow adaptation to computer environments. Health information held in the CQL-Card is accessed using CQL (Card Query Language), a high level database query language which is a subset of the standard SQL (Structured Query Language). With this language, CQL-Card can be easily integrated into Medical Information Systems.

  12. Proposing a Model for Patient Admission and NFC Mobile Payment by Biometric Identification and Smart Health Card

    Directory of Open Access Journals (Sweden)

    Mahdi Barkhordari Firouzabadi

    2016-02-01

    Full Text Available Abstract Following the advances in mobile communication and information technology, smart phones have been used in a wide variety of commercial, social, entertainment, file sharing and health transactions and applications. The current procedures in healthcare environment for patient registration, appointment scheduling and payment are time consuming and somehow tiresome. Traditionally, patients were supposed to fill out registration forms, wait for being called, and finally stand in long lines for payment procedures. In some places, appointment could be done online via web but still the patient has to walk in with appointment card and in our case, provide the insurance booklet to the front desk personnel to pay for services and receive discounts for insurance. Therefore, the present study intended to propose a model using Near Field Communication-enabled mobile application for a medical clinic which currently offers online and call services for making an appointment, though patient waiting time is still too much in the current process of payment for services.

  13. SC2: Secure Communication over Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Papini, Davide

    2012-01-01

    The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the c...

  14. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  15. Slovene smart card and IP based health-care information system infrastructure.

    Science.gov (United States)

    Trcek, D; Novak, R; Kandus, G; Suselj, M

    2001-04-01

    Slovenia initiated a nation-wide project to introduce smart cards in the health sector in 1995 and its full-scale deployment started in September 2000. Although the basic aim of the project was to support insurance related procedures, the system was designed in a flexible and open manner to present an infrastructure for the whole health sector. The functionality of the current system is described in this paper along with lessons learned so far. The upgrade of the system is outlined, with emphasis on technical details, the objective being to provide a real-time EDI based environment for a general set of applications in the medical sector, supported by the flexibility and security of modern smart card technologies. Integration with similar systems in other EU countries is discussed.

  16. Pressure Sequence - A Novel Method of Protecting Smart Cards

    NARCIS (Netherlands)

    Hartel, Pieter H.; Henderson, N.J.; Domingo-Ferrer, J; Chan, D.; Watson, A.

    If someone knocks on your door, the chances are that you can tell by the sound who it is. This simple idea is the basis of our pressure sequence method, which records the signal arising from a user tapping on a smart card. We have built a prototype, piezoelectric, screen printed pressure sensor on a

  17. Aplikasi Pembayaran Jalan Tol Dengan Smart Card Menggunakan Algoritma Enkripsi Idea Dan 3Des: Studi Kasus Pada PT.Citra Marga Nusaphala Persada

    OpenAIRE

    Elidjen, Elidjen; Budianto, Hendy; Yohanes, Lilyawati; Nugroho, Novianto Wibowo

    2004-01-01

    Salah satu USAha pemerintah untuk mengatasi kemacetan adalah dengan membuatjalan tol, namun cara ini kurang efektif karena kemacetan masih terjadi akibat antrian yangpanjang pada gerbang tol. Oleh sebab itu, penulis berusaha mencari solusi untuk membuatsistem baru yaitu dengan penggunaan smart card. Penggunaan smart card yang memilikitingkat integritas, reliabilitas, dan keamanan yang tinggi diharapkan dapat dijadikan solusiuntuk memecahkan semua masalah tersebut. Dalam penggunaan smart card ...

  18. Aplikasi Pembayaran Jalan Tol dengan Smart Card Menggunakan Algoritma Enkripsi Idea dan 3Des: Studi Kasus pada PT.Citra Marga Nusaphala Persada

    OpenAIRE

    Elidjen, Elidjen; Budianto, Hendy; Yohanes, Lilyawati; Nugroho, Novianto Wibowo

    2009-01-01

    Salah satu usaha pemerintah untuk mengatasi kemacetan adalah dengan membuatjalan tol, namun cara ini kurang efektif karena kemacetan masih terjadi akibat antrian yangpanjang pada gerbang tol. Oleh sebab itu, penulis berusaha mencari solusi untuk membuatsistem baru yaitu dengan penggunaan smart card. Penggunaan smart card yang memilikitingkat integritas, reliabilitas, dan keamanan yang tinggi diharapkan dapat dijadikan solusiuntuk memecahkan semua masalah tersebut. Dalam penggunaan smart card ...

  19. Applying Formal Methods to the Design of Smart Card Software

    NARCIS (Netherlands)

    Butler, Michael; Hartel, Pieter H.; Longley, Mark; de Jong, Eduard

    1997-01-01

    The goal of this work is the design of a language for the implementation of smart card applications, specifically an operating system, as high integrity software. The integrity of a piece of software is demonstrated by proving various properties of the software. The language must therefore exclude

  20. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  1. Comparison of the performance and security of free and open source smart card offcard APIs

    CSIR Research Space (South Africa)

    Chifura, A

    2008-09-01

    Full Text Available . Off card APIs provide a framework for this by providing interfaces that can be implemented to enhance the communication. This study looks at the performance and security comparisons of several free and open source smart card offcard APIs...

  2. A microprocessor card software server to support the Quebec health microprocessor card project.

    Science.gov (United States)

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  3. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  4. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  5. Does Environmental Sustainability Play a Role in the Adoption of Smart Card Technology at Universities in Taiwan: An Integration of TAM and TRA

    Directory of Open Access Journals (Sweden)

    Ching-Wei Ho

    2015-08-01

    Full Text Available Smart cards are able to store and protect relatively large amounts of data. When applied in universities, they can act as multi-purpose, multi-function and smart ID cards. This would avoid the waste of resources and maintain environmental sustainability. This study proposes a model that integrates Technology Acceptance Model and Theory of Reasoned Action into a framework incorporating the notion of environmental concern in order to explore the factors that affect students’ behavioral intention to use University Smart Cards. This study employs a quantitative method for primary data collection via a structured questionnaire for university students. The findings indicated that the perceived usefulness and subjective norm of university smart card systems have the most significant predictive power on potential users’ attitudes and intentions of adopting the card.

  6. Authentications of Myanmar National Registration Card

    Directory of Open Access Journals (Sweden)

    Myint Myint Sein

    2013-04-01

    Full Text Available The automatic identification system of Myanmar national registration card (NRC holder is presented in this paper. The proposed system can be handled the identification by the extracted low quality face image and fingerprint image from Myanmar NRC. Both of the facial recognition and fingerprint recognition system are developed for Myanmar citizenship confirmation. Age invariant face recognition algorithm is performed based on combination of DiaPCA (Diagonal principal Component Analysis and KNN (Kth nearest neighbor classifier approaches. An algorithm of the fingerprint recognition is proposed for recognition of the poor quality fingerprint image with fabric background.  Several experiments have been done for confirming the effectiveness of the proposed approach.

  7. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  8. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  9. Towards second-generation smart card-based authentication in health information systems: the secure server model.

    Science.gov (United States)

    Hallberg, J; Hallberg, N; Timpka, T

    2001-01-01

    Conventional smart card-based authentication systems used in health care alleviate some of the security issues in user and system authentication. Existing models still do not cover all security aspects. To enable new protective measures to be developed, an extended model of the authentication process is presented. This model includes a new entity referred to as secure server. Assuming a secure server, a method where the smart card is aware of the status of the terminal integrity verification becomes feasible. The card can then act upon this knowledge and restrict the exposure of sensitive information to the terminal as required in order to minimize the risks. The secure server model can be used to illuminate the weaknesses of current approaches and the need for extensions which alleviate the resulting risks.

  10. Factoring RSA keys from certified smart cards : Coppersmith in the wild

    NARCIS (Netherlands)

    Bernstein, D.J.; Chang, Y.A.; Cheng, C.M.; Chou, L.P.; Heninger, N.; Lange, T.; Someren, van N.

    2013-01-01

    An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by government-issued smart cards that were certified secure. The certificates had all the usual buzzwords:

  11. DIABCARD a smart card for patients with chronic diseases.

    Science.gov (United States)

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  12. A study of smart card for radiation exposure history of patient.

    Science.gov (United States)

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  13. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  14. Patient exposure tracking: the IAEA smart card project.

    Science.gov (United States)

    Rehani, Madan M; Frush, Donald P

    2011-09-01

    The existing approach of radiation protection is largely based on the collective dose to the population with provisions for protection at an individual level through justification and optimisation. With the individual patient dose now exceeding the life-long occupational dose to a worker in a typical radiology practice, there is a need to establish approaches based on the protection of an individual patient. Radiation exposure tracking seems a way forward in this respect. Technological advances in recent years have provided opportunities for tracking to becoming a reality. The IAEA project on Smart Card/SmartRadTrack is described in this paper. The tracking is now a reality in a few dozen centres in many countries connected by picture archiving and communication systems, and there is hope that this will extend to cover other countries and continents.

  15. Patient exposure tracking: The IAEA smart card project

    International Nuclear Information System (INIS)

    Rehani, M. M.; Frush, D. P.

    2011-01-01

    The existing approach of radiation protection is largely based on the collective dose to the population with provisions for protection at an individual level through justification and optimisation. With the individual patient dose now exceeding the life-long occupational dose to a worker in a typical radiology practice, there is a need to establish approaches based on the protection of an individual patient. Radiation exposure tracking seems a way forward in this respect. Technological advances in recent years have provided opportunities for tracking to becoming a reality. The IAEA project on Smart Card/SmartRadTrack is described in this paper. The tracking is now a reality in a few dozen centres in many countries connected by picture archiving and communication systems, and there is hope that this will extend to cover other countries and continents. (authors)

  16. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  17. Using smart card technology to monitor the eating habits of children in a school cafeteria: 1. Developing and validating the methodology.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.

  18. The effect of Health smart cards for Quality Health care services ( doctor martyr Beheshti medical research center in Qom

    Directory of Open Access Journals (Sweden)

    Saeed zarandi

    2016-03-01

    Full Text Available The main objective of this study was to investigate the effect of the use health smart card on the aspects quality of healthcare services in doctor martyr beheshti medical research center in qom . With regard to the measures taken in the context of the establishment of this card in Qom and the lack of previous experience in this province, one of the concerns of the authorities to investigate the performance and capabilities of the card and its effects on the quality of health services is affecting the present study is to respond to this concerns. This research method is descriptive and applied to the target population of physicians, nurses and medical record experts employed at the Medical Center have formed a martyr Beheshti Qom due to more awareness cognitive advantages associated with its use of smart cards have given. The population is equal to the number of 444 and 124 questionnaire for data analysis is used. The sampling method used in this research was stratified random sampling conducted in the respective classes. Spss software for data analysis & exploratory factor analysis & confirmed, Kolmogorov-Smirnov Test, Wilcoxon Test & matrix of factors were used. The analysis results showed that Health Smart Cards for quality of health care services positive and significant effects on Dimension quality of the reliability & Tangibles . Analysis of demographic variables that influence opinions about the quality of health care Health Smart Cards significantly related to gender and education level, and also no experience discussed the variables significantly associated with age.

  19. Short-Term Prediction of Ridership on Public Transport with Smart Card Data

    NARCIS (Netherlands)

    van Oort, N.; Brands, Ties; de Romph, E.

    2015-01-01

    Public transport operators are collecting massive amounts of data from smart card systems. In the Netherlands, every passenger checks in and checks out; this system creates detailed records of demand patterns. In buses and trams, users check in and check out in the vehicle; this factor provides good

  20. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity.../or characteristics of some thing ? This thing can be anything, however in the context of this discussion, this thing could be a person, a network device, or even an identity authentication device itself ? This act or process of verifying these attributes could...

  1. Crowding Valuation in Urban Tram and Bus Transportation based on Smart Card Data

    NARCIS (Netherlands)

    Yap, M.D.; Cats, O.; Yu, S; van Arem, B.

    2017-01-01

    Crowding in public transport can be of major influence on passengers’ travel experience and therefore affect route and mode choice. Therefore, it is important to understand how crowding in urban public transport is perceived by passengers. The availability of individual smart card transactions

  2. Relationship between Spatio-Temporal Travel Patterns Derived from Smart-Card Data and Local Environmental Characteristics of Seoul, Korea

    Directory of Open Access Journals (Sweden)

    Mi-Kyeong Kim

    2018-03-01

    Full Text Available With the incorporation of an automated fare-collection system into the management of public transportation, not only can the quality of transportation services be improved but also that of the data collected from users when coupled with smart-card technology. The data collected from smart cards provide opportunities for researchers to analyze big data sets and draw meaningful information out of them. This study aims to identify the relationship between travel patterns derived from smart-card data and urban characteristics. Using seven-day transit smart-card data from the public-transportation system in Seoul, the capital city of the Republic of Korea, we investigated the temporal and spatial boarding and alighting patterns of the users. The major travel patterns, classified into five clusters, were identified by utilizing the K-Spectral Centroid clustering method. We found that the temporal pattern of urban mobility reflects daily activities in the urban area and that the spatial pattern of the five clusters classified by travel patterns was closely related to urban structure and urban function; that is, local environmental characteristics extracted from land-use and census data. This study confirmed that the travel patterns at the citywide level can be used to understand the dynamics of the urban population and the urban spatial structure. We believe that this study will provide valuable information about general patterns, which represent the possibility of finding travel patterns from individuals and urban spatial traits.

  3. An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

    OpenAIRE

    Pathan, Al-Sakib Khan; Hong, Choong Seon

    2007-01-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...

  4. Demonstration of holographic smart card system using the optical memory technology

    Science.gov (United States)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  5. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  6. The Danish Rejsekortet (Smart Card for Public Transportation); Project Governance for Failure or Success?

    DEFF Research Database (Denmark)

    Harboe, Peter Georg; Riis, Eva

    The authors examine a project regarded as a major failure in Danish public investments: The Smart Card for Public Transportation whose introduction was delayed for 9 years with an estimated cost overrun of 125 million EURO. After 3 years of operation, the Smart Card system only covers seven...... of the nine Danish regions and the discussion about giving up the system is continuing. The authors explore the overall conditions set up for these types of projects in the project governance - how project governance conditions a major public IT project and forms the success evaluation. The focus...... is on the whole cycle from project initiation to long-term use of the project results. Data collection is through documentation as governmental reports and evaluations, for example (Rigsrevisionen, 2011; The Comptroller and Auditor General, 2006; Transport Committee, 2011)and semi-structured interviews...

  7. The Danish Rejsekortet ( Smart Card for Public Transportation ): Project Governance for Failure or Success ?

    DEFF Research Database (Denmark)

    Harboe, Peter Georg; Riis, Eva

    The authors examine a project regarded as a major failure in Danish public investments: The Smart Card for Public Transportation whose introduction was delayed for 9 years with an estimated cost overrun of 125 million EURO. After 3 years of operation, the Smart Card system only covers seven...... of the nine Danish regions and the discussion about giving up the system is continuing. The authors explore the overall conditions set up for these types of projects in the project governance - how project governance conditions a major public IT project and forms the success evaluation. The focus...... is on the whole cycle from project initiation to long-term use of the project results. Data collection is through documentation as governmental reports and evaluations, for example (Rigsrevisionen, 2011; The Comptroller and Auditor General, 2006; Transport Committee, 2011)and semi-structured interviews...

  8. Security Analysis of a Remote User Authentication Scheme with Smart Cards

    OpenAIRE

    Kumar, Manoj

    2007-01-01

    Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen scheme. This paper reviews Yoon et al. scheme and then proves that the password change phase of Yoon et al. scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.

  9. Fingerprint match-on-card: review and outlook

    CSIR Research Space (South Africa)

    Shabalala, MB

    2015-03-01

    Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...

  10. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  11. A Proposed Smart-Card Solution for Australian Health Services: The Problems Encountered

    OpenAIRE

    Danielle Fowler; Paul Swatman; Tanya Castleman

    2004-01-01

    This case study describes the experience of a state government health department in evaluating the use of smart card technology to redesign health benefits programs for the disabled in Australia. The social and political context of the system is explained in detail, and the potential benefits and risks accruing to the government, health care intermediaries and the community are examined.

  12. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    Science.gov (United States)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  13. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  14. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  15. Protecting Digital Evidence Integrity by Using Smart Cards

    Science.gov (United States)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  16. Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports

    Directory of Open Access Journals (Sweden)

    RIAD, R.

    2016-11-01

    Full Text Available Security checking can be improved by watermarking identity (ID images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter. Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user.

  17. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  18. 32 CFR 1615.1 - Registration.

    Science.gov (United States)

    2010-07-01

    ... registration card or other method of registration prescribed by the Director of Selective Service by a person... the records (master computer file) of the Selective Service System. Registration is completed when... Director include completing a Selective Service Registration Card at a classified Post Office, registration...

  19. 77 FR 65166 - Information Collection; Request for Comment; Visitor Permit and Visitor Registration Card

    Science.gov (United States)

    2012-10-25

    ..., number of dogs and number of pack and saddle stock (that is, the number of animals either carrying people... dogs, number of pack and saddle stock (that is, the number of animals either carrying people or their... people. The information collected from the Visitor's Permit (FS-2300-30) and Visitor Registration Card...

  20. Spatial-Temporal Similarity Correlation between Public Transit Passengers Using Smart Card Data

    Directory of Open Access Journals (Sweden)

    Hamed Faroqi

    2017-01-01

    Full Text Available The increasing availability of public transit smart card data has enabled several studies to focus on identifying passengers with similar spatial and/or temporal trip characteristics. However, this paper goes one step further by investigating the relationship between passengers’ spatial and temporal characteristics. For the first time, this paper investigates the correlation of the spatial similarity with the temporal similarity between public transit passengers by developing spatial similarity and temporal similarity measures for the public transit network with a novel passenger-based perspective. The perspective considers the passengers as agents who can make multiple trips in the network. The spatial similarity measure takes into account direction as well as the distance between the trips of the passengers. The temporal similarity measure considers both the boarding and alighting time in a continuous linear space. The spatial-temporal similarity correlation between passengers is analysed using histograms, Pearson correlation coefficients, and hexagonal binning. Also, relations between the spatial and temporal similarity values with the trip time and length are examined. The proposed methodology is implemented for four-day smart card data including 80,000 passengers in Brisbane, Australia. The results show a nonlinear spatial-temporal similarity correlation among the passengers.

  1. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zhang

    2015-01-01

    Full Text Available Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.

  2. JPEG2000 vs. full frame wavelet packet compression for smart card medical records.

    Science.gov (United States)

    Leehan, Joaquín Azpirox; Lerallut, Jean-Francois

    2006-01-01

    This paper describes a comparison among different compression methods to be used in the context of electronic health records in the newer version of "smart cards". The JPEG2000 standard is compared to a full-frame wavelet packet compression method at high (33:1 and 50:1) compression rates. Results show that the full-frame method outperforms the JPEG2K standard qualitatively and quantitatively.

  3. SAE for the prediction of road traffic status from taxicab operating data and bus smart card data

    Science.gov (United States)

    Zhengfeng, Huang; Pengjun, Zheng; Wenjun, Xu; Gang, Ren

    Road traffic status is significant for trip decision and traffic management, and thus should be predicted accurately. A contribution is that we consider multi-modal data for traffic status prediction than only using single source data. With the substantial data from Ningbo Passenger Transport Management Sector (NPTMS), we wished to determine whether it was possible to develop Stacked Autoencoders (SAEs) for accurately predicting road traffic status from taxicab operating data and bus smart card data. We show that SAE performed better than linear regression model and Back Propagation (BP) neural network for determining the relationship between road traffic status and those factors. In a 26-month data experiment using SAE, we show that it is possible to develop highly accurate predictions (91% test accuracy) of road traffic status from daily taxicab operating data and bus smart card data.

  4. Electronic Tickets, Smart Cards, and Online Prepayments: When and How to Advance Sell

    OpenAIRE

    Jinhong Xie; Steven M. Shugan

    2001-01-01

    Advance selling occurs when sellers allow buyers to purchase at a time preceding consumption (Shugan and Xie 2000). Electronic tickets, smart cards, online prepayments, and other technological advances make advance selling possible for many, if not all, service providers. These technologies lower the cost of making complex transactions at a greater distance from the seller's site. They also give sellers more control over advance selling by decreasing arbitrage. As technology enhances the capa...

  5. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  6. The Internet- and Digital Signature-Based Prescription Order Communication System Using Synchronized Smart Cards in the 2-Way Type Terminal

    National Research Council Canada - National Science Library

    Song, Won

    2001-01-01

    ...) based on the Internet between the hospital and the pharmacy, on the public-key infrastructure, and on the concurrently parallel co-operation with both medical professional's and patient's smart cards...

  7. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  8. Flow Orientation Analysis for Major Activity Regions Based on Smart Card Transit Data

    Directory of Open Access Journals (Sweden)

    Parul Singh

    2017-10-01

    Full Text Available Analyzing public movement in transportation networks in a city is significant in understanding the life of citizen and making improved city plans for the future. This study focuses on investigating the flow orientation of major activity regions based on smart card transit data. The flow orientation based on the real movements such as transit data can provide the easiest way of understanding public movement in the complicated transportation networks. First, high inflow regions (HIRs are identified from transit data for morning and evening peak hours. The morning and evening HIRs are used to represent major activity regions for major daytime activities and residential areas, respectively. Second, the directional orientation of flow is then derived through the directional inflow vectors of the HIRs to show the bias in directional orientation and compare flow orientation among major activity regions. Finally, clustering analysis for HIRs is applied to capture the main patterns of flow orientations in the city and visualize the patterns on the map. The proposed methodology was illustrated with smart card transit data of bus and subway transportation networks in Seoul, Korea. Some remarkable patterns in the distribution of movements and orientations were found inside the city. The proposed methodology is useful since it unfolds the complexity and makes it easy to understand the main movement patterns in terms of flow orientation.

  9. Using metro smart card data to model location choice of after-work activities : an application to Shanghai

    NARCIS (Netherlands)

    Wang, Y.; Homem de Almeida Correia, G.; de Romph, E.; Timmermans, H.J.P.

    2017-01-01

    A location choice model explains how travellers choose their trip destinations especially for those activities which are flexible in space and time. The model is usually estimated using travel survey data; however, little is known about how to use smart card data (SCD) for this purpose in a public

  10. Using metro smart card data to model location choice of after-work activities: An application to Shanghai

    NARCIS (Netherlands)

    Wang, Y.; Correia, G.H.D.A.; Romph, E. de; Timmermans, H.J.P.H.

    2017-01-01

    A location choice model explains how travellers choose their trip destinations especially for those activities which are flexible in space and time. The model is usually estimated using travel survey data; however, little is known about how to use smart card data (SCD) for this purpose in a public

  11. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Science.gov (United States)

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  12. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2014-01-01

    Full Text Available In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  13. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  14. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  15. The application of Hough transform-based fingerprint alignment on match-on-card

    CSIR Research Space (South Africa)

    Mlambo, S

    2015-03-01

    Full Text Available of these cards, has led to the need for further improvements on smart cards combined with fingerprint biometrics. Due to the insufficient memory space and few instruction sets in Java smart cards, developers and programmers are faced with implementing efficient...

  16. Comparison of the Effects of SMART Board Technology and Flash Card Instruction on Sight Word Recognition and Observational Learning

    Science.gov (United States)

    Mechling, Linda C.; Gast, David L.; Thompson, Kimberly L.

    2009-01-01

    This study compared the effectiveness of SMART Board, interactive whiteboard technology and traditional flash cards in teaching reading in a small-group instructional arrangement. Three students with moderate intellectual disabilities were taught to read grocery store aisle marker words under each condition. Observational learning (students…

  17. [Smart card systems in health care (protection, key-functions, divided data bases, applications)].

    Science.gov (United States)

    Simon, P

    1999-04-25

    Barely more than 15 years have passed since electronic memory cards appeared, their popularity has grown rapidly (first of all as a cash-saving device and later for other purposes, as well). This is due also to the growing interest towards development of the intelligence of information systems for the follow-up of patients' health condition and medical care in countries with a highly developed health and insurance system (need for the creation of data bases divided for individuals) and also to their commitment towards a better control of the quality and costs of health care. We can come to the conclusion that the aim of research, development and the creation of systems in health informatics is to prevent illness and to give a direct informatic support to medical and nursing activity carried out in the patients' interests. The smart card and the surrounding application systems are certainly the appropriate means for the achievement of these aims.

  18. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  19. Registration Service

    CERN Multimedia

    GS Department

    2010-01-01

    Following a reorganization in Building 55, please note that the Registration Service is now organised as follows :  Ground floor: access cards (76903). 1st floor : registration of external firms’ personnel (76611 / 76622); car access stickers (76633); biometric registration (79710). Opening hours: 07-30 to 16-00 non-stop. GS-SEM Group General Infrastructure Services Department

  20. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  1. PENGEMBANGAN MODEL MEDIA SMART CARD UNTUK PEMBELAJARAN BOLA BASKET PADA SISWA KELAS IV SDIT PERMATA HATI KECAMATAN MADUKARA KABUPATEN BANJARNEGARA TAHUN 2014

    Directory of Open Access Journals (Sweden)

    Nur’aeni Linda Pratiwi

    2016-02-01

    Full Text Available The purpose of this study is to find out the development product of Smart Card media for basketball learning to the four grade of SDIT Permata Hati Kecamatan Madukara Kabupaten. The study is a research and development. There are procedures of the product development based on this research, they are: (1 Analyse the product of the result of information collected, including field observation and theoritical review, (2 develop the form of the first product ( in form of basketball Smart Card media, (3 expert validation test that is an expert of basketball and an expert of physical learning and try out 1, (4 revision of the first product. This revision is used for an improvement toward the first product that is resulted by the researcher, (5 try out II, (6 revision of the last product that is done according to the result of the field try out, (7 the final result of the model of Smart Card media for basketball learning for the four grade of SDIT Permata Hati.The result of this research in try out I is resulted 85,3% that is categorized as good, and the result of the try out II is resulted 87,7% that is categorized as good, because the students are able to do those three aspects so it is acceptable to be used. So, it can be concluded that there is a difference between try out I and try out II that is 2,44%.

  2. Semantic Registration and Discovery System of Subsystems and Services within an Interoperable Coordination Platform in Smart Cities.

    Science.gov (United States)

    Rubio, Gregorio; Martínez, José Fernán; Gómez, David; Li, Xin

    2016-06-24

    Smart subsystems like traffic, Smart Homes, the Smart Grid, outdoor lighting, etc. are built in many urban areas, each with a set of services that are offered to citizens. These subsystems are managed by self-contained embedded systems. However, coordination and cooperation between them are scarce. An integration of these systems which truly represents a "system of systems" could introduce more benefits, such as allowing the development of new applications and collective optimization. The integration should allow maximum reusability of available services provided by entities (e.g., sensors or Wireless Sensor Networks). Thus, it is of major importance to facilitate the discovery and registration of available services and subsystems in an integrated way. Therefore, an ontology-based and automatic system for subsystem and service registration and discovery is presented. Using this proposed system, heterogeneous subsystems and services could be registered and discovered in a dynamic manner with additional semantic annotations. In this way, users are able to build customized applications across different subsystems by using available services. The proposed system has been fully implemented and a case study is presented to show the usefulness of the proposed method.

  3. Semantic Registration and Discovery System of Subsystems and Services within an Interoperable Coordination Platform in Smart Cities

    Directory of Open Access Journals (Sweden)

    Gregorio Rubio

    2016-06-01

    Full Text Available Smart subsystems like traffic, Smart Homes, the Smart Grid, outdoor lighting, etc. are built in many urban areas, each with a set of services that are offered to citizens. These subsystems are managed by self-contained embedded systems. However, coordination and cooperation between them are scarce. An integration of these systems which truly represents a “system of systems” could introduce more benefits, such as allowing the development of new applications and collective optimization. The integration should allow maximum reusability of available services provided by entities (e.g., sensors or Wireless Sensor Networks. Thus, it is of major importance to facilitate the discovery and registration of available services and subsystems in an integrated way. Therefore, an ontology-based and automatic system for subsystem and service registration and discovery is presented. Using this proposed system, heterogeneous subsystems and services could be registered and discovered in a dynamic manner with additional semantic annotations. In this way, users are able to build customized applications across different subsystems by using available services. The proposed system has been fully implemented and a case study is presented to show the usefulness of the proposed method.

  4. Semantic Registration and Discovery System of Subsystems and Services within an Interoperable Coordination Platform in Smart Cities

    Science.gov (United States)

    Rubio, Gregorio; Martínez, José Fernán; Gómez, David; Li, Xin

    2016-01-01

    Smart subsystems like traffic, Smart Homes, the Smart Grid, outdoor lighting, etc. are built in many urban areas, each with a set of services that are offered to citizens. These subsystems are managed by self-contained embedded systems. However, coordination and cooperation between them are scarce. An integration of these systems which truly represents a “system of systems” could introduce more benefits, such as allowing the development of new applications and collective optimization. The integration should allow maximum reusability of available services provided by entities (e.g., sensors or Wireless Sensor Networks). Thus, it is of major importance to facilitate the discovery and registration of available services and subsystems in an integrated way. Therefore, an ontology-based and automatic system for subsystem and service registration and discovery is presented. Using this proposed system, heterogeneous subsystems and services could be registered and discovered in a dynamic manner with additional semantic annotations. In this way, users are able to build customized applications across different subsystems by using available services. The proposed system has been fully implemented and a case study is presented to show the usefulness of the proposed method. PMID:27347965

  5. A smart city application: a fully controlled street lighting isle based on Raspberry-Pi card, a ZigBee sensor network and WiMAX.

    Science.gov (United States)

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-12-18

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  6. A Smart City Application: A Fully Controlled Street Lighting Isle Based on Raspberry-Pi Card, a ZigBee Sensor Network and WiMAX

    Directory of Open Access Journals (Sweden)

    Fabio Leccese

    2014-12-01

    Full Text Available A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  7. Improving computer security by health smart card.

    Science.gov (United States)

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  8. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment.

    Science.gov (United States)

    Ip, Dennis Km; Lau, Eric Hy; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-10-06

    School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card-based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card-based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. We designed and implemented an ILI surveillance system utilizing smart card-based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. We designed and implemented a novel

  9. The purchase of natural gas using a smart card. Energy company and customer sometimes better off with prepayment

    International Nuclear Information System (INIS)

    Meijerink, R.; Meyer, G.E.

    1997-01-01

    In particular in an open market prepayment systems offer advantages for small-scale and large-scale consumers and energy utilities. The use of prepayment systems makes invoices superfluous and defaulters do not have to disconnected. By means of a smart card it is simple to register who made the purchase and to whom gas is supplied. The Dutch natural gas research institute Gastec plans a project to test the safety of prepayment systems

  10. Information from the Registration Service

    CERN Multimedia

    GS Department

    2011-01-01

    Please note that the Registration Service (Bldg 55-1st floor) will be exceptionally open during the annual end of year closure from 10:00 to 12:00 on the following days: 22, 23, 26, 27,28, 29 et 30 December 2011 and 2,3, et 4 January 2012. All the activities related to the Registration Service will be operational: registration for contractors’ personnel; registrations for professional visits; access cards; car stickers; biometric registration. The Registration Service

  11. [New electronic data carriers in Bosnia-Herzegovina].

    Science.gov (United States)

    Masić, I; Pandza, H; Knezević, Z; Toromanović, S

    1999-01-01

    Bosnia and Herzegovina has been developing new Health Care System based on Electronic Registration Card. Developing countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transfer, searching and protection of data using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Both technologies offer the advantages and disadvantages. Three types of electronic card are currently in use: Hybrid Card, Smart Card and Laser Card. Hybrid Card offers characteristics of both Smart Card and Laser Card. The differences among these cards, such as a capacity, total price, price per byte, security system are discussed here. The dilemma is, which card should be used as a data carrier. The Electronic Family Registration Card is a question of strategic interest for B&H, but also a big investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  12. STANDARDIZATION AND APPLICATION OF PLASTIC CARDS IN THE EDUCATIONAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Polina V. Baranova

    2015-01-01

    Full Text Available The application of plastic cards has been widely increasing in various fields of life, business and education. They have already become up-to-date and convenient attribute of our daily life. There are emerging more and more areas where they can be used in a convenient and practical way. Contactless smart cards can be used in access control in the educational systems. This article gives an overview of existing standards dealing with contactless identification smart-cards. All standards covered in this article are developed by the Federal State Unitary Enterprise VNIINMASH jointly with TC 22 «Information Technology» based on their own authentic Russian translation of international standards. 

  13. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  14. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  15. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  16. 77 FR 2613 - Registration of Swap Dealers and Major Swap Participants

    Science.gov (United States)

    2012-01-19

    ... natural person who is a principal of an applicant for registration to file a fingerprint card. The... and text identical to that which existed prior to this unintentional deletion. The Commission also... apply for registration must file a Form 7-R, and a Form 8-R and fingerprint card for each principal of...

  17. Optimized Skip-Stop Metro Line Operation Using Smart Card Data

    Directory of Open Access Journals (Sweden)

    Peitong Zhang

    2017-01-01

    Full Text Available Skip-stop operation is a low cost approach to improving the efficiency of metro operation and passenger travel experience. This paper proposes a novel method to optimize the skip-stop scheme for bidirectional metro lines so that the average passenger travel time can be minimized. Different from the conventional “A/B” scheme, the proposed Flexible Skip-Stop Scheme (FSSS can better accommodate spatially and temporally varied passenger demand. A genetic algorithm (GA based approach is then developed to efficiently search for the optimal solution. A case study is conducted based on a real world bidirectional metro line in Shenzhen, China, using the time-dependent passenger demand extracted from smart card data. It is found that the optimized skip-stop operation is able to reduce the average passenger travel time and transit agencies may benefit from this scheme due to energy and operational cost savings. Analyses are made to evaluate the effects of that fact that certain number of passengers fail to board the right train (due to skip operation. Results show that FSSS always outperforms the all-stop scheme even when most passengers of the skipped OD pairs are confused and cannot get on the right train.

  18. A programming and a modelling perspective on the evaluation of Java Card implementations

    NARCIS (Netherlands)

    Hartel, Pieter H.; de Jong, E.; de Jong, Eduard; Attali, Isabelle; Jensen, Thomas

    Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using

  19. [Evaluation of a registration card for logging electrocardiographic records into standard personal computers].

    Science.gov (United States)

    Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M

    1997-01-01

    The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and

  20. Internet of things technologies in smart cities

    CSIR Research Space (South Africa)

    Dlodlo, N

    2016-05-01

    Full Text Available at exploiting the most advanced technologies to support value-added services for the administration of the city and its citizens (Zanella, 2014). Smart cities worldwide live under a ‘data deluge” in which big data generated by people and sensors are processed... single ticket in the form of a smart card which can be loaded with money and is swiped at any point of entry into a transport system using Near Field Communication (NFC) technology to transmit information from the card to the reading machine and back...

  1. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  2. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    Full Text Available Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  3. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  4. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    Science.gov (United States)

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  5. Using smart card technology to monitor the eating habits of children in a school cafeteria: 3. The nutritional significance of beverage and dessert choices.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The consumption patterns of beverages and desserts features highly in the current debate surrounding children's nutrition. The aim of this study was to continuously monitor the choice of beverages and desserts made by nearly 1000 children in a school cafeteria. A newly developed smart card system was used to monitor the food choices of diners (7-16-year-old boys) in a school cafeteria over 89 days. A wide variety of beverages and desserts were on offer daily. Despite coming from an affluent, well-educated demographic group, the boys' choices of beverages and desserts mirrored those of children in general. Buns and cookies were over 10 times more popular than fresh fruits and yogurts. Sugary soft-drinks were over 20 times more popular than fresh fruit drinks and milk combined. Appropriate choices could, over a month, reduce intake of added sugar by over 800 g and fat by over 200 g. The smart card system was very effective at monitoring total product choices for nearly 1000 diners. In agreement with a recent national school meal survey, where choice is extensive, children show a preference for products high in fat and/or sugar. The consequences of these preferences are discussed.

  6. Determining the feasibility of objective adherence measurement with blister packaging smart technology.

    Science.gov (United States)

    van Onzenoort, Hein A; Neef, Cees; Verberk, Willem W; van Iperen, H Peter; de Leeuw, Peter W; van der Kuy, Paul-Hugo M

    2012-05-15

    The results of a feasibility study of blister-pack smart technology for monitoring medication adherence are reported. Research in the area of objective therapy compliance measurement has led to the development of microprocessor-driven systems that record the time a unit dose is removed from blister packaging. One device under development is the Smart Blister-a label imprinted with event-detection circuitry that can be affixed to standard commercial blister cards. In the first trial of the device in actual clinical practice, 115 community-dwelling Dutch patients receiving valsartan maintenance therapy (160 mg once daily) were given 14-day blister packages equipped with the Smart Blister. On the return of empty blister cards to the 20 participating community pharmacies, the stored information was scanned and downloaded for data analysis and patient counseling purposes. A total of 245 Smart Blister-equipped packages were used by valsartan recipients during the eight-month study. The device was largely effective in recording patient and blister-card identification data and other desired information. However, in 17% of cases, the Smart Blister system registered multiple tablet-removal events at the same time, presumably indicating unintentional breakage of nearby conductive circuits and the need for design refinements. The Smart Blister-equipped medication cards were generally well received by patients and pharmacies. An evaluation of the functionality and robustness of the Smart Blister in a real-world clinical practice situation yielded some promising results, but the findings also indicated a need for design refinements and additional performance testing of the device.

  7. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    Science.gov (United States)

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  8. A Load Time Policy Checker for Open Multi-Application Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Gadyatskaya, Olga

    2011-01-01

    , traditional approaches for information flow analysis are not suitable. We suggest the Security-by-Contract approach for loading time application certification on the card, that will enable the stakeholders with the means to ensure the compliance of every update of the card with their security policy. We...... describe an extension of the card security architecture to deal with verification for different types of updates and present a Java Card prototype implementation of the Policy Checker with performance measurements....

  9. REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2002-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards.Relations with the Host States Service Tel. 72848

  10. REMINDER - PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2003-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  11. REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2002-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  12. A programming and a modelling perspective on the evaluation of Java Card implementations

    OpenAIRE

    Hartel, Pieter H.; de Jong, E.; de Jong, Eduard; Attali, Isabelle; Jensen, Thomas

    2000-01-01

    Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using Java achievable in smartcard programming. In particular, efforts towards evaluating Java Card implementations at a high level of assurance may be hampered by the presence of these differences as wel...

  13. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  14. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  15. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  16. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  17. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  18. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  19. What’s in your smart wallet? Challenges and roadblocks

    OpenAIRE

    Haverila, Mikko

    2015-01-01

    The concept of a digital wallet has been around for a few years. Sometimes the words “digital wallet” and “smart wallet” are used interchangeably. This is not the case in this thesis, however. The smart wallet is more than just an electronic payment card embedded into a smart phone; it truly performs all the functions of the traditional wallet but only in digital format. This thesis will discuss the main challenges and roadblocks that need to be addressed in order to build a successful smart ...

  20. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  1. Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-01-01

    Full Text Available Remote user authentication is the first step to guarantee the security of online services. Online services grow rapidly and numerous remote user authentication schemes were proposed with high capability and efficiency. Recently, there are three new improved remote user authentication schemes which claim to be resistant to various attacks. Unfortunately, according to our analysis, these schemes all fail to achieve some critical security goals. This paper demonstrates that they all suffer from offline dictionary attack or fail to achieve forward secrecy and user anonymity. It is worth mentioning that we divide offline dictionary attacks into two categories: (1 the ones using the verification from smart cards and (2 the ones using the verification from the open channel. The second is more complicated and intractable than the first type. Such distinction benefits the exploration of better design principles. We also discuss some practical solutions to the two kinds of attacks, respectively. Furthermore, we proposed a reference model to deal with the first kind of attack and proved its effectiveness by taking one of our cryptanalysis schemes as an example.

  2. Retention of data in heat-damaged SIM cards and potential recovery methods.

    Science.gov (United States)

    Jones, B J; Kenyon, A J

    2008-05-02

    Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.

  3. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  4. A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM

    OpenAIRE

    Xu , Fei; Yau , Ken; Zhang , Ping; Chow , Kam-Pui

    2015-01-01

    Part 2: INTERNET CRIME INVESTIGATIONS; International audience; Internet real-name registration requires a user to provide personal identification credentials including his/her real name to an online service provider when registering for an account. In China, real-name registration has been implemented since 2010 for purchasing train tickets and mobile phone SIM cards. In 2013, the Chinese government announced that real-name registration would be implemented for Internet users to protect again...

  5. Ring aggregation pattern of metro passenger trips: A study using smart card data

    Science.gov (United States)

    Wang, Ziyang; Hu, Yuxin; Zhu, Peng; Qin, Yong; Jia, Limin

    2018-02-01

    With the widespread implementation of smart cards and with more travel details being recorded, travel patterns can be studied more precisely and deeply. Although considerable attention has been paid to travel patterns, the relationship between travel patterns and the functional structure of a city is yet to be well understood. In this research, we study this relationship by analysing metro passenger trip data (in Beijing and Shenzhen in China and London in the United Kingdom), and we present two unprecedented findings. First, through averaging, a linear relationship is found to exist between individual travel distance and the distance between the origin and the city centre. The underlying mechanism is a travel pattern we call "ring aggregation", i.e., the daily movement of city passengers is aggregated into a ring (with approximately equal distances to the city centre). Then, for commuting trips, the daily travel pattern can be regarded as switching between the outer residential ring and the inner work ring. Second, this linear relationship and the ring aggregation pattern seem to be exclusive characteristics of metro systems (and may also fit other moderate- and long-distance transportation modes) but do not apply to short-distance transportation modes, such as bicycles and taxis. This finding implies that the ring aggregation pattern is a product of the relationship between travel patterns and the city functional structure at a large scope.

  6. Vehicle Fault Diagnose Based on Smart Sensor

    Science.gov (United States)

    Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng

    In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.

  7. SIMULASI SISTEM KELISTRIKAN KAMAR HOTEL MENGGUNAKAN SMART RELAY

    Directory of Open Access Journals (Sweden)

    I Nyoman Sukarma

    2018-03-01

    Full Text Available Fungsi dari alat key tag atau hotel switch atau key card adalah memutus atau menyambungkan aliran listrik ke dalam suatu area tertentu atau ruang. Key tag memiliki peran penting pada kamar hotel untuk mencegah pemborosan energi pada saat kamar hotel tidak berpenghuni atau belum tersewakan. Untuk itu, penulis merancang simulasi sistem kelistrikan pada kamar hotel yang dikontrol dengan smart relay. Pada simulasi ini digunakan smart relay Zelio Logic buatan Schneider Electric. Pemrograman smart relay ini menggunakan ladder diagram yang disusun menggunakan perangkat lunak ZelioSoft2 dari Schneider Electric. Smart relay menerima sinyal masukan dari sensor, key tag dan sakelar. Sinyal masukan tersebut selanjutnya diproses agar lampu, kotak-kontak, exhaust fan, dan AC (Air Conditioner pada kamar hotel dapat bekerja.

  8. Laboratory skinpatches and smart cards based on foils.

    Science.gov (United States)

    Ruano-López, Jesús M; Laouenan, Florian; Agirregabiria, Maria; Rodriguez, Sonia; Krüger, Jan; Flavin, Diarmuid

    2011-01-01

    This paper presents: (i) a hand held system consisting of a portable platform and disposable polymeric Lab-on-a-card capable of performing a nucleic acid concentration, amplification and detection with reagents inside; and a (ii) wearable diagnostic Lab-on-a-Paper skinpatch system, capable of performing in-situ sweat sampling, analyte pre-concentration, and immunoassay analysis. The skinpatch works in conjunction with a hand-held optoelectronic reader / micro PC fluorescence analysis interface.

  9. SMART core protection system design

    International Nuclear Information System (INIS)

    Lee, J. K.; Park, H. Y.; Koo, I. S.; Park, H. S.; Kim, J. S.; Son, C. H.

    2003-01-01

    SMART COre Protection System(SCOPS) is designed with real-tims Digital Signal Processor(DSP) board and Network Interface Card(NIC) board. SCOPS has a Control Rod POSition (CRPOS) software module while Core Protection Calculator System(CPCS) consists of Core Protection Calculators(CPCs) and Control Element Assembly(CEA) Calculators(CEACs) in the commercial nuclear plant. It's not necessary to have a independent cabinets for SCOPS because SCOPS is physically very small. Then SCOPS is designed to share the cabinets with Plant Protection System(PPS) of SMART. Therefor it's very easy to maintain the system because CRPOS module is used instead of the computer with operating system

  10. [Electronic medical records in Bosnia-Herzegovina. The electronic card--the medical record of the future in Boznia-Herzegovina].

    Science.gov (United States)

    Masić, I; Pandza, H; Ridanović, Z; Dover, M

    1997-01-01

    The biggest problem in organisation of the effective and rational health care of good quality in Bosnia quality and Herzegovina is a functional and updated Health Information System. In this system, important role play Health Statistic System in which documentation and evidence are very important segment. Developed countries proceeded from the manual and semiautomatic method of medical data processing and system management to the new methods of entering, storage, transfer, searching and protection of data using electronic equipment. Recently, the competition between manufacturers of the Smart Card and Laser Card is reality. Also scientific and professional debate exists about the standard card for storage of medical information in Health Care System. First option is supported by West European countries that developing Smart Card called Eurocard and second by USA and Far East countries. Because the Health Care System and other segments of Society of Bosnia and Herzegovina innovate intensively similar systems, the authors of this article intend to open discussion, and to show advantages and failures of each technological medium.

  11. Optimised to Fail: Card Readers for Online Banking

    Science.gov (United States)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  12. The Learning Credit Card: A Tool for Managing Personal Development

    Science.gov (United States)

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  13. Distortion analysis on binary representation of minutiae based fingerprint matching for match-on-card

    CSIR Research Space (South Africa)

    Mlambo, CS

    2016-12-01

    Full Text Available The fingerprint matching on the smart card has long been developed and recognized faster method than fingerprint matching on a computer or large capacity systems. There has been much research and activities concerned with improving the accuracy...

  14. Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan.

    Science.gov (United States)

    Hsu, Min-Huei; Yeh, Yu-Ting; Chen, Chien-Yuan; Liu, Chien-Hsiang; Liu, Chien-Tsai

    2011-03-01

    Doctor shopping (or hospital shopping), which means changing doctors (or hospitals) without professional referral for the same or similar illness conditions, is common in Hong Kong, Taiwan and Japan. Due to the lack of infrastructure for sharing health information and medication history among hospitals, doctor-shopping patients are more likely to receive duplicate medications and suffer adverse drug reactions. The Bureau of National Health Insurance (BNHI) adopted smart cards (or NHI-IC cards) as health cards in Taiwan. With their NHI-IC cards, patients can freely access different medical institutions. Because an NHI-IC card carries information about a patient's prescribed medications received from different hospitals nationwide, we used this system to address the problem of duplicate medications for outpatients visiting multiple hospitals. A computerized physician order entry (CPOE) system was enhanced with the capability of accessing NHI-IC cards and providing alerts to physicians when the system detects potential duplicate medications at the time of prescribing. Physician responses to the alerts were also collected to analyze changes in physicians' behavior. Chi-square tests and two-sided z-tests with Bonferroni adjustments for multiple comparisons were used to assess statistical significance of differences in actions taken by physicians over the three months. The enhanced CPOE system for outpatient services was implemented and installed at the Pediatric and Urology Departments of Taipei Medical University Wan-Fang Hospital in March 2007. The "Change Log" that recorded physician behavior was activated during a 3-month study period from April to June 2007. In 67.93% of patient visits, the physicians read patient NHI-IC cards, and in 16.76% of the reads, the NHI-IC card contained at least one prescribed medication that was taken by the patient. Among the prescriptions issued by physicians, on average, there were 2.36% prescriptions containing at least one

  15. Time Delay Measurements of Key Generation Process on Smart Cards

    Science.gov (United States)

    2015-03-01

    delve into the meat of the thesis, describing a java program written to test DOD CAC cards that have ECC algorithms implemented. Test data will be...WICOM.2009.5302782 Defense Enterprise Mobility – A game changer for the Department of Defense. (2012, Jan.). , DISA: DOD Mobility Program. Retrieved

  16. Factors Determining Availability, Utilization and Retention of Child Health Card in Western Nepal.

    Science.gov (United States)

    Paudel, K P; Bajracharya, D C; Karki, K; K C, A

    2016-05-01

    The immunization card is revised with addition of general information about child health and is later called as child health card. This card is a tool used by Health Management Information System in Nepal. It is important for tracking the records of immunization. Aim is to identify the factors determining the availability, utilization and retention of the child health card in Western Nepal. A cross sectional study was conducted among mothers having children education. Retention of the card was found to be 82.2%. 90.3% retention was seen among 0-12 months children age group whereas it was 74 % among12 to 24 months age group. The reasons for less retention were torn by the child/played by child (54.6%) followed by lack of proper place,unaware about importance and poor quality of card.The new child health cards were insufficient, compelling use of both new and old cards which created problem in consistency. Regarding utilization of child health card, it was found to be used for birth registration and for further studies in abroad. The areas of utilization of child health card should be broadened so that the retention of card can be increased. The main reasons for less retention of the card are torn by children and lack of the proper place.

  17. Formalizing the Safety of Java, the Java Virtual Machine and Java Card

    NARCIS (Netherlands)

    Hartel, Pieter H.; Moreau, Luc

    2001-01-01

    We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smart cards. The conclusion is that while a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine readable

  18. Smart parking barrier

    KAUST Repository

    Alharbi, Abdulrazaq M.

    2016-05-06

    Various methods and systems are provided for smart parking barriers. In one example, among others, a smart parking barrier system includes a movable parking barrier located at one end of a parking space, a barrier drive configured to control positioning of the movable parking barrier, and a parking controller configured to initiate movement of the parking barrier, via the barrier drive. The movable parking barrier can be positioned between a first position that restricts access to the parking space and a second position that allows access to the parking space. The parking controller can initiate movement of the movable parking barrier in response to a positive identification of an individual allowed to use the parking space. The parking controller can identify the individual through, e.g., a RFID tag, a mobile device (e.g., a remote control, smartphone, tablet, etc.), an access card, biometric information, or other appropriate identifier.

  19. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  20. E-COMMERCE WITH ONLINE PAYMENT THROUGH BANK CARD

    Directory of Open Access Journals (Sweden)

    OANA ŞEITAN

    2010-01-01

    Full Text Available The e-commerce has become a routine part of human life because it offers major advantages: convenience (it’s no longer necessary to visit a store to be able to shop, efficiency (the buyer can visit several virtual shops in a very short time, the crowd of shops and the frustration caused by the lack of parking spaces available can be avoided, the customer can choose and compare the desired products taking in consideration a set of characteristics such as price, grammage, color, delivery dat, etc. and the development of secure solutions for online payment (through: bank cards, ePay, cybercash, SmartCard, electronic funds transfer, Ecash. In the last decade, the electronic payment systems have been improved, reaching high levels of security and speed, acquiring a private, confidential, decentralization and internationalization character.

  1. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  2. The effect of using the health smart card vs. CPOE reminder system on the prescribing practices of non-obstetric physicians during outpatient visits for pregnant women in Taiwan.

    Science.gov (United States)

    Long, An-Jim; Chang, Polun

    2012-09-01

    There is an evidence that pregnant women have been prescribed a significant number of improper medications that could lead to potential damage for a developing fetus due to discontinuity of care. The safety of pregnant women raises public concern and there is a need to identify ways to prevent potential adverse events to the pregnant woman. This study used a health smart card with a clinical reminder system to keep continuous records of general outpatient visits of pregnant women to protect them from potential adverse events caused by improper prescription. The health smart card, issued to all 23 million citizens in Taiwan, was used to work with a Computerized Physician Order Entry (CPOE) implemented at a 700-bed teaching medical center in Taipei to provide the outpatient information of pregnant women. FDA pregnancy risk classification was used to categorize the risk of pregnant women. The log file, combined with the physicians' and patients' profiles, were statistically examined using the Mantel-Haenszel technique to evaluate the impact of system in changing physician's prescription behavior. A total of 441 patients ranged in age from 15 to 50 years with 1114 prescriptions involved in FDA pregnancy risk classification C, D, and X during the study period. 144 reminders (13.1%) were accepted by physicians for further assessment and 100 (69.4%) of them were modified. Non-obstetric physicians in non-emergency setting were more intended to accept reminders (27.8%, 4.9 folds than obstetricians). Reminders triggered on patients in second trimester (15.5%) were accepted by all physicians more than third trimester (OR 1.52, psmart card armed with CPOE reminder system and well-defined criteria had the potential to decrease harmful medication prescribed to pregnant patients. The results show better conformance for non-obstetric physicians (26%) and when physicians accepted the alerts they are more likely to went back and review their orders (69%). In sum, reminder criteria

  3. Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens.

    Science.gov (United States)

    Lai, Jiun-Tze; Hou, Ting-Wei

    2008-04-01

    An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.

  4. Slovenian national health insurance card: the next step.

    Science.gov (United States)

    Kalin, T; Kandus, G; Trcek, D; Zupan, B

    1999-01-01

    The Slovenian national health insurance company started a full-scale deployment of the insurance smart card that is at the present used for insurance data and identification purpose only. There is ample capacity on the cards that were selected, to contain much more data than needed for the purely administrative and charging purposes. There are plans to include some basic medical information, donor information, etc. On the other hand, there are no firm plans to use the security infrastructure and the extensive network, connecting the insurance company with the more than 200 self service terminals positioned at the medical facilities through the country to build an integrated medical information system that would be very beneficial to the patients and the medical community. This paper is proposing some possible future developments and further discusses on the security issues involved with such countrywide medical information system.

  5. Investigating the Activities of Children toward a Smart Storytelling Toy

    Science.gov (United States)

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2013-01-01

    This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…

  6. Using Technology To Combat Truancy. Number 10 in a Series of CTC Trust Publications.

    Science.gov (United States)

    Haigh, Gerald

    The 14 City Technology Colleges (CTCs) opened so far in Great Britain are achieving an average attendance rate of between 90 percent and 97 percent. This high level of attendance has been assisted by the use of electronic registration (role taking) devices, including smart cards, portable computers, and optical readers. This report compares…

  7. CAC on a MAC: Setting up a DOD Common Access Card Reader on the Macintosh OS X Operating System

    National Research Council Canada - National Science Library

    Hopfner, Phil

    2006-01-01

    .... The CAC readers in conjunction with the user's Smart Card enables access to DoD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DoD Public Key Infrastructure (PKI...

  8. Click to "like" organ donation: the use of online media to promote organ donor registration.

    Science.gov (United States)

    Stefanone, Michael; Anker, Ashley E; Evans, Melanie; Feeley, Thomas Hugh

    2012-06-01

    Efforts to promote organ donation have traditionally relied on mass-mediated or interpersonal communication to promote donor registration. Despite its popularity, the use of online media has yet to be carefully evaluated as a platform to promote organ donation. To describe results of an intervention to promote donor registration that relies solely on online media to communicate to target audiences. For 3 years, 6 campaigns were implemented in 3 different online media formats. Online media formats included (1) traditional online advertising, (2) student seeders' social networking sites campaigns, and (3) challenge campaigns. Online media campaigns primarily targeted college-aged individuals.Intervention-Each campaign directed individuals to the dedicated project website, where they could access educational material about donation and request a donor registration card. Unique website visitors, webpages viewed per site visit, time spent on site, and organ donor cards requested/received were tracked in relation to each online media format. Traditional online advertising offered greater message exposure but failed to result in a higher proportion of website visitors who registered their donation intentions. Use of student seeders (ie, motivated students who promote donation by using social networking sites) and challenge campaigns resulted in greater attention to the project website, donor card requests, and subsequent returns. Additional research is recommended to reveal the effect of combining 2 or more varying online media formats within a single campaign.

  9. 77 FR 40618 - Announcement of Requirements and Registration for “SMART-Indivo Challenge”

    Science.gov (United States)

    2012-07-10

    ... delete substitutable apps. Indivo enables individuals to own and manage a complete, secure, digital copy..., secure, digital copy of their health and wellness information, integrated across sites of care and over.../smart-indivo/ . Mobile HTML5 web app submissions are welcome, as are native applications built on SMART...

  10. AKILLI KARTLAR İLE YAPILAN MAL VE HİZMET SATIŞLARININ TMS-18 HASILAT STANDARDI ÇERÇEVESİNDE MUHASEBELEŞTİRİLMESİ-RECOGNITION OF SOLD GOODS AND SERVICES BY SMART CARDS WITHIN TMS-18 REVENUE STANDARD

    Directory of Open Access Journals (Sweden)

    Abitter ÖZULUCAN

    2012-06-01

    Full Text Available Bu çalışmada;, önce akıllı kart / yemek çekleri sistemi tanıtılmakta, tarafların sağladıkları fayda ve maliyetler belirtilmekte ve gerçekleşen satış işleminin taraflarca kayda geçirilmesi hususu TMS 18 Hasılat standardı kapsamında ele alınmaktadır. Elde edilen hasılatın ölçümünde, sistemin işleyişinde temel unsur olan ve üye iş yeri tarafından yemek kartı tedavül eden işletmeye hizmet faturası karşılığında ödenen komisyonların, hasılatla doğrudan ilişkilendirilebilen bir gider niteliği taşıyıp taşımaması; bu türden giderlerin Tekdüzen Muhasebe Sistemi’nden farklı olarak, TMS 18 kapsamındaki ölçümünün ve muhasebeleştirilmesinin farklı olup olmadığının belirlenmesi amacıyla kaleme alınan bu çalışma, giriş ve sonuç bölümlerinin dışında dört bölümden oluşmaktadır.-The main part of the smart card system is sellers and while they are measuring of their revenue, they should associate the commissions with revenues to record at inception. So in this paper, after the smart card system is introduced, the advantages and disadvantages of this system are exposed and then how to recognise of the selling is considered within TMS 18, Revenues Standard. In other words, the reason that we conduct this paper can be expressed that the expense of the selling commissions which arise from the selling products with smart card whether should or should not deduct to revenue while the revenue is been measured.

  11. Authenticated, private, and secured smart cards (APS-SC)

    Science.gov (United States)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  12. PENGARUH PEMBELAJARAN TEAM ASSISTED INDIVIDUALIZATION (TAI BERBANTUAN MEDIA SMART AND INTERESTING CARD (SIC TERHADAP HASIL BELAJAR SISWA

    Directory of Open Access Journals (Sweden)

    Kun Khuriya Pratiwi

    2015-11-01

    Full Text Available This experiment aimed to determine the influence of student’s learning outcomes of Senior High School (SHS in Parakan through the application of TAI (Team Assisted Individualization assisted of SIC (Smart and Interesting Card media on the subject of redox reaction. The population in this experiment were X grade students Senior High School (SHS in Parakan of the school year 2011/2012. Determination of the sample used cluster random sampling system that obtained two classes where X-3 as an experimental group that was treated by using TAI method assisted by SIC media and X-4 as a control group that was treated conventional methods. The research data was obtained by the method of documentation, testing, questionnaire and observation. The final analysis methods are normalization test, the similarity of two varians test, difference of two average test, gain test, biserial correlation, determination coefficient and analysis of questionnaire and observation sheet. The results showed that experiment class better than the control class. The results of study obtained results of the experimental group had an average 76,78 and a control group had an average of 67,82. TAI method assisted by SIC media give contribution to the learning outcome as 30%.Key words: TAI learning, SIC media 

  13. Mapping and navigational control for a “smart” wheelchair.

    Science.gov (United States)

    Schultz, Dana L; Shea, Kathleen M; Barrett, Steven F

    2012-01-01

    A “smart” wheelchair is in development to provide mobility to those unable to control a traditional wheelchair. A “smart” wheelchair is an autonomous machine with the ability to navigate a mapped environment while avoiding obstacles. The flexibility and complex design of “smart” wheelchairs have made those currently available expensive. Ongoing research at the University of Wyoming has been aimed at designing a cheaper, alternative control system that could be interfaced with a typical powered wheelchair. The goal of this project is to determine methods for mapping and navigational control for the wheelchair. The control system acquires data from eighteen sensors and uses the data to navigate around a pre-programmed map which is stored on a micro SD card. The control system also provides a user interface in the form of a touchscreen LCD. The designed system will be an easy-to-use and cost effective alternative to current “smart” wheelchair technology.

  14. How report cards on physicians, physician groups, and hospitals can have greater impact on consumer choices.

    Science.gov (United States)

    Sinaiko, Anna D; Eastman, Diana; Rosenthal, Meredith B

    2012-03-01

    Public report cards with quality and cost information on physicians, physician groups, and hospital providers have proliferated in recent years. However, many of these report cards are difficult for consumers to interpret and have had little impact on the provider choices consumers are making. To gain a more focused understanding of why these reports cards have not been more successful and what improvements could be made, we interviewed experts and surveyed registrants at the March 2011 AHRQ National Summit on Public Reporting for Consumers in Health Care. We found broad agreement that public reporting has been disconnected from consumer decisions about providers because of weaknesses in report card content, design, and accessibility. Policy makers have an opportunity to change the landscape of public reporting by taking advantage of advances in measurement, data collection, and information technology to deliver a more consumer-centered report card. Overcoming the constraint of limited public funding, and achieving the acceptance of providers, is critical to realizing future success.

  15. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  16. Charge It Right. FDIC Money Smart Financial Education Curriculum = Uso Correcto de su Tarjeta de Credito. FDIC Money Smart Plan de Education para Capacitacion en Finanzas.

    Science.gov (United States)

    Federal Deposit Insurance Corp., Washington, DC.

    This module on managing a credit card is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to describe the costs and benefits of…

  17. Model-based security analysis of the German health card architecture.

    Science.gov (United States)

    Jürjens, J; Rumm, R

    2008-01-01

    Health-care information systems are particularly security-critical. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such systems. This work presents the experiences and results from the security analysis of the system architecture of the German Health Card, by making use of an approach to model-based security engineering that is based on the UML extension UMLsec. The focus lies on the security mechanisms and security policies of the smart-card-based architecture which were analyzed using the UMLsec method and tools. Main results of the paper include a report on the employment of the UMLsec method in an industrial health information systems context as well as indications of its benefits and limitations. In particular, two potential security weaknesses were detected and countermeasures discussed. The results indicate that it can be feasible to apply a model-based security analysis using UMLsec to an industrial health information system like the German Health Card architecture, and that doing so can have concrete benefits (such as discovering potential weaknesses, and an increased confidence that no further vulnerabilities of the kind that were considered are present).

  18. Modeling the Hourly Distribution of Population at a High Spatiotemporal Resolution Using Subway Smart Card Data: A Case Study in the Central Area of Beijing

    Directory of Open Access Journals (Sweden)

    Yunjia Ma

    2017-04-01

    Full Text Available The accurate estimation of the dynamic changes in population is a key component in effective urban planning and emergency management. We developed a model to estimate hourly dynamic changes in population at the community level based on subway smart card data. The hourly population of each community in six central districts of Beijing was calculated, followed by a study of the spatiotemporal patterns and diurnal dynamic changes of population and an exploration of the main sources and sinks of the observed human mobility. The maximum daytime population of the six central districts of Beijing was approximately 0.7 million larger than the night-time population. The administrative and commercial districts of Dongcheng and Xicheng had high values of population ratio of day to night of 1.35 and 1.22, respectively, whereas Shijingshan, a residential district, had the lowest value of 0.84. Areas with a high population ratio were mainly concentrated in Dongcheng, Xicheng, West Chaoyang, and Southeast Haidian. The daytime population distribution showed a hierarchical spatial pattern of planar centers and second scattered centers as opposed to multiple scattered centers during the night-time. This was because most people moved inward from the areas with a low–high to high–low population ratio of day to night from night-time to daytime, which can be explained by the process of commuting between residential areas and workplaces. Several distinctive phenomena (e.g., the distribution of new industrial parks, the so-called old residential areas, and colleges and universities in the development of China are reflected by the spatiotemporal pattern of the distribution of population. The general consistency of the population ratios of day to night, population distribution, population variation of typical communities, and population mobility pattern with previous research suggests that the subway smart card data has potential in analyzing dynamic diurnal

  19. Inferring Social Functions Available in the Metro Station Area from Passengers’ Staying Activities in Smart Card Data

    Directory of Open Access Journals (Sweden)

    Yang Zhou

    2017-12-01

    Full Text Available The function of a metro station area is vital for city planners to consider when establishing a context-aware Transit-Oriented Development policy around the station area. However, the functions of metro station areas are hard to infer using the static land use distribution and other traditional survey datasets. In this paper, we propose a method to infer the functions occurring around the metro station catchment areas according to the patterns of staying activities derived from smart card data. We first define the staying activities by the spatial and temporal constraints of the two consecutive alighting and boarding records from the individual travel profile. Then we cluster and label the whole staying activities by considering the features of duration, frequency, and start time. By analyzing the percentage of different types of aggregated activities happening around each metro station, we cluster and explore the functions of the metro station area. Taking Wuhan as a case study, we analyze the results of Wuhan metro systems and discuss the similarities and differences between the functions and the land use distribution around the station area. The results show that although there exist some agreements, there is also a gap between the human activities and the land uses around the station area. These findings could give us deeper insight into how people act around the stations by metro systems, which will ultimately benefit the urban planning and policy development.

  20. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  1. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  2. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    Science.gov (United States)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  3. SMART PHONE USER ASSISTANCE APPLICATION FOR ANDROID

    Directory of Open Access Journals (Sweden)

    P. PRABHAVATHY

    2015-09-01

    Full Text Available Nowadays people seem to be more dependent on smart phones rather than any other electronic devices. Smart phones act like mini laptops with the mobilecommunication facility. Moreover, people possess more than one SIM card/Smart phone for many purposes. So non-ambiguity between various roles performed by them is crucial. For an example, person can have smart phone for his personal use at the residence and another phone for his official use. Consider a scenario: person at the residence urgently needs the official contact information available on the phone at his office (remote place. This application plays major dual role by acting as Server (official Smart phone and Client (personal Smart phone. Irrespective of geographic area, the server smart phone (SSP provides various services based on the request received from the client smart phone (CSP. The CSP send various requests through the SMS communication. Various requests can be fetching information from SSP such as log for unread messages and missed calls, unread message content, contact numbers, SIM and IMEI numbers. When the SSP is on silent mode and got misplaced, the CSP can be used to change the sound profile of SSP from silent to ringing mode by sending a request through SMS. If the SSP is in audible distance, then a phone call to it will help us to find the misplaced phone. Besides, the CSP can delete secret data available in the SSP’s memory. This application is different from other applications because it provides User Interface having options to send request through SMS and web database login through internet connectivity for phone’s data backup to provide unlimited memory. Upload any information such as contacts and messages from the smart phone into web database and save phone’s memory space. This application will upload the information in encoded format over the internet, which can be decoded using the application’s login password for security purpose.

  4. Smart-card-based automatic meal record system intervention tool for analysis using data mining approach.

    Science.gov (United States)

    Zenitani, Satoko; Nishiuchi, Hiromu; Kiuchi, Takahiro

    2010-04-01

    The Smart-card-based Automatic Meal Record system for company cafeterias (AutoMealRecord system) was recently developed and used to monitor employee eating habits. The system could be a unique nutrition assessment tool for automatically monitoring the meal purchases of all employees, although it only focuses on company cafeterias and has never been validated. Before starting an interventional study, we tested the reliability of the data collected by the system using the data mining approach. The AutoMealRecord data were examined to determine if it could predict current obesity. All data used in this study (n = 899) were collected by a major electric company based in Tokyo, which has been operating the AutoMealRecord system for several years. We analyzed dietary patterns by principal component analysis using data from the system and extracted 5 major dietary patterns: healthy, traditional Japanese, Chinese, Japanese noodles, and pasta. The ability to predict current body mass index (BMI) with dietary preference was assessed with multiple linear regression analyses, and in the current study, BMI was positively correlated with male gender, preference for "Japanese noodles," mean energy intake, protein content, and frequency of body measurement at a body measurement booth in the cafeteria. There was a negative correlation with age, dietary fiber, and lunchtime cafeteria use (R(2) = 0.22). This regression model predicted "would-be obese" participants (BMI >or= 23) with 68.8% accuracy by leave-one-out cross validation. This shows that there was sufficient predictability of BMI based on data from the AutoMealRecord System. We conclude that the AutoMealRecord system is valuable for further consideration as a health care intervention tool. Copyright 2010 Elsevier Inc. All rights reserved.

  5. Consumers' Interest In Provider Ratings Grows, And Improved Report Cards And Other Steps Could Accelerate Their Use.

    Science.gov (United States)

    Findlay, Steven D

    2016-04-01

    Encouraging patients and consumers to use data and other information in choosing health care providers is an important way to enhance patient engagement and improve the quality of care. The growing use of technology, including smart phones and near-ubiquitous Internet access, provides consumers with easy access to websites that collect and report assessments and ratings of providers, primarily physicians and hospitals. In addition to new technology, recent laws and changes in society and the delivery of care are laying the foundation for greater use by consumers of provider performance report cards. Such use could be accelerated if the shortcomings of current report card efforts were addressed. Recommendations include making online report cards easier to use and more understandable, engaging, substantive, and relevant to consumers' health and medical concerns and choices. Project HOPE—The People-to-People Health Foundation, Inc.

  6. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  7. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  8. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  9. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  10. RECORD OF THE BINARY DATA ON SD CARD ARDUINO DUE

    Directory of Open Access Journals (Sweden)

    V. G. Mikhailov

    2016-01-01

    Full Text Available The short review of microcontrollers of family Arduino, their characteristics and application fields is given. Importance of record of parameters of researched object is marked to produce debugging of control systems on microcontrollers Arduino. Unique possibility of registration of parameters in family Arduino is record on SD a card in an alpha mode with usage of functions print (, write (. The problems connected to record of the binary data on SD a card on microcontroller Arduino Due are considered. The analysis of methods of record of the binary data on SD card Arduino Due, originating problems with neo-cleaning of memory from the previous program leading to possibility of duplication of the data on SD to a card, presence of the erratic point of view about restriction of volumes of data record and necessity of usage become outdated SD cards is carried out. Ways of elimination of the marked lacks are considered. The estimation of high-speed performance of various approaches of a data recording on SD a card is led. On the basis of the led researches the approach of multiplexing of the writeable information at the expense of conversion of the binary data is offered is byte-serial in a character array in code ASCI without magnification of their volume and record by units on 240 byte. It allows to use as much as possible standard function possibilities write ( Arduino and specificity of the organization of memory SD of cards and to increase high-speed performance more than in 1100 times in comparison with record in a character type on one byte.It is marked that usage of decisions of an exception of duplication of the data offered at forums does not provide completeness of their elimination. For Arduino Due for storage cleaning it is necessary usages of the special programmator or setting of the new program of loading.

  11. Nephele – Smart Digital Memory of Artwork Conservation

    Czech Academy of Sciences Publication Activity Database

    Zitová, Barbara; Beneš, Miroslav; Hradilová, J.

    2011-01-01

    Roč. 86, July (2011), s. 47-48 ISSN 0926-4981 R&D Projects: GA MŠk 1M0572 Institutional research plan: CEZ:AV0Z10750506 Keywords : art restoration * image registration * image retrieval * material analysis Subject RIV: JD - Computer Applications, Robotics http://library.utia.cas.cz/separaty/2012/ZOI/zitova-nephele%20smart%20digital%20memory%20of%20artwork%20conservation.pdf

  12. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  13. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  15. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    Science.gov (United States)

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable.

  16. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data

    Science.gov (United States)

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable. PMID:26872333

  17. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    Directory of Open Access Journals (Sweden)

    Chen Zhong

    Full Text Available To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more

  18. Formalising the Safety of Java, the Java Virtual Machine and Java Card

    OpenAIRE

    Hartel, Pieter H.; Moreau, Luc

    2001-01-01

    We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smart cards. The conclusion is that while a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine readable formal models of the whole of Java and its implementation. This is a formidable task but we believe it is essential to building trust in Java safety, and thence to achieve ITSEC level 6 or Common C...

  19. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  20. AN ANALYSIS ON THE DECISION MODEL OF SMART PLUS INSURANCE PRODUCT PURCHASE

    Directory of Open Access Journals (Sweden)

    Fitry Primadona

    2016-09-01

    Full Text Available The purposes of this study were 1 to analyze the decision model of Smart Plus insurance product purchase and 2 to determine the criteria, sub-criteria, and alternative priorities in Smart Plus purchase decision model. The methods utilized in the study included a survey and interview (in-depth interview by using an AHP analysis (Analytical Hierarchy Process and processing software of "Expert Choice". The result of the first analysis indicated the four marketing mixes that had been performed (Price, Product, Process, and Place; while the second one showed that the purchase of Smart Plus product is based on the factors with the level of interest as follow: benefit (36.3%, premium (35.7%, membership process (14.6%, and provider (13.4%. The result of the second analysis revealed the important sub-criteria including premium offer, additional benefits, membership card, and temporary certificate from the medical specialist.Keywords: AHP, life insurance, marketing mix, purchase decision

  1. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  2. Médicarte software developed for the Quebec microprocessor health card project.

    Science.gov (United States)

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the

  3. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  4. Urban Analysis and Smart Communities: An Approach to the Use of Technology in Everyday Mobility

    Directory of Open Access Journals (Sweden)

    Zurisaddai De la Cruz Severiche Maury

    2015-01-01

    Full Text Available Concentration of population in urban centers is a global problem for which different strategies in order to organize different processes in cities and improve the quality of life are required. The creation of smart communities is shown as a sustainable solution since they deal with various key aspects, such as traffic management and mobility, through the use of information technologies (ITs. This work presents a review of recent studies using information technologies for urban analysis and mobility in cities. A descriptive analysis of automated methods for collecting and analyzing citizens’ mobility patterns is performed; it is centered in smart card use, geolocation and geotagging. It is concluded that a robust communication infrastructure, supported by an efficient computational platform allowing big data management and ubiquitous computing, is a crucial aspect for urban management in a smart community

  5. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  6. Installed Base Registration of Decentralised Solar Panels with Applications in Crisis Management

    Science.gov (United States)

    Aarsen, R.; Janssen, M.; Ramkisoen, M.; Biljecki, F.; Quak, W.; Verbree, E.

    2015-08-01

    In case of a calamity in the Netherlands - e.g. a dike breach - parts of the nationwide electric network can fall out. In these occasions it would be useful if decentralised energy sources of the Smart Grid would contribute to balance out the fluctuations of the energy network. Decentralised energy sources include: solar energy, wind energy, combined heat and power, and biogas. In this manner, parts of the built environment - e.g. hospitals - that are in need of a continuous power flow, could be secured of this power. When a calamity happens, information about the Smart Grid is necessary to control the crisis and to ensure a shared view on the energy networks for both the crisis managers and network operators. The current situation of publishing, storing and sharing data of solar energy has been shown a lack of reliability about the current number, physical location, and capacity of installed decentralised photovoltaic (PV) panels in the Netherlands. This study focuses on decentralised solar energy in the form of electricity via PV panels in the Netherlands and addresses this challenge by proposing a new, reliable and up-to-date database. The study reveals the requirements for a registration of the installed base of PV panels in the Netherlands. This new database should serve as a replenishment for the current national voluntary registration, called Production Installation Register of Energy Data Services Netherland (EDSN-PIR), of installed decentralised PV panel installations in the Smart Grid, and provide important information in case of a calamity.

  7. INSTALLED BASE REGISTRATION OF DECENTRALISED SOLAR PANELS WITH APPLICATIONS IN CRISIS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    R. Aarsen

    2015-08-01

    Full Text Available In case of a calamity in the Netherlands - e.g. a dike breach - parts of the nationwide electric network can fall out. In these occasions it would be useful if decentralised energy sources of the Smart Grid would contribute to balance out the fluctuations of the energy network. Decentralised energy sources include: solar energy, wind energy, combined heat and power, and biogas. In this manner, parts of the built environment - e.g. hospitals - that are in need of a continuous power flow, could be secured of this power. When a calamity happens, information about the Smart Grid is necessary to control the crisis and to ensure a shared view on the energy networks for both the crisis managers and network operators. The current situation of publishing, storing and sharing data of solar energy has been shown a lack of reliability about the current number, physical location, and capacity of installed decentralised photovoltaic (PV panels in the Netherlands. This study focuses on decentralised solar energy in the form of electricity via PV panels in the Netherlands and addresses this challenge by proposing a new, reliable and up-to-date database. The study reveals the requirements for a registration of the installed base of PV panels in the Netherlands. This new database should serve as a replenishment for the current national voluntary registration, called Production Installation Register of Energy Data Services Netherland (EDSN-PIR, of installed decentralised PV panel installations in the Smart Grid, and provide important information in case of a calamity.

  8. Integrative solutions for intelligent energy management. Smart metering, smart home, smart grid; Integrative Loesungsansaetze fuer ein intelligentes Energiemanagement. Smart Metering, Smart Home and Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Jungfleisch, Achim [Hager Vertriebsgesellschaft mbH und Co. KG, Blieskastel (Germany). Marketing

    2011-07-01

    Smart Metering, Smart Home, Smart Grid - these key words significantly determine the current debate about intelligent energy management, or new energy concepts. The author of the contribution under consideration describes the interactions between Smart Metering, Smart Home and Smart Grids and the technical connection of these interactions. Thus, the compact tebis KNX demovea server connects Windows computer and the Internet with the building automation based on KNX. The technically simple combination of smart metering and smart home via Hager radio tower of the building automation provides an access to key energy data for an intelligent load management.

  9. Integrity mechanism for eHealth tele-monitoring system in smart home environment.

    Science.gov (United States)

    Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos

    2009-01-01

    During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.

  10. NOD1CARD Might Be Using Multiple Interfaces for RIP2-Mediated CARD-CARD Interaction: Insights from Molecular Dynamics Simulation.

    Directory of Open Access Journals (Sweden)

    Jitendra Maharana

    Full Text Available The nucleotide-binding and oligomerization domain (NOD-containing protein 1 (NOD1 plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2 for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2 helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs. The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface, respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes.

  11. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  12. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  13. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  14. Thermorewritable card by using dyes; Senryo wo mochiita kakikae kanona card

    Energy Technology Data Exchange (ETDEWEB)

    Muto, Y.

    1998-06-01

    Described herein are thermorewritable cards which use dyes. Rewritable cards, mainly used for membership and point cards, are themselves used repeatedly and required to be rewritable repeatedly for information they carry. The dyes and developers used for the conventional heat- and pressure-sensitive papers are colorless, leuco-dye precursors and acidic compounds with a phenolic hydroxyl group or the like. They transfer electrons to each other, opening the lactone ring of the dye precursor to develop the color. Developing and erasing the color are reversible chemical reactions, where the color is developed under heat and maintained by quenching. For erasing the color, it is heated and then slowly cooled to separate the precursor and developer phases from each other. A printer (thermal head) is required for developing and erasing a color. Durability under various conditions is another requirement of the card; it must be adaptable to weather conditions and resistant to sweat. The new thermorewritable card is protected from various adverse effects on its chemical reactions, and made as durable as the conventional cards. 3 refs., 5 figs., 1 tab.

  15. Smart Grid: Smart Customer Policy Needs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    In September 2010, the International Energy Agency (IEA) held a workshop on the regulatory, market and consumer policies necessary to ensure that smart grids are deployed with adequate consideration of their risks and benefits to all stakeholders. This was one of several workshops that brought together energy providers, network operators, technology developers, regulators, customers and government policy makers to discuss smart grid technology and policy. The Smart Grid - Smart Customer Policies workshop allowed stakeholders to: gain a perspective on key issues and barriers facing early deployment of smart grids; hear expert opinion on regulatory, consumer and market challenges to smart grids; discuss smart grid-smart customer policy priorities; and build consensus on the technology and policy ingredients needed for customer-friendly smart grid deployments. Drawing on workshop discussions, the following paper lays out a logical framework to maximise the benefits and minimise the risks that smart grids pose for customers. The paper also describes key policy research questions that will guide future IEA research on this topic.

  16. Development of smart nuclear instrumentation for reactors

    International Nuclear Information System (INIS)

    Chaganty, S.P.; Das, D.; Bhatnagar, P.V.; Das, A.; Sreedharan, Preetha; Kataria, S.K.

    2001-01-01

    Variety of nuclear instruments are required for different applications in reactors such as reactor start-up, reactor protection and regulating system, area monitoring, failed fuel detection, stack monitoring etc. Attempts are made to develop a standardized microcomputer based hardware for configuring different types of instruments. PC architecture is chosen due to easy availability of components/boards and software. These instruments have dual redundant Network Interface Cards for connecting to a Primary Radiation Data LAN which in turn can be connected to Plant Information Bus through Gateways. These SMART instruments can be tested/calibrated through specific commands from remote computers connected over the LAN. This paper describes the various issues involved and the design details. (author)

  17. The Cardiology Audit and Registration Data Standards (CARDS), European data standards for clinical cardiology practice

    NARCIS (Netherlands)

    M.R. Flynn (Rachel); C. Barrett (Conor); F.G. Cosio (Francisco); A.K. Gitt (Anselm); L.C. Wallentin (Lars); P. Kearney (Peter); M. Lonergan (Moira); E. Shelley (Emer); M.L. Simoons (Maarten)

    2005-01-01

    textabstractAIMS: Systematic registration of data from clinical practice is important for clinical care, local, national and international registries, and audit. Data to be collected for these different purposes should be harmonized. Therefore, during Ireland's Presidency of the European Union (EU)

  18. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database (Ethernet and wire-less cards) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (security problems, viruses, etc.) • Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) • Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/registerVisitorComp...

  19. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database including all network access cards (Ethernet AND wireless) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (e.g. security problems, viruses, etc.) Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/regis...

  20. "Smart pebble" designs for sediment transport monitoring

    Science.gov (United States)

    Valyrakis, Manousos; Alexakis, Athanasios; Pavlovskis, Edgars

    2015-04-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions.

  1. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  2. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  3. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  4. Multi-operation cryptographic engine: VLSI design and implementation

    International Nuclear Information System (INIS)

    Selimis, George; Koufopavlou, Odysseas

    2005-01-01

    The environment of smart card lacks of system resources but the commercial and economic transactions via smart cards demand the use of certificated and secure cryptographic methods. In this paper a cryptographic approach in hardware for smart cards is proposed. The proposed system supports two basic operations of cryptography, authentication and encryption. The basic component of system is the one round of DES algorithm which supports the DES, Triple DES and the ANSI X9.17 standards. The proposed system is efficient in terms of area resources and techniques for low power consumption have applied. Due to the fact that the system is for smart card applications the overall throughput outperforms the typical smart card throughput standards

  5. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  6. An Efficient Authentication Method For Smart Card Verification In Online

    Directory of Open Access Journals (Sweden)

    Kanamarlapudi Venkata Srinivasa Rao

    2017-08-01

    Full Text Available The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and managing here we have tendency to are presenting the three level confirmations. In arranged approach there are two stages i.e. Enlistment and login. All through enlistment part control the word which can figure and separated into two segments i.e. parcel one can keep inside the client or customer viewpoint, segment a couple of can keep in server perspective. Next level is to exchange the client icon which can figure and split into two shares each are keep severally. In the end zero information code will be get refreshed and it’s furthermore get keep as two components. All through the login part before starting the managing the client and server ought to uncover their three-genuine data offers if each stacked data got coordinate then the client is legitimate and server isn’t a phishing site.

  7. "Smart pebble" design for environmental monitoring applications

    Science.gov (United States)

    Valyrakis, Manousos; Pavlovskis, Edgars

    2014-05-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, while focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions. "Smart pebble" allows for a wider range of environmental sensors (e.g. for environmental/pollutant monitoring) to be incorporated so as to extend the range of its application, enabling accurate environmental monitoring which is required to ensure infrastructure resilience and preservation of ecological health.

  8. Smart grid

    International Nuclear Information System (INIS)

    Choi, Dong Bae

    2001-11-01

    This book describes press smart grid from basics to recent trend. It is divided into ten chapters, which deals with smart grid as green revolution in energy with introduction, history, the fields, application and needed technique for smart grid, Trend of smart grid in foreign such as a model business of smart grid in foreign, policy for smart grid in U.S.A, Trend of smart grid in domestic with international standard of smart grid and strategy and rood map, smart power grid as infrastructure of smart business with EMS development, SAS, SCADA, DAS and PQMS, smart grid for smart consumer, smart renewable like Desertec project, convergence IT with network and PLC, application of an electric car, smart electro service for realtime of electrical pricing system, arrangement of smart grid.

  9. Big Data in Transport Geography

    DEFF Research Database (Denmark)

    Reinau, Kristian Hegner; Agerholm, Niels; Lahrmann, Harry Spaabæk

    for studies that explicitly compare the quality of this new type of data to traditional data sources. With the current focus on Big Data in the transport field, public transport planners are increasingly looking towards smart card data to analyze and optimize flows of passengers. However, in many cases...... it is not all public transport passengers in a city, region or country with a smart card system that uses the system, and in such cases, it is important to know what biases smart card data has in relation to giving a complete view upon passenger flows. This paper therefore analyses the quality and biases...... of smart card data in Denmark, where public transport passengers may use a smart card, may pay with cash for individual trips or may hold a season ticket for a certain route. By analyzing smart card data collected in Denmark in relation to data on sales of cash tickets, sales of season tickets, manual...

  10. Smart mobility in smart cities

    Energy Technology Data Exchange (ETDEWEB)

    Baucells, Aleta N.

    2016-07-01

    Cities are currently undergoing a transformation into the Smart concept, like Smartphones or SmartTV. Many initiatives are being developed in the framework of the Smart Cities projects, however, there is a lack of consistent indicators and methodologies to assess, finance, prioritize and implement this kind of projects. Smart Cities projects are classified according to six axes: Government, Mobility, Environment, Economy, People and Living. (Giffinger, 2007). The main objective of this research is to develop an evaluation model in relation to the mobility concept as one of the six axes of the Smart City classification and apply it to the Spanish cities. The evaluation was carried out in the 62 cities that made up in September 2015 the Spanish Network of Smart Cities (RECI- Red Española de Ciudades Inteligentes). This research is part of a larger project about Smart Cities’ evaluation (+CITIES), the project evaluates RECI’s cities in all the axes. The analysis was carried out taking into account sociodemographic indicators such as the size of the city or the municipal budget per inhabitant. The mobility’s evaluation in those cities has been focused in: sustainability mobility urban plans and measures to reduce the number of vehicles. The 62 cities from the RECI have been evaluated according to their degree of progress in several Smart Cities’ initiatives related to smart mobility. The applied methodology has been specifically made for this project. The grading scale has different ranks depending on the deployment level of smart cities’ initiatives. (Author)

  11. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  12. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  13. Smart assistants for smart homes

    OpenAIRE

    Rasch, Katharina

    2013-01-01

    The smarter homes of tomorrow promise to increase comfort, aid elderly and disabled people, and help inhabitants save energy. Unfortunately, smart homes today are far from this vision – people who already live in such a home struggle with complicated user interfaces, inflexible home configurations, and difficult installation procedures. Under these circumstances, smart homes are not ready for mass adoption. This dissertation addresses these issues by proposing two smart assistants for smart h...

  14. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  15. Diseño de una Guía para la Implementación del Proyecto de Tarjetas Inteligentes Aplicado en el Sector Financiero del Ecuador, Basada en el Estándar de Administración de Proyectos Desarrollado por el “Project Management Institute”

    OpenAIRE

    Vera Toscano, Claudia Gabriela

    2015-01-01

    This paper is intended to be guide towards the implementation of smart card technology by Ecuadorian financial institutions. Smart Card project will increase customers information security for both credit and debit card transactions. Smart cards contain an integrated circuit, which can include embedded applications that allow information stored in it to be encrypted, making more difficult to apply unauthorized cloning procedures. This reduces cloning and improves control and risk management w...

  16. Smart energy and smart energy systems

    DEFF Research Database (Denmark)

    Lund, Henrik; Østergaard, Poul Alberg; Connolly, David

    2017-01-01

    In recent years, the terms “Smart Energy” and “Smart Energy Systems” have been used to express an approach that reaches broader than the term “Smart grid”. Where Smart Grids focus primarily on the electricity sector, Smart Energy Systems take an integrated holistic focus on the inclusion of more...... sectors (electricity, heating, cooling, industry, buildings and transportation) and allows for the identification of more achievable and affordable solutions to the transformation into future renewable and sustainable energy solutions. This paper first makes a review of the scientific literature within...... the field. Thereafter it discusses the term Smart Energy Systems with regard to the issues of definition, identification of solu- tions, modelling, and integration of storage. The conclusion is that the Smart Energy System concept represents a scientific shift in paradigms away from single-sector thinking...

  17. Point card compatible automatic vending machine for canned drink; Point card taio kan jido hanbaiki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)

  18. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  19. Synergisms between smart metering and smart grid; Synergien zwischen Smart Metering und Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Maas, Peter [IDS GmbH, Ettlingen (Germany)

    2010-04-15

    With the implementation of a smart metering solution, it is not only possible to acquire consumption data for billing but also to acquire relevant data of the distribution grid for grid operation. There is still a wide gap between the actual condition and the target condition. Synergies result from the use of a common infrastructure which takes account both of the requirements of smart metering and of grid operation. An open architecture also enables the future integration of further applications of the fields of smart grid and smart home. (orig.)

  20. Smart Cities for Smart Children

    DEFF Research Database (Denmark)

    Rehm, Matthias; Jensen, Martin Lynge; Wøldike, Niels Peter

    This position paper presents the concept of smart cities for smart children before highlighting three concrete projects we are currently running in order to investigate different aspects of the underlying concept like social-relational interaction and situated and experiential learning.......This position paper presents the concept of smart cities for smart children before highlighting three concrete projects we are currently running in order to investigate different aspects of the underlying concept like social-relational interaction and situated and experiential learning....

  1. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  2. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  3. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  4. 78 FR 31523 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2013-05-24

    ... of a letter to the Speaker of the House of Representatives, Transmittals 13-07 with attached... Units, Multi-role Electro-Optic End-to-End test set, Card Memory, Smart Cards, and Support Equipment..., Card Memory, Smart Cards, and Support Equipment, Consumables, and Flight Test/Certification. Also...

  5. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  6. Event building in an intelligent network interface card for the LHCb readout network

    CERN Document Server

    Dufey, J P; Neufeld, N; Zuin, M

    2001-01-01

    LHCb is an experiment being constructed at CERN's LHC accelerator for the purpose of studying precisely the CP violation parameters in the B-B system. Triggering poses special problems since the interesting events containing B-mesons are immersed in a large background of inelastic p-p reactions. Therefore, a 4 Level Triggering scheme (Level 0 to Level 3) has been implemented. Powerful embedded processors, used in modern intelligent Network Interface Cards (smart NICs), make it attractive to use them to handle the event building protocol in the high-speed data acquisition system of the LHCb experiment. The implementation of an event building algorithm developed for a specific Gigabit Ethernet NIC is presented and performance data are discussed. 5 Refs.

  7. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  8. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  9. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    Science.gov (United States)

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  10. 78 FR 68981 - Electronic Retirement Processing

    Science.gov (United States)

    2013-11-18

    .... Digitized signature means a graphical image of a handwritten signature usually created using a special... document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or ``chip'' that can generate, store, or process data. A smart card can be used to...

  11. 78 FR 30896 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2013-05-23

    ... following is a copy of a letter to the Speaker of the House of Representatives, Transmittals 13-08 with... Electro-Optic End-to-End test set, Card Memory, Smart Cards, and Support Equipment, Consumables, and...-Optic End- to-End test set, Card Memory, Smart Cards, and Support Equipment, Consumables, and Flight...

  12. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  13. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  14. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  15. Multifunction system service students and staff of higher education institutions by the example of ENGECON based on solutions IT -Card

    Directory of Open Access Journals (Sweden)

    Kulakova Ekaterina Yurevna

    2011-03-01

    Full Text Available This work is devoted to the creation of multifunctional system service students and staff of universities based on smart card using the concept of electronic "purse." Experience of other countries with a similar solution shows that the system allows the university to significantly reduce maintenance costs of its activities and at the same time improve the quality of services provided. Also in this paper present my vision of the problem and its solution in our university - ENGECON.

  16. 5 CFR 850.103 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... graphical image of a handwritten signature, usually created using a special computer input device, such as a... recipients of the electronic document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or “chip” that can generate, store, or process data. A smart card...

  17. 78 FR 14233 - Electronic Retirement Processing

    Science.gov (United States)

    2013-03-05

    ... as the private key, is used to verify the signature. Digitized signature means a graphical image of a... recipients of the electronic document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or ``chip'' that can generate, store, or process data. A smart card...

  18. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  19. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  20. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  1. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.

  2. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  3. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  4. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    Science.gov (United States)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  5. Clearing and settlement of interbank card transactions: a MasterCard tutorial for Federal Reserve payments analysts

    OpenAIRE

    Susan Herbst-Murphy

    2013-01-01

    The Payment Cards Center organized a meeting at which senior officials from MasterCard shared information with Federal Reserve System payments analysts about the clearing and settlement functions that MasterCard performs for its client banks. These functions involve the transfer of information pertaining to card-based transactions (clearing) and the exchange of monetary value (settlement) that takes place between the banks whose customers are cardholders and those banks whose customers are ca...

  6. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  7. Smart learning services based on smart cloud computing.

    Science.gov (United States)

    Kim, Svetlana; Song, Su-Mi; Yoon, Yong-Ik

    2011-01-01

    Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user's behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S)--smart pull, smart prospect, smart content, and smart push--concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users' needs by collecting and analyzing users' behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users' behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users.

  8. Smart Learning Services Based on Smart Cloud Computing

    Directory of Open Access Journals (Sweden)

    Yong-Ik Yoon

    2011-08-01

    Full Text Available Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user’s behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S—smart pull, smart prospect, smart content, and smart push—concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users’ needs by collecting and analyzing users’ behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users’ behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users.

  9. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  10. Smarter energy from smart metering to the smart grid

    CERN Document Server

    Sun, Hongjian; Poor, H Vincent; Carpanini, Laurence; Fornié, Miguel Angel Sánchez

    2016-01-01

    This book presents cutting-edge perspectives and research results in smart energy spanning multiple disciplines across four main topics: smart metering, smart grid modeling, control and optimisation, and smart grid communications and networking.

  11. The European Commission's Decision in MasterCard : Issues Facing the Payment Card Industry for the Future

    OpenAIRE

    John Wotton

    2008-01-01

    The Decision in MasterCard displays a fundamental divergence between the Commission’s and MasterCard’s approaches to the analysis of the competitive effects of open payment card schemes.

  12. 75 FR 52515 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-26

    ... August 16, 2010, to the House Committee on Oversight and Government Reform, the Senate Committee on... equipped with ``Smart Card'' technology that requires the insertion of an embedded identification card and... system-generated, forced password-change protocols and also equipped with ``Smart Card'' technology that...

  13. Challenging 'smart' in smart city strategies

    DEFF Research Database (Denmark)

    Sandvik, Kjetil; Knudsen, Jacob

    and development. Focusing on processes of citizen participation and co-creation as the main driving force, we introduce a concept of 'smart city at eye level'. The introduction of new media technology and new media uses need to emerge from a profound understanding of the wants, needs and abilities of the citizens......Smart city strategies concern the improvement of economic and political efficiency and the enabling of social, cultural and urban development (Hollands 2008) and covers a variety of fields from improving infrastructures, social and cultural development, resilience strategies (e.g. green energy......), improving schools, social welfare institutions, public and private institutions etc. The 'smart' in smart city strategies implies that these efforts are accomplished by the introduction and embedding of smart media technology into the very fabric of society. This is often done in a top-down and technology...

  14. PROTOTIPE KANTIN TANPA UANG BERBASIS KARTU PINTAR

    Directory of Open Access Journals (Sweden)

    Paulus Insap Santosa

    2010-01-01

    Full Text Available This paper presents a desktop application prototype that uses smart cards for payment mode without cash transaction at a canteen. Smart cards, used for authentication, are also designed to have information of cash balance and some personal data of card holders. Application developed is still a prototype that has not connected into the banking system to refill the balance into the smart card. This prototype is a desktop application. Features that have been successfully developed and run well in these applications include food settings, user settings, and reports sales per period.

  15. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  16. Realisering af Smart City/Smart House i Nordjylland

    DEFF Research Database (Denmark)

    Lindgren, Peter; Saghaug, Kristin Margrethe

    2008-01-01

    beskriver tankerne, visionerne og perspektiverne i forhold til at realisere Smart House-konceptet i Region Nordjylland. Smart House-tankerne er baseret på at bygge smarte huse og smarte byggekomponenter til fremtidens brugere, hvor den nyeste teknologi indenfor byggematerialer kombineres med nye værdier....... Formålet med Smart House Nordjylland er at flytte byggeindustriens og forskernes fokus fra en indbyrdes konkurrence lokalt til et udviklende innovationssamarbejde, som sigter mod det globale marked. På denne måde kan regionen skabe et udstillingsvindue indenfor fremtidens byggeri gennem en interaktion...

  17. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  18. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  19. A Smart Home Center Platform Solution Based on Smart Mirror

    Directory of Open Access Journals (Sweden)

    Deng Xibo

    2017-01-01

    Full Text Available With the popularization of the concept of smart home, people have raised requirements on the experience of smart living. A smart home platform center solution is put forward in order to solve the intelligent interoperability and information integration of smart home, which enable people to have a more intelligent and convenient life experience. This platform center is achieved through the Smart Mirror. The Smart Mirror refers to a smart furniture, on the basis of the traditional concept of mirror, combining Raspberry Pi, the application of one-way mirror imaging principle, the touch-enabled design, voice and video interaction. Smart Mirror can provide a series of intelligent experience for the residents, such as controlling all the intelligent furniture through Smart Mirror; accessing and displaying the weather, time, news and other life information; monitoring the home environment; remote interconnection operation.

  20. READING, PREPROCESSING OF ACCELERATIONS AND CORNERS INCLINATION WITH MPU-6050 I RECORD THEM ON SD-CARD THE ARDUINO DUE

    Directory of Open Access Journals (Sweden)

    V. G. Mikhailov

    2016-01-01

    Full Text Available The short review of microcontrollers of family Arduino, their characteristics and application fields is given. Importance of record of parameters of researched object is marked to produce debugging of control systems on microcontrollers Arduino. Unique possibility of registration of parameters in family Arduino is record on SD a card in an alpha mode with usage of functions print (, write (. The problems connected to record of the binary data on SD a card on microcontroller Arduino Due are considered. The analysis of methods of record of the binary data on SD-card Arduino Due, originating problems with neocleaning of memory from the previous program leading to possibility of duplication of the data on SD to a card, presence of the erratic point of view about restriction of volumes of data record and necessity of usage become outdated SD-cards is carried out. Ways of elimination of the marked lacks are considered. The estimation of high-speed performance of various approaches of a data recording on SD a card is led. On the basis of the led researches the approach of multiplexing of the writeable information at the expense of conversion of the binary data is offered is byte-serial in a character array in code ASCI without magnification of their volume and record by units on 240 byte. It allows to use as much as possible standard function possibilities write ( Arduino and specificity of the organization of memory SD of cards and to increase high-speed performance more than in 1100 times in comparison with record in a character type on one byte.It is marked that usage of decisions of an exception of duplication of the data offered at forums does not provide completeness of their elimination. For Arduino Due for storage cleaning it is necessary usages of the special programmator or setting of the new program of loading.

  1. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  2. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  3. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  4. Smart City and Smart Tourism: A Case of Dubai

    Directory of Open Access Journals (Sweden)

    M. Sajid Khan

    2017-12-01

    Full Text Available Over the past decade, the advent of new technology has brought about the emergence of smart cities aiming to provide their stakeholders with technology-based solutions that are effective and efficient. Insofar as the objective of smart cities is to improve outcomes that are connected to people, systems and processes of businesses, government and other public- and private-sector entities, its main goal is to improve the quality of life of all residents. Accordingly, smart tourism has emerged over the past few years as a subset of the smart city concept, aiming to provide tourists with solutions that address specific travel related needs. Dubai is an emerging tourism destination that has implemented smart city and smart tourism platforms to engage various stakeholders. The objective of this study is to identify best practices related to Dubai’s smart city and smart tourism. In so doing, Dubai’s mission and vision along with key dimensions and pillars are identified in relation to the advancements in the literature while highlighting key resources and challenges. A Smart Tourism Dynamic Responsive System (STDRS framework is proposed while suggesting how Dubai may able to enhance users’ involvement and their overall experience.

  5. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  6. Smart Sensors Enable Smart Air Conditioning Control

    Directory of Open Access Journals (Sweden)

    Chin-Chi Cheng

    2014-06-01

    Full Text Available In this study, mobile phones, wearable devices, temperature and human motion detectors are integrated as smart sensors for enabling smart air conditioning control. Smart sensors obtain feedback, especially occupants’ information, from mobile phones and wearable devices placed on human body. The information can be used to adjust air conditioners in advance according to humans’ intentions, in so-called intention causing control. Experimental results show that the indoor temperature can be controlled accurately with errors of less than ±0.1 °C. Rapid cool down can be achieved within 2 min to the optimized indoor capacity after occupants enter a room. It’s also noted that within two-hour operation the total compressor output of the smart air conditioner is 48.4% less than that of the one using On-Off control. The smart air conditioner with wearable devices could detect the human temperature and activity during sleep to determine the sleeping state and adjusting the sleeping function flexibly. The sleeping function optimized by the smart air conditioner with wearable devices could reduce the energy consumption up to 46.9% and keep the human health. The presented smart air conditioner could provide a comfortable environment and achieve the goals of energy conservation and environmental protection.

  7. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  8. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  9. Smart business for smart users? : A social science agenda for developing smart grids

    NARCIS (Netherlands)

    Verbong, G.P.J.; Verkade, N.; Verhees, B.; Huijben, J.C.C.M.; Höffken, J.I.; Beaulieu, A.; de Wilde, J.; Scherpen, J.M.A.

    2016-01-01

    The promise of smart grids is very attractive. However, it is not yet clear what the future smart grid will look like. Although most researchers acknowledge that users will play a more prominent role in smart grids, there is a lot of uncertainty on this issue. To counter the strong techno-logical

  10. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  11. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  12. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  14. Smart Meter Rollout: Intelligente Messsysteme als Schnittstelle zum Kunden im Smart Grid und Smart Market

    Science.gov (United States)

    Vortanz, Karsten; Zayer, Peter

    Das Gesetz zur Digitalisierung der Energiewende ist verabschiedet. Ab 2017 sind moderne Messeinrichtungen (mME) und intelligente Messsysteme (iMSys) zu verbauen und zu betreiben. Der "deutsche Weg" für die Einführung von Smart Metern sieht einen stufenweisen Rollout sowie ein Höchstmaß an Informations- und Datensicherheit vor. Dabei spielen iMSys und mME eine wichtige Rolle bei der Neugestaltung der intelligenten Netze (Smart Grids) und des neuen Marktmodells (Smart Market). Dieser Beitrag beschäftigt sich mit den neuen Gesetzen, den Marktrollen und ihren Aufgaben, Datenschutz und Datensicherheit, dem iMSys als sichere Lösung, dem sicheren Betrieb von Smart Meter Gateways, Smart Grid - Smart Market, dem Zusammenspiel zwischen reguliertem Bereich und Markt, den Einsatzbereichen der iMSys sowie den Auswirkungen auf Prozesse und Systeme und gibt Handlungsempfehlungen.

  15. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  16. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  17. From Smart Rooms to Smart Hotels

    OpenAIRE

    Petrevska, Biljana; Cingoski, Vlatko; Gelev, Saso

    2016-01-01

    This paper gives an overview of a potential path that new hotels have to satisfy to improve their status from a hotel with smart rooms towards a full-scale smart hotel facility. It presents a possible transitional way including innovative applications based on modern information technology for ambient settings in the domain of hotel industry that aims to improve the quality of offered services towards clients, starting from the present level of smart rooms. The main objective i...

  18. From climate-smart agriculture to climate-smart landscapes

    Directory of Open Access Journals (Sweden)

    Scherr Sara J

    2012-08-01

    Full Text Available Abstract Background For agricultural systems to achieve climate-smart objectives, including improved food security and rural livelihoods as well as climate change adaptation and mitigation, they often need to be take a landscape approach; they must become ‘climate-smart landscapes’. Climate-smart landscapes operate on the principles of integrated landscape management, while explicitly incorporating adaptation and mitigation into their management objectives. Results An assessment of climate change dynamics related to agriculture suggests that three key features characterize a climate-smart landscape: climate-smart practices at the field and farm scale; diversity of land use across the landscape to provide resilience; and management of land use interactions at landscape scale to achieve social, economic and ecological impacts. To implement climate-smart agricultural landscapes with these features (that is, to successfully promote and sustain them over time, in the context of dynamic economic, social, ecological and climate conditions requires several institutional mechanisms: multi-stakeholder planning, supportive landscape governance and resource tenure, spatially-targeted investment in the landscape that supports climate-smart objectives, and tracking change to determine if social and climate goals are being met at different scales. Examples of climate-smart landscape initiatives in Madagascar’s Highlands, the African Sahel and Australian Wet Tropics illustrate the application of these elements in contrasting contexts. Conclusions To achieve climate-smart landscape initiatives widely and at scale will require strengthened technical capacities, institutions and political support for multi-stakeholder planning, governance, spatial targeting of investments and multi-objective impact monitoring.

  19. The smart energy world from a competition point of view. An interaction between smart customers, smart market and smart grids; Die Smarte Energiewelt aus wettbewerblicher Sicht. Ein Zusammenspiel aus Smarten Kunden, Smart Market und Smarten Netzen

    Energy Technology Data Exchange (ETDEWEB)

    Wiechmann, Holger [EnBW Vertrieb GmbH, Stuttgart (Germany)

    2012-07-01

    Everybody is talking about the ''Energiewende, the Smart Energy World and about ''Smart Market / Smart Grids'', but almost no one knows, what it exactly means. But the ''Energiewende'' is already coming. The entire energy sector and particularly the elctricity industry are evolving towards decentralized structures mainly based on renewable energies. Not only the growth in fluctuating power generation from renewable energy sources like wind and photovoltaic but also their consumption on a local basis are calling for new ways of decentralized managing energy and for further developed market rules. The interaction of all stakeholders (customer, market players, grid operators, authorities) in a Smart Market/Smart Grid environment is required to successfully implement an efficient ''Energiewende''. Derived from the different interests of these stakeholders, the paper describes a system and roles within this system. It shows how Smart Market and Smart Grid can interact corresponding to the guidelines of German Regulator recently published. (orig.)

  20. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  1. Smart market. From smart grid to the intelligent energy market; Smart Market. Vom Smart Grid zum intelligenten Energiemarkt

    Energy Technology Data Exchange (ETDEWEB)

    Aichele, Christian [Hochschule Kaiserslautern, Zweibruecken (Germany). Fachbereich Betriebswirtschaft; Doleski, Oliver D. (ed.)

    2014-07-01

    Dare more market. - The design of this postulate provides an important contribution to the success of the German energy transition. The Bundesnetzagentur has shown with its highly regarded benchmark paper on smart grids and markets leads the way towards more market in the energy sector. The therein required differentiation in a network and market sphere contributes to greater transparency on the consumer side and enables a gid releaving shift in energy consumption. The book focuses on actors and roles in the modified market circumstances as well as components and products of a future Smart Markets. Finally, to the reader concrete business models are offered. Authors from science and practice give in this book answers on how the interaction of Smart Grid and Smart Market works. [German] Mehr Markt wagen. - Die Ausgestaltung dieses Postulats liefert einen wichtigen Beitrag zum Gelingen der deutschen Energiewende. Die Bundesnetzagentur hat mit ihrem vielbeachteten Eckpunktepapier zu intelligenten Netzen und Maerkten diesen Weg in Richtung mehr Markt in der Energiewirtschaft gewiesen. Die darin geforderte Differenzierung in eine Netz- und Marktsphaere traegt zu mehr Transparenz auf der Verbraucherseite bei und ermoeglicht eine netzentlastende Verlagerung des Energieverbrauchs. Das Buch beleuchtet Akteure und Rollen im geaenderten Marktumfeld ebenso wie Komponenten und Produkte eines zukuenftigen Smart Markets. Schliesslich werden dem Leser konkrete Geschaeftsmodelle angeboten. Autoren aus Wissenschaft und Praxis geben in diesem Buch Antworten darauf, wie das Zusammenspiel von Smart Grid und Smart Market funktioniert.

  2. Smart Metering. Technological, economic and legal aspects. 2. ed.; Smart Metering. Technologische, wirtschaftliche und juristische Aspekte des Smart Metering

    Energy Technology Data Exchange (ETDEWEB)

    Koehler-Schute, Christiana (ed.)

    2010-07-01

    Smart metering comprises more than just meter technology, and the use of information and communication technologies is indispensable. Processes, roles and business models must be reconsidered as further challenges arise in the context of smart metering. For one, there is the operator of the metering points. Secondly, there is the end user who is in the role of an active market partner. Further, there is smart metering as a basic technology, e.g. for smart grids and smart homes. In spite of the need for action, many utilities are reluctant to introduce smart metering. Reasons for this are the cost, a lack of defined standards, and an unclear legal situation. On the other hand, smart metering offers potential for grids and distribution that should be made use of. The authors discuss all aspects of the subject. The point out the chances and limitations of smart metering and present their own experience. [German] Smart Metering geht weit ueber die Zaehlertechnologie hinaus und der Einsatz von Informations- und Kommunikationstechnologien ist unabdingbar. Damit einhergehend muessen Prozesse, Rollen und auch Geschaeftsmodelle neu durchdacht werden. Denn weitere Herausforderungen stehen im direkten Zusammenhang mit Smart Metering. Das ist zum einen die Rolle des Messstellenbetreibers / Messdienstleisters. Das ist zum anderen der Endnutzer, dem die Rolle des aktiven Marktpartners zugedacht wird. Das ist des Weiteren das Smart Metering als Basistechnologie beispielsweise fuer Smart Grid und Smart Home. Trotz des Handlungsdrucks stehen viele Unternehmen der Energiewirtschaft dem Smart Metering zurueckhaltend gegenueber. Drei gewichtige Gruende werden ins Feld gefuehrt: die Kostenfrage, nicht definierte Standards und die in vielen Bereichen ungeklaerte Gesetzeslage. Demgegenueber bietet das Smart Metering Potenziale fuer Netz und Vertrieb, die es zu nutzen gilt. Die Autoren setzen sich in ihren Beitraegen mit diesen Themen auseinander, zeigen Chancen, aber auch Grenzen des

  3. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  4. Privacy-Preserving Smart Metering with Authentication in a Smart Grid

    Directory of Open Access Journals (Sweden)

    Jun Beom Hur

    2015-12-01

    Full Text Available The traditional security objectives of smart grids have been availability, integrity, and confidentiality. However, as the grids incorporate smart metering and load management, user and corporate privacy is increasingly becoming an issue in smart grid networks. Although transmitting current power consumption levels to the supplier or utility from each smart meter at short intervals has an advantage for the electricity supplier’s planning and management purposes, it threatens user privacy by disclosing fine-grained consumption data and usage behavior to utility providers. In this study, we propose a distributed incremental data aggregation scheme where all smart meters on an aggregation path are involved in routing the data from the source meter to the collection unit. User privacy is preserved by symmetric homomorphic encryption, which allows smart meters to participate in the aggregation without seeing any intermediate or final result. Aggregated data is further integrated with an aggregate signature to achieve data integrity and smart meter authentication in such a way that dishonest or fake smart meters cannot falsify data en route. Only the collection unit can obtain the aggregated data and verify its integrity while the individual plain data are not exposed to the collection unit. Therefore, user privacy and security are improved for the smart metering in a smart grid network.

  5. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  6. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  7. Card products market in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Ivana Šučur

    2007-12-01

    Full Text Available Card business in the Republic of Croatia started to develop more than 30 years ago in the form of non-bank card products, issued by American Express and Diners Club global payment systems. These card products were defined as standard charge cards and had been the only card products present in the market until bank cards appeared about ten years ago. The situation changed completely when banks started to enter the market as active participants in the card business. In co-operation with bank global payment systems, MasterCard Worldwide and Visa International, banks have issued several millions of various cards in just a few years, while non-bank issuers have followed the same trend with new card products. This paper explores the current situation in the domestic market; it determines who the cardholders of particular products are, which products they are familiar with, whether they use them or not and for what reason. Cardholders’ opinions, attitudes and preferences towards existing products have been explored, as well as the benefits they would like to get. The results obtained imply that cardholders are familiar with all bank and non-bank card brands, but that they use mostly those which provide them with specific benefits. Therefore, instead of focusing on providing more similar products, issuers should concentrate on designing differentiated products that have been tailored to cardholders’ real needs.

  8. In vivo estimation of target registration errors during augmented reality laparoscopic surgery.

    Science.gov (United States)

    Thompson, Stephen; Schneider, Crispin; Bosi, Michele; Gurusamy, Kurinchi; Ourselin, Sébastien; Davidson, Brian; Hawkes, David; Clarkson, Matthew J

    2018-06-01

    Successful use of augmented reality for laparoscopic surgery requires that the surgeon has a thorough understanding of the likely accuracy of any overlay. Whilst the accuracy of such systems can be estimated in the laboratory, it is difficult to extend such methods to the in vivo clinical setting. Herein we describe a novel method that enables the surgeon to estimate in vivo errors during use. We show that the method enables quantitative evaluation of in vivo data gathered with the SmartLiver image guidance system. The SmartLiver system utilises an intuitive display to enable the surgeon to compare the positions of landmarks visible in both a projected model and in the live video stream. From this the surgeon can estimate the system accuracy when using the system to locate subsurface targets not visible in the live video. Visible landmarks may be either point or line features. We test the validity of the algorithm using an anatomically representative liver phantom, applying simulated perturbations to achieve clinically realistic overlay errors. We then apply the algorithm to in vivo data. The phantom results show that using projected errors of surface features provides a reliable predictor of subsurface target registration error for a representative human liver shape. Applying the algorithm to in vivo data gathered with the SmartLiver image-guided surgery system shows that the system is capable of accuracies around 12 mm; however, achieving this reliably remains a significant challenge. We present an in vivo quantitative evaluation of the SmartLiver image-guided surgery system, together with a validation of the evaluation algorithm. This is the first quantitative in vivo analysis of an augmented reality system for laparoscopic surgery.

  9. Smart metering gateway works as Smart Home Energy Manager; Smart Metering Gateway als Smart Home Energy Manager

    Energy Technology Data Exchange (ETDEWEB)

    Walter, Klaus-Dieter [SSV Software Systems GmbH, Hannover (Germany)

    2011-07-01

    The installation of smart meters together with real time consumption data visualization doesn't help to save energy CO2 emissions. With regards to refinancing options, the situation in Germany has been quite different since the middle of last year for buildings equipped with a photovoltaic system. If a heat pump system is also present, intelligent energy use in conjunction with smart meters can save considerable amounts of money. A Smart Home Energy Manager (SHEM) automates the energy saving. (orig.)

  10. Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

    Directory of Open Access Journals (Sweden)

    Michael Strasser

    2016-05-01

    Full Text Available The Internet of Things and Services (IoTS has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implementation incorporates findings from an empirical study and lessons learned from research projects. The elaborated ecosystem enables service request roaming between different parties across system boundaries. The paper presents a feasible centralized architecture, introduces involved parties and parts of a developed message protocol. Why a contracting mechanism is indispensable for request roaming is also outlined. The model’s feasibility is demonstrated by means of a current electric mobility use case: providing access to foreign charging infrastructure without multiple registrations. This work contributes to simplify the data exchange between service platforms to improve Smart City solutions and to support travelers with intelligent mobility applications.

  11. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  12. An integral effect test facility of the SMART, SMART ITL

    Energy Technology Data Exchange (ETDEWEB)

    Park, Hyun Sik; Moon, Sang Ki; Kim, Yeon Sik; Cho, Seok; Choi, Ki Yong; Bae, Hwang; Kim, Dong Eok; Choi, Nam Hyun; Min, Kyoung Ho; Ko, Yung Joo; Shin, Yong Cheol; Park, Rae Joon; Lee, Won Jae; Song, Chul Hwa; Yi, Sung Jae [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    SMART (System integrated Modular Advanced ReacTor) is a 330 MWth integral pressurized water reactor (iPWR) developed by KAERI and had obtained standard design approval (SDA) from Korean regulatory authority on July 2012. In this SMART design main components including a pressurizer, reactor coolant pumps and steam generators are installed in a reactor pressure vessel without any large connecting pipes. As the LBLOCA scenario is inherently excluded, its safety systems could be simplified only to ensure the safety during the SBLOCA scenarios and the other system transients. An integral effect test loop for the SMART (SMART ITL), or called as FESTA, had been designed to simulate the integral thermal hydraulic behavior of the SMART. The objectives of the SMART ITL are to investigate and understand the integral performance of reactor systems and components and the thermal hydraulic phenomena occurred in the system during normal, abnormal and emergency conditions, and to verify the system safety during various design basis events of the SMART. The integral effect test data will also be used to validate the related thermal hydraulic models of the safety analysis code such as TASS/SMR S, which is used for performance and accident analysis of the SMART design. This paper introduces the scaling analysis and scientific design of the integral test facility of the SMART, SMART ITL and its scaling analysis results.

  13. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  14. 2nd international KES conference on Smart Education and Smart e-Learning

    CERN Document Server

    Howlett, Robert; Jain, Lakhmi

    2015-01-01

    This book contains the contributions presented at the 2nd international KES conference on Smart Education and Smart e-Learning, which took place in Sorrento, Italy, June 17-19, 2015. It contains a total of 45 peer-reviewed book chapters that are grouped into several parts: Part 1 - Smart Education, Part 2 – Smart Educational Technology, Part 3 – Smart e-Learning, Part 4 – Smart Professional Training and Teachers’ Education, and Part 5 – Smart Teaching and Training related Topics.  This book can be a useful source of research data and valuable information for faculty, scholars, Ph.D. students, administrators, and practitioners  - those who are interested in innovative areas of smart education and smart e-learning.  .

  15. Smart Energy 2012. How smart is the way towards the turnaround in the energy policy; Smart Energy 2012. Wie smart ist der Weg zur Energiewende?

    Energy Technology Data Exchange (ETDEWEB)

    Grossmann, Uwe; Kunold, Ingo (eds.)

    2012-07-01

    The contribution under consideration contains fifteen contributions of well-known authors from commercial enterprises, public institutions and universities on smart energy: (1) Smart grids, but surely (Claudia Eckert); (2) Requirements concerning the further development of data protection and data security as part of the technological change (Reinhold Harnisch); (3) Standardization in the smart grid (Harald Orlamuender); (4) IEC 61850 - The standard for energy automation (Georg Harnischmacher); (5) Smart City, the intelligent grid in the city (Michael Laskowski); (6) IKT is a basis for a real smart power distribution system (Justus Bross); (7) Power transparency and optimized building optimization by means of a holistic automation concepts (Joerg Wollert); (8) Distributed architecture for a balancing aggregation of consumption and generation of power in private households (Kilian Hemmeboehle); (9) Development of an e-energy market place and first experiences from the field test in the E-DeMa project (Bernd Werner); (10) Smart metering rollout pilot ''30,000er'' (Axel Lauterkorn); (11) Experiences with the connexion and communication to smart meters in the project eTelligence (Guenter Pistoor); (12) Smart Phoenix - Intelligent energy networks in Dortmund (Roland Brueggemann); (13) Smart planning (C. Engels); Intelligent house control by means of smart metering (Sabine Wieland); (14) Dynamic billing of energy and value-added service in the networked home (Frank C. Bormann).

  16. Depression as a moderator of benefit from Media Smart: a school-based eating disorder prevention program.

    Science.gov (United States)

    Wilksch, Simon M; Wade, Tracey D

    2014-01-01

    To investigate if baseline depression moderated response to Media Smart, an 8-lesson school-based program previously found to achieve a long-term risk reduction effect in young adolescents. 540 Grade 8 students (M age = 13.62 years, SD = .37) from 4 schools participated with 11 classes receiving the Media Smart program (126 girls; 107 boys) and 13 comparison classes receiving their normal lessons (147 girls; 160 boys). Shape and weight concern, media internalization, body dissatisfaction, dieting, ineffectiveness, and perceived pressure were the outcome variables. Moderation was indicated by significant interaction effects for group (Media Smart; Control) × moderator (high depression; low depression) × time (post-program; 6-month follow-up; 2.5-year follow-up), with baseline entered as a covariate. Such effects were found for shape and weight concern, media internalization, body dissatisfaction, ineffectiveness and perceived pressure. Post-hoc testing found high depression Media Smart participants scored significantly lower than their control counterparts at post-program on shape and weight concern, media internalization and dieting, whereas low depression Media Smart participants scored significantly lower on shape and weight concern at 2.5-year follow-up. Media Smart achieved a reduction in eating disorder risk factors for high-depression participants and a reduced rate of growth in risk factor scores for low-depression participants. Trial registry name: Australian New Zealand Clinical Trials Registry. URL: http://www.anzctr.org.au. Registration identification number: ACTRN12608000545369. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  18. 3rd international KES conference on Smart Education and Smart e-Learning

    CERN Document Server

    Howlett, Robert; Jain, Lakhmi

    2016-01-01

    This book contains the contributions presented at the 3rd international KES conference on Smart Education and Smart e-Learning, which took place in Puerto de la Cruz, Tenerife, Spain, June 15-17, 2016. It contains a total of 56 peer-reviewed book chapters that are grouped into several parts: Part 1 - Smart University: Conceptual Modeling, Part 2 – Smart Education: Research and Case Studies, Part 3 – Smart e-Learning, Part 4 – Smart Education: Software and Hardware Systems, and Part 5 – Smart Technology as a Resource to Improve Education and Professional Training. We believe that the book will serve as a useful source of research data and valuable information for faculty, scholars, Ph.D. students, administrators, and practitioners - those who are interested in innovative areas of smart education and smart e-learning. .

  19. Smart governance for smart city

    Science.gov (United States)

    Mutiara, Dewi; Yuniarti, Siti; Pratama, Bambang

    2018-03-01

    Some of the local government in Indonesia claimed they already created a smart city. Mostly the claim based of IT utilization for their governance. In general, a smart city definition is to describe a developed urban area that creates sustainable economic development and high quality of life by excelling in multiple key; economy, mobility, environment, people, living, and government. For public services, the law guarantees good governance by setting the standard for e-government implicitly including for local government or a city. Based on the arguments, this research tries to test the condition of e-government of the Indonesian city in 34 provinces. The purpose is to map e-government condition by measuring indicators of smart government, which are: transparent governance and open data for the public. This research is departing from public information disclosure law and to correspond with the existence law. By examining government transparency, the output of the research can be used to measure the effectiveness of public information disclosure law and to determine the condition of e-government in local government in which as part of a smart city.

  20. Remote calibration system of a smart electrical energy meter

    Directory of Open Access Journals (Sweden)

    Zakariae Jebroni

    2017-12-01

    Full Text Available The need to control the power grid in real time has opened a new field of research, today researchers are trying to design electrical meters that are completely remote controlled, to create an advanced metering infrastructure. One of the most important processes in the field of measurement is the calibration of measuring instruments. The calibration process of the electrical meters was performed at laboratories. However, the new directives, now, require a regular test of accuracy. Nevertheless, moving each time on site to check the accuracy of a meter can be annoying. To solve this problem our contribution is to propose a new structure of a smart meter that integrates a calibration card, so that, this process is carried out remotely. To be able to calibrate the meter or test its accuracy, we have included an AC-AC converter powered by the electrical grid and that provides a stable voltage independent of the electrical grid in term of frequency and amplitude. The output voltage of the converter is used as the reference signal during calibration or accuracy testing. In this paper, we will present the structure of the calibration card, the study and dimensioning of the converter, as well as the control technique used to eliminate variations of the input voltage. At the end, we will present the results of simulations and experiments.

  1. Smart grids for smart cities: Smart energy management

    International Nuclear Information System (INIS)

    Kieny, Christophe

    2013-01-01

    Smart grids are currently a hot topic. Growing numbers of municipalities are experimenting with smart grids as the foundation for tomorrow's smart cities. And yet, end users are struggling to understand the innovative new energy distribution models just over the horizon. Our energy system is at a crossroads. And the coming years will tell us whether smart grids - whether they integrate renewable energy sources or not - will develop as a hybrid industry combining energy and IT or emerge as a full-fledged sector in and of itself. First and foremost, smart grids must be considered from a local, micro-economic standpoint, but one that also takes into account issues and interactions at the regional, national, EU, and global levels. Today, fighting climate change is a major challenge at both the national and global levels. The Kyoto Protocol and the Copenhagen Summit established a framework for crucial initiatives to combat climate change. The EU and France followed suit with their Climate and Energy Package and Grenelle de l'environnement environmental agenda. These policies set forth measures to fight climate change and to adapt to its impacts on people and the economy. France, for instance, set two basic targets to be achieved by 2020: - Make renewable energy a priority by promoting the development of energy from renewable sources to achieve the target of 23% renewables in the final energy mix. - Promote energy savings and increase energy efficiency by 20% and limit global warming to less than 2 deg. C over pre-industrial temperatures in industrialized nations by 2050 (around 1.2 deg. C above current temperatures). Tomorrow's grids will have to be smarter, which means incorporating information and communication technologies to provide the responsiveness and enhanced communication capabilities needed to meet the following challenges: - Integrating electricity from renewable sources; - Controlling demand; - Managing peak consumption; - Promoting widespread adoption of

  2. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  3. 12 CFR 226.12 - Special credit card provisions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  4. Noncontact power/interrogation system for smart structures

    Science.gov (United States)

    Spillman, William B., Jr.; Durkee, S.

    1994-05-01

    The field of smart structures has been largely driven by the development of new high performance designed materials. Use of these materials has been generally limited due to the fact that they have not been in use long enough for statistical data bases to be developed on their failure modes. Real time health monitoring is therefore required for the benefits of structures using these materials to be realized. In this paper a non-contact method of powering and interrogating embedded electronic and opto-electronic systems is described. The technique utilizes inductive coupling between external and embedded coils etched on thin electronic circuit cards. The technique can be utilized to interrogate embedded sensors and to provide > 250 mW for embedded electronics. The system has been successfully demonstrated with a number of composite and plastic materials through material thicknesses up to 1 cm. An analytical description of the system is provided along with experimental results.

  5. Big data, smart cities and city planning.

    Science.gov (United States)

    Batty, Michael

    2013-11-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London's public transport systems.

  6. SmartInspect: Smart Contract Inspection Technical Report

    OpenAIRE

    Bragagnolo , Santiago; Rocha , Henrique ,; Denker , Marcus; Ducasse , Stéphane

    2017-01-01

    Smart contracts are embedded procedures stored with the data they act upon. Debugging deployed Smart Contracts is a difficult task since once deployed, the code cannot be reexecuted and inspecting a simple attribute is not easily possible because data is encoded. In this technical report, we present SmartInspect to address the lack of inspectability of a deployed contract. Our solution analyses the contract state by using decompilation techniques and a mirror-based architecture to represent t...

  7. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  8. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  9. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  10. Determinants of debit cards acceptance: An empirical investigation

    International Nuclear Information System (INIS)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar; Bakri, Mohamed Hariri; Zulkepli, Jafri

    2014-01-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry

  11. Determinants of debit cards acceptance: An empirical investigation

    Energy Technology Data Exchange (ETDEWEB)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar [Faculty of Business and Management, Universiti Teknologi MARA, Melaka 75300 (Malaysia); Bakri, Mohamed Hariri [Faculty of Technology Management And Technopreneurship, Universiti Teknikal Malaysia, Melaka 76100 (Malaysia); Zulkepli, Jafri [Faculty of Quantitative Science, Universiti Utara Malaysia, Sintok Kedah (Malaysia)

    2014-12-04

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  12. Determinants of debit cards acceptance: An empirical investigation

    Science.gov (United States)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  13. Restructuring of the driver for TASS/SMR, SMART analysis code

    International Nuclear Information System (INIS)

    Lee, G. H.; Kim, S. H.; Whang, Y. D.; Kim, H. C.

    2003-01-01

    TASS/SMR is under development by implementing the newly developed thermal hydraulic models for the integral reactor, SMART. The data structure of TASS utilizes external files, which could result in difficulties for the code maintenance and an easy understanding of the code. The driver for TASS/SMR was rewritten for the use of Fortran 90 advanced features, such as dynamic memory management and user defined derived type. The input structure of TASS changed from the interactive method to card numbered system. Also the output process of TASS reformed by removing the utility program. The validation of the TASS/SMR driver was performed by the comparison of results. The use of the revised TASS/SMR driver is expected to accelerate code development process as well as improve user friendliness

  14. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  15. SmartCampusAAU

    DEFF Research Database (Denmark)

    Hansen, Rene; Thomsen, Bent; Thomsen, Lone Leth

    2013-01-01

    This paper describes SmartCampusAAU - an open, extendable platform that supports the easy creation of indoor location based systems. SmartCampusAAU offers an app and backend that can be used to enable indoor positioning and navigation in any building. The SmartCampusAAU app is available on all ma...... major mobile platforms (Android, iPhone and Windows Phone) and supports both device- and infrastructure-based positioning. SmartCampusAAU also offers a publicly available OData backend that allows researchers to share radio map and location tracking data.......This paper describes SmartCampusAAU - an open, extendable platform that supports the easy creation of indoor location based systems. SmartCampusAAU offers an app and backend that can be used to enable indoor positioning and navigation in any building. The SmartCampusAAU app is available on all...

  16. Health care report cards: what about consumers' perspectives?

    Science.gov (United States)

    McGee, J; Knutson, D

    1994-10-01

    Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.

  17. EuCARD final project report

    CERN Document Server

    Koutchouk, J P

    2014-01-01

    After four years of activity, EuCARD has most of its objectives fulfilled, with some new objectives added and a few others on excellent tracks while requiring additional time. The management has been active in reinforcing the collaborative links between partners and projects, contributing to the preparation of FP7-EuCARD2, initiating FP7-HiLumi-LHC Design Study, to favour sustained collaborations beyond EuCARD. An out-of-contract network has been successfully launched on laser plasma acceleration, to combine forces between accelerator, laser and plasma communities. Communication and dissemination activities have led to two highlights: Accelerating News, an accelerator R&D newsletter initiated by EuCARD and now common to all FP7 accelerator projects (over 1000 subscribers) and a series of monographs on accelerator sciences that is progressively finding its public. The scientific networks have more than fulfilled their initial objectives: roadmaps are defined for neutrino facilities, submitted to the Europe...

  18. Electricity Markets, Smart Grids and Smart Buildings

    Science.gov (United States)

    Falcey, Jonathan M.

    A smart grid is an electricity network that accommodates two-way power flows, and utilizes two-way communications and increased measurement, in order to provide more information to customers and aid in the development of a more efficient electricity market. The current electrical network is outdated and has many shortcomings relating to power flows, inefficient electricity markets, generation/supply balance, a lack of information for the consumer and insufficient consumer interaction with electricity markets. Many of these challenges can be addressed with a smart grid, but there remain significant barriers to the implementation of a smart grid. This paper proposes a novel method for the development of a smart grid utilizing a bottom up approach (starting with smart buildings/campuses) with the goal of providing the framework and infrastructure necessary for a smart grid instead of the more traditional approach (installing many smart meters and hoping a smart grid emerges). This novel approach involves combining deterministic and statistical methods in order to accurately estimate building electricity use down to the device level. It provides model users with a cheaper alternative to energy audits and extensive sensor networks (the current methods of quantifying electrical use at this level) which increases their ability to modify energy consumption and respond to price signals The results of this method are promising, but they are still preliminary. As a result, there is still room for improvement. On days when there were no missing or inaccurate data, this approach has R2 of about 0.84, sometimes as high as 0.94 when compared to measured results. However, there were many days where missing data brought overall accuracy down significantly. In addition, the development and implementation of the calibration process is still underway and some functional additions must be made in order to maximize accuracy. The calibration process must be completed before a reliable

  19. Simple, heart-smart substitutions

    Science.gov (United States)

    Coronary artery disease - heart smart substitutions; Atherosclerosis - heart smart substitutions; Cholesterol - heart smart substitutions; Coronary heart disease - heart smart substitutions; Healthy diet - heart ...

  20. Using smart card technology to monitor the eating habits of children in a school cafeteria: 2. The nutrient contents of all meals chosen by a group of 8- to 11-year-old boys over 78 days.

    Science.gov (United States)

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the abilities of the newly created smart card system to track the nutrient contents of foods chosen over several months by individual diners in a school cafeteria. From the food choice and composition of food data sets, an Access database was created encompassing 30 diners (aged 8-11 years), 78 days and eight nutrients. Data were available for a total of 1909 meals. Based upon population mean values the cohort were clearly choosing meals containing higher than the recommended maximum amounts for sugar and lower than the recommended minimum amounts of fibre, iron and vitamin A. Protein and vitamin C contents of meals chosen were well above minimum requirements. Over the 1909 meals, nutrient requirements were met 41% of the time. The system created was very effective at continually monitoring food choices of individual diners over limitless time. The data generated raised questions on the common practice of presenting nutrient intakes as population mean values calculated over a few days. The impact of heavily fortified foods on such studies in general is discussed.

  1. Smart Cities - Smart Homes and Smart Home Technology

    OpenAIRE

    Faanes, Erlend Kydland

    2014-01-01

    This master’s thesis consists of two articles where the first article is theoretical and the second is the empirical study. Article I The purpose with this paper is to explore and illuminate how smart home and smart home technology can contribute to enhance health and Quality of Life in elderly citizens and allow them to live longer in their home. The paper provides a brief introduction to health promotion and highlights the thesis theoretical framework and foundation of Aaron Antonov...

  2. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  3. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  4. "It's in the Cards": The Contribution of Illustrated Metaphor Cards to Exploring Values Within Narratives.

    Science.gov (United States)

    Karnieli-Miller, Orit; Nissim, Geffen; Goldberg, Miriam

    2017-01-01

    In this article, we present the use of illustrated metaphorical cards as a technique to enrich the qualitative narrative interview. We examine the advantages of incorporating a projective tool to assist in constructing and understanding personal narratives of people living with severe mental illness. We interviewed 25 participants-staff and members of a clubhouse in Israel (an international community model of rehabilitation in mental health)-and sought to understand their stories focused on personal and organizational values. The findings revealed that, in most cases, the cards contributed to data collection by enhancing the interviewees' ability for expression and by facilitating richer, more comprehensive stories and descriptions. This in turn enhanced the researcher's ability to understand the messages and stories presented. The research conclusions discuss the cards' potential contribution to improving data collection and analysis. The cards became an additional channel for expressing participants' experiences, emotions, and unique voice. © The Author(s) 2015.

  5. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  6. Electricity usage scheduling in smart building environments using smart devices.

    Science.gov (United States)

    Lee, Eunji; Bahn, Hyokyung

    2013-01-01

    With the recent advances in smart grid technologies as well as the increasing dissemination of smart meters, the electricity usage of every moment can be detected in modern smart building environments. Thus, the utility company adopts different price of electricity at each time slot considering the peak time. This paper presents a new electricity usage scheduling algorithm for smart buildings that adopts real-time pricing of electricity. The proposed algorithm detects the change of electricity prices by making use of a smart device and changes the power mode of each electric device dynamically. Specifically, we formulate the electricity usage scheduling problem as a real-time task scheduling problem and show that it is a complex search problem that has an exponential time complexity. An efficient heuristic based on genetic algorithms is performed on a smart device to cut down the huge searching space and find a reasonable schedule within a feasible time budget. Experimental results with various building conditions show that the proposed algorithm reduces the electricity charge of a smart building by 25.6% on average and up to 33.4%.

  7. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  8. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  9. Towards smart environments using smart objects.

    Science.gov (United States)

    Sedlmayr, Martin; Prokosch, Hans-Ulrich; Münch, Ulli

    2011-01-01

    Barcodes, RFID, WLAN, Bluetooth and many more technologies are used in hospitals. They are the technological bases for different applications such as patient monitoring, asset management and facility management. However, most of these applications exist side by side with hardly any integration and even interoperability is not guaranteed. Introducing the concept of smart objects inspired by the Internet of Things can improve the situation by separating the capabilities and functions of an object from the implementing technology such as RFID or WLAN. By aligning technological and business developments smart objects have the power to transform a hospital from an agglomeration of technologies into a smart environment.

  10. Smart homes with smartphones : Creating a Smart home application for smartphones

    OpenAIRE

    Lärka, Martin

    2015-01-01

    The goal of this master thesis was to evaluate the field of Smart home applications run on mobile platforms such as smart phones. This was at the time a relatively new field that has attracted the attention of Smart phone giants like Apple and Google. This raised the question whether or not the users willingness to embrace the technology. To evaluate the field, a literature study was conducted covering the Smart home technology, and Apple’s and Google’s Smart home solutions. The rendered in a...

  11. Hydro One smart meter/smart grid : realizing the vision

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, R. [Hydro One Networks Inc., Toronto, ON (Canada)

    2010-07-01

    Ontario's Hydro One Networks has been installing smart meters as part of its smart grid plan since 2007. The smart grid plan forms part of the utility's overall aim to create an energy conservation culture across the province. The utility now has over 1 million installed meters over a 640,000{sup 2} km territory. The smart grid planning team has adopted the use of an upgraded open protocol standards-based communications as part of its 2-way high bandwidth network. The utility is using a 1.8 Ghz worldwide interoperability for microwave access (WiMAX) spectrum designed specifically for the protection of electric utility infrastructure. The utility is now incorporating proof-of-concept applications including automated reclosers, remote terminal units, demand management devices and mobile technologies for use in its smart grid procedures. Various smart zone business scenarios were also described in this power point presentation, as well as details of Hydro One's integration plans for vendors and other power systems. tabs., figs.

  12. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  13. Correlates of credit card ownership in men and women.

    Science.gov (United States)

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  14. 46 CFR 154.1814 - Cargo information cards.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo information cards. 154.1814 Section 154.1814... cards. (a) No person may operate a vessel unless a cargo information card for each cargo being... accessible to the person in charge of the watch. (b) When a vessel is moored at a terminal, the master shall...

  15. Smart Grid, Smart Europe

    OpenAIRE

    VITIELLO SILVIA; FULLI Gianluca; MENGOLINI Anna Maria

    2013-01-01

    Le smart grid, o reti elettriche intelligenti, aprono la strada a nuove applicazioni con conseguenze di vasta portata per l’intero sistema elettrico, tra le quali la principale è la capacità di integrare nella rete esistente più fonti di energia rinnovabili (FER), veicoli elettrici e fonti di generazione distribuita. Le smart grid inoltre garantiscono una più efficiente ed affidabile risposta alla domanda di energia, sia da un punto di vista tecnico, permettendo un monitoraggio e un controll...

  16. 21 CFR 710.6 - Notification of registrant; cosmetic product establishment registration number.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Notification of registrant; cosmetic product... OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS VOLUNTARY REGISTRATION OF COSMETIC PRODUCT ESTABLISHMENTS § 710.6 Notification of registrant; cosmetic product establishment registration number. The...

  17. Smart Chips for Smart Surroundings -- 4S

    NARCIS (Netherlands)

    Schuler, Eberhard; König, Ralf; Becker, Jürgen; Rauwerda, G.K.; van de Burgwal, M.D.; Smit, Gerardus Johannes Maria; Cardoso, João M.P.; Hübner, Michael

    2011-01-01

    The overall mission of the 4S project (Smart Chips for Smart Surroundings) was to define and develop efficient flexible, reconfigurable core building blocks, including the supporting tools, for future Ambient System Devices. Reconfigurability offers the needed flexibility and adaptability, it

  18. A Comparison of Card-sorting Analysis Methods

    DEFF Research Database (Denmark)

    Nawaz, Ather

    2012-01-01

    This study investigates how the choice of analysis method for card sorting studies affects the suggested information structure for websites. In the card sorting technique, a variety of methods are used to analyse the resulting data. The analysis of card sorting data helps user experience (UX......) designers to discover the patterns in how users make classifications and thus to develop an optimal, user-centred website structure. During analysis, the recurrence of patterns of classification between users influences the resulting website structure. However, the algorithm used in the analysis influences...... the recurrent patterns found and thus has consequences for the resulting website design. This paper draws an attention to the choice of card sorting analysis and techniques and shows how it impacts the results. The research focuses on how the same data for card sorting can lead to different website structures...

  19. RENEWAL OF CRIMINAL LAW AGAINST ABUSE OF CREDIT CARDS

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-07-01

    Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people.   On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia.   A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.

  20. Puppet Visual Adaptation on Playing Cards as Educational Media

    Directory of Open Access Journals (Sweden)

    Joko Wiyoso

    2017-02-01

    Full Text Available This study aims at presenting an effective media in a form of puppet picture playing cards as a means to introduce traditional puppet to the society. Research and Development (R&D was chosen as the method to develop the playing cards. Results were presented in a form of the design of puppet picture playing cards as many as 54 cards as well as 54 puppet characters as the background pictures. The design of the playing cards is adjusted to the common playing cards which are distributed widely in the society, including both the sizes and symbols, like the pictures of spade, heart, diamond, and club. In detail, the design comprises: (1 the size of playing cards which is 6 cm width of the upper and lower sides and 9 cm length for the left and right sides. (2 The playing cards’ background is in a bright color so does the puppet picture on the card can be seen clearly.

  1. 16 CFR 1130.8 - Requirements for Web site registration or alternative e-mail registration.

    Science.gov (United States)

    2010-01-01

    ... registration. (a) Link to registration page. The manufacturer's Web site, or other Web site established for the... web page that goes directly to “Product Registration.” (b) Purpose statement. The registration page... registration page. The Web site registration page shall request only the consumer's name, address, telephone...

  2. A Review of Systems and Technologies for Smart Homes and Smart Grids

    OpenAIRE

    Lobaccaro, Gabriele; Carlucci, Salvatore; Löfström, Erica

    2016-01-01

    In the actual era of smart homes and smart grids, advanced technological systems that allow the automation of domestic tasks are developing rapidly. There are numerous technologies and applications that can be installed in smart homes today. They enable communication between home appliances and users, and enhance home appliances’ automation, monitoring and remote control capabilities. This review article, by introducing the concept of the smart home and the advent of the smart grid, investiga...

  3. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  4. The Regulation of the Credit Card Market in Turkey

    OpenAIRE

    Ahmet Faruk Aysan; L. Yildiz

    2006-01-01

    The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...

  5. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  6. Problem and solution of tally segment card in MCNP code

    International Nuclear Information System (INIS)

    Xie Jiachun; Zhao Shouzhi; Sun Zheng; Jia Baoshan

    2010-01-01

    Wrong results may be given when FS card (tally segment card) was used for tally with other tally cards in Monte Carlo code MCNP. According to the comparison of segment tally results which were obtained by FS card of three different models of the same geometry, the tally results of fuel regions were found to be wrong in fill pattern. The reason is that the fuel cells were described by Universe card and FILL card, and the filled cells were always considered at Universe card definition place. A proposed solution was that the segment tally for filled cells was done at Universe card definition place. Radial flux distribution of one example was calculated in this way. The results show that the fault of segment tally with FS card in fill pattern could be solved by this method. (authors)

  7. Cobacabana (control of balance by card-based navigation) : A card-based system for job shop control

    NARCIS (Netherlands)

    Land, M.J.

    Existing card-based production control systems such as Kanban are mostly dedicated to repetitive production environments. Cards-based systems for job shop control are lacking, while particularly this industry segment shows a need for simple control systems. This paper aims at filling the gap by

  8. Prepaid cards: how do they function? how are they regulated?

    OpenAIRE

    Mark Furletti

    2004-01-01

    This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...

  9. Smart Energy 2011. Smart Grid or the future of power industry; Smart Energy 2011. Smart Grid oder die Zukunft der Energiewirtschaft

    Energy Technology Data Exchange (ETDEWEB)

    Grossmann, Uwe; Kunold, Ingo (eds.)

    2011-07-01

    The demand for smart grids, energy information networks, smart metering, new tariffs offering incentives for load shifting to household customers and load reduction options to energy providers are discussed increasingly. The privacy protection of customers being threatened by detailed consumption profiles also needs attention. Practitioners and researches from enterprises and research institutions present results from their field of work in nine papers. This book mainly focusses on three topics: 'Energy 2020', 'Data protection and data security within smart grids' and 'Smart grid and energy information networks'. On the one hand this volume addresses researchers and practitioners from enterprises and research institutions, on the other hand teachers and students dealing with questions concerning the energy market of the future. (orig.)

  10. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  11. Mathematical card magic fifty-two new effects

    CERN Document Server

    Mulcahy, Colm

    2013-01-01

    Mathematical card effects offer both beginning and experienced magicians an opportunity to entertain with a minimum of props. Featuring mostly original creations, Mathematical Card Magic: Fifty-Two New Effects presents an entertaining look at new mathematically based card tricks. Each chapter contains four card effects, generally starting with simple applications of a particular mathematical principle and ending with more complex ones. Practice a handful of the introductory effects and, in no time, you'll establish your reputation as a "mathemagician." Delve a little deeper into each chapter and the mathematics gets more interesting. The author explains the mathematics as needed in an easy-to-follow way. He also provides additional details, background, and suggestions for further explorations.Suitable for recreational math buffs and amateur card lovers or as a text in a first-year seminar, this color book offers a diverse collection of new mathemagic principles and effects.

  12. High-throughput in vivo genotoxicity testing: an automated readout system for the somatic mutation and recombination test (SMART.

    Directory of Open Access Journals (Sweden)

    Benoit Lombardot

    Full Text Available Genotoxicity testing is an important component of toxicity assessment. As illustrated by the European registration, evaluation, authorization, and restriction of chemicals (REACH directive, it concerns all the chemicals used in industry. The commonly used in vivo mammalian tests appear to be ill adapted to tackle the large compound sets involved, due to throughput, cost, and ethical issues. The somatic mutation and recombination test (SMART represents a more scalable alternative, since it uses Drosophila, which develops faster and requires less infrastructure. Despite these advantages, the manual scoring of the hairs on Drosophila wings required for the SMART limits its usage. To overcome this limitation, we have developed an automated SMART readout. It consists of automated imaging, followed by an image analysis pipeline that measures individual wing genotoxicity scores. Finally, we have developed a wing score-based dose-dependency approach that can provide genotoxicity profiles. We have validated our method using 6 compounds, obtaining profiles almost identical to those obtained from manual measures, even for low-genotoxicity compounds such as urethane. The automated SMART, with its faster and more reliable readout, fulfills the need for a high-throughput in vivo test. The flexible imaging strategy we describe and the analysis tools we provide should facilitate the optimization and dissemination of our methods.

  13. Location Based Application Availability

    Science.gov (United States)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  14. Smart Beta or Smart Alpha

    DEFF Research Database (Denmark)

    Winther, Kenneth Lillelund; Steenstrup, Søren Resen

    2016-01-01

    that smart beta investing probably will do better than passive market capitalization investing over time, we believe many are coming to a conclusion too quickly regarding active managers. Institutional investors are able to guide managers through benchmarks and risk frameworks toward the same well......Smart beta has become the flavor of the decade in the investment world with its low fees, easy access to rewarded risk premiums, and appearance of providing good investment results relative to both traditional passive benchmarks and actively managed funds. Although we consider it well documented......-documented smart beta risk premiums and still motivate active managers to avoid value traps, too highly priced small caps, defensives, etc. By constructing the equity portfolios of active managers that resemble the most widely used risk premiums, we show that the returns and risk-adjusted returns measures...

  15. Smart Grid: Network simulator for smart grid test-bed

    International Nuclear Information System (INIS)

    Lai, L C; Ong, H S; Che, Y X; Do, N Q; Ong, X J

    2013-01-01

    Smart Grid become more popular, a smaller scale of smart grid test-bed is set up at UNITEN to investigate the performance and to find out future enhancement of smart grid in Malaysia. The fundamental requirement in this project is design a network with low delay, no packet drop and with high data rate. Different type of traffic has its own characteristic and is suitable for different type of network and requirement. However no one understands the natural of traffic in smart grid. This paper presents the comparison between different types of traffic to find out the most suitable traffic for the optimal network performance.

  16. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Jorge Thierer

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la en...

  17. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Thierer, Jorge

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los betabloqueantes vasodilatadores y los inhibidores de la enzim...

  18. Venue-level correlates of female sex worker registration status: A multilevel analysis of bars in Tijuana, Mexico

    Science.gov (United States)

    Gaines, Tommi L.; Rusch, Melanie L.A.; Brouwer, Kimberly C.; Goldenberg, Shira M.; Lozada, Remedios; Robertson, Angela M.; Perkins, Emily; Strathdee, Steffanie A.; Patterson, Thomas L.

    2013-01-01

    In Tijuana, Mexico, sex work is regulated by the municipal government, through registration cards issued to female sex workers (FSWs) for an annual fee. Registration has been associated with decreased drug use and increase condom use and HIV testing. Previously, it was demonstrated that FSWs operating in bars were more likely than street-based FSWs to be registered. This implies that certain venues may be more accessible to local authorities for the enforcement of this type of programme. Taking a novel multilevel approach, we examined whether venue characteristics of bars reflecting greater organised management and visibility affect registration status of FSWs. In an analysis of venue-level characteristics, predictors of being registered were availability of free condoms at work and distance to the main sex strip; however, these were not independently associated after inclusion of FSWs’ income, illicit drug use and history of HIV testing. Our findings suggest that sex work regulations may inadvertently exclude venues in which the more vulnerable and less visible FSWs, such as injection drug users and those with limited financial resources, are situated. Efforts to revise or reconsider sex work regulations to ensure that they best promote FSWs’ health, human and labour rights are recommended. PMID:23534477

  19. Venue-level correlates of female sex worker registration status: a multilevel analysis of bars in Tijuana, Mexico.

    Science.gov (United States)

    Gaines, Tommi L; Rusch, Melanie L A; Brouwer, Kimberly C; Goldenberg, Shira M; Lozada, Remedios; Robertson, Angela M; Perkins, Emily; Strathdee, Steffanie A; Patterson, Thomas L

    2013-01-01

    In Tijuana, Mexico, sex work is regulated by the municipal government, through registration cards issued to female sex workers (FSWs) for an annual fee. Registration has been associated with decreased drug use and increase condom use and HIV testing. Previously, it was demonstrated that FSWs operating in bars were more likely than street-based FSWs to be registered. This implies that certain venues may be more accessible to local authorities for the enforcement of this type of programme. Taking a novel multilevel approach, we examined whether venue characteristics of bars reflecting greater organised management and visibility affect registration status of FSWs. In an analysis of venue-level characteristics, predictors of being registered were availability of free condoms at work and distance to the main sex strip; however, these were not independently associated after inclusion of FSWs' income, illicit drug use and history of HIV testing. Our findings suggest that sex work regulations may inadvertently exclude venues in which the more vulnerable and less visible FSWs, such as injection drug users and those with limited financial resources, are situated. Efforts to revise or reconsider sex work regulations to ensure that they best promote FSWs' health, human and labour rights are recommended.

  20. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  1. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user’s medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents’ medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data. Questions can be abstracted to various level of resolution (hence sensitivity of private data for use in the authentication process. The method is described and a case study is given in this paper.

  2. Constrained non-rigid registration for whole body image registration: method and validation

    Science.gov (United States)

    Li, Xia; Yankeelov, Thomas E.; Peterson, Todd E.; Gore, John C.; Dawant, Benoit M.

    2007-03-01

    3D intra- and inter-subject registration of image volumes is important for tasks that include measurements and quantification of temporal/longitudinal changes, atlas-based segmentation, deriving population averages, or voxel and tensor-based morphometry. A number of methods have been proposed to tackle this problem but few of them have focused on the problem of registering whole body image volumes acquired either from humans or small animals. These image volumes typically contain a large number of articulated structures, which makes registration more difficult than the registration of head images, to which the vast majority of registration algorithms have been applied. To solve this problem, we have previously proposed an approach, which initializes an intensity-based non-rigid registration algorithm with a point based registration technique [1, 2]. In this paper, we introduce new constraints into our non-rigid registration algorithm to prevent the bones from being deformed inaccurately. Results we have obtained show that the new constrained algorithm leads to better registration results than the previous one.

  3. Conceptualizing smart service systems

    DEFF Research Database (Denmark)

    Beverungen, Daniel; Müller, Oliver; Matzner, Martin

    2017-01-01

    Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service” that is b......Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service......” that is based on monitoring, optimization, remote control, and autonomous adaptation of products, profoundly transform service systems into what we call “smart service systems”. In a multi-method study that includes conceptual research and qualitative data from in-depth interviews, we conceptualize “smart...... service” and “smart service systems” based on using smart products as boundary objects that integrate service consumers’ and service providers’ resources and activities. Smart products allow both actors to retrieve and to analyze aggregated field evidence and to adapt service systems based on contextual...

  4. The smart - development and technology; Der smart - Entwicklung und Technik

    Energy Technology Data Exchange (ETDEWEB)

    Goppelt, G.

    1999-06-01

    The smart is the first representative of a radically new vehicle concept, with minimum space requirements and trend-setting in terms of ecology, safety, and individualism. The new design is not rooted in any tradition. The contribution describes the development process and constructional features of the smart. [Deutsch] Der smart ist der erste Vertreter eines voellig neuen Fahrzeugkonzepts. Bei kleinstem Raumbedarf soll er neue Massstaebe bei Oekologie, Sicherheit und Individualitaet setzen. Entstanden ist eine konsequente Neukonstruktion, die sich von bisherigen Traditionen loest. In diesem Beitrag sind der Entwicklungsprozess sowie die Konstruktionsmerkmale des smart beschrieben. (orig.)

  5. 76 FR 39466 - Privacy Act; System of Records Notice: State-26, Passport Records

    Science.gov (United States)

    2011-07-06

    ...: Hard copy and electronic media. RETRIEVABILITY: By individual name, social security number, passport... posts for registration and have so registered; (g) Were issued Cards of Registration and Identity as U.S... U.S. citizens or for issuance of Cards of Identity and Registration as U.S. Citizens; (c) Consular...

  6. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...

  7. PC add on card for processing of LSC signals

    International Nuclear Information System (INIS)

    Jadhav, S.R.; Nikhare, D.M.; Gurna, R.K.; Paulson, Molly; Kulkarni, C.P.; Vaidya, P.P.

    2001-01-01

    This paper describes PC- add on card developed at Electronics Division for processing of LSC signals. This card uses highly integrated digital and analog circuits, for entire processing of signals available from preamplifiers to get complete beta energy spectrum corresponding to coincident events in Liquid Scintillation Counting. LSC card along with High Voltage PC-add on card gives complete electronics required for LSC system. This card is also used in automatic LSC system along with interface circuits, which are used to control mechanical movements. (author)

  8. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  9. Telecommunication Technologies for Smart Grid Projects with Focus on Smart Metering Applications

    Directory of Open Access Journals (Sweden)

    Nikoleta Andreadou

    2016-05-01

    Full Text Available This paper provides a study of the smart grid projects realised in Europe and presents their technological solutions with a focus on smart metering Low Voltage (LV applications. Special attention is given to the telecommunications technologies used. For this purpose, we present the telecommunication technologies chosen by several European utilities for the accomplishment of their smart meter national roll-outs. Further on, a study is performed based on the European Smart Grid Projects, highlighting their technological options. The range of the projects analysed covers the ones including smart metering implementation as well as those in which smart metering applications play a significant role in the overall project success. The survey reveals that various topics are directly or indirectly linked to smart metering applications, like smart home/building, energy management, grid monitoring and integration of Renewable Energy Sources (RES. Therefore, the technological options that lie behind such projects are pointed out. For reasons of completeness, we also present the main characteristics of the telecommunication technologies that are found to be used in practice for the LV grid.

  10. 75 FR 81721 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2010-12-28

    ... cards not marketed or labeled as a gift card or certificate. EFTA Section 920 provides, however, that... cardholder initiates a purchase by providing his or her card or card information to a merchant. In the case... purchases at retailers in the early 1980s. It was not until the mid-1990s, however, that PIN debit became a...

  11. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  12. Registration of Space Objects

    Science.gov (United States)

    Schmidt-Tedd, Bernhard

    2017-07-01

    Space objects are subject to registration in order to allocate "jurisdiction and control" over those objects in the sovereign-free environment of outer space. This approach is similar to the registration of ships in view of the high sea and for aircrafts with respect to the international airspace. Registration is one of the basic principles of space law, starting with UN General Assembly Resolution 1721 B (XVI) of December 20, 1961, followed by Resolution 1962 (XVIII) of December 13, 1963, then formulated in Article VIII of the Outer Space Treaty of 1967 and as specified in the Registration Convention of 1975. Registration of space objects can be seen today as a principle of customary international law, relevant for each spacefaring state. Registration is divided into a national and an international level. The State Party establishes a national registry for its space objects, and those registrations have to be communicated via diplomatic channel to the UN Register of space objects. This UN Register is handled by the UN Office for Outer Space Affairs (UNOOSA) and is an open source of information for space objects worldwide. Registration is linked to the so-called launching state of the relevant space object. There might be more than one launching state for the specific launch event, but only one state actor can register a specific space object. The state of registry gains "jurisdiction and control" over the space object and therefore no double registration is permissible. Based on the established UN Space Law, registration practice was subject to some adaptions due to technical developments and legal challenges. After the privatization of the major international satellite organizations, a number of non-registrations had to be faced. The state actors reacted with the UN Registration Practice Resolution of 2007 as elaborated in the Legal Subcommittee of UNCOPUOS, the Committee for the Peaceful Use of Outer Space. In this context an UNOOSA Registration Information

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  14. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  15. Materialism and credit card use by college students.

    Science.gov (United States)

    Pinto, M B; Parente, D H; Palmer, T S

    2000-04-01

    Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use.

  16. 76 FR 20343 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-12

    ..., were submitted on April 5, 2011 to the House Committee on Oversight and Government Reform, the Senate... or smart card technology protocols.'' Retention and disposal: Delete entry and replace with... and cleared for need- to-know. PRODARTS is protected by user identification and password or smart card...

  17. Smart meters. Smart metering. A solution module for a future-oriented energy system; Intelligente Zaehler. Smart Metering. Ein Loesungsbaustein fuer ein zukunftsfaehiges Energiesystem

    Energy Technology Data Exchange (ETDEWEB)

    Grimm, Nadia; Seidl, Hans [comps.

    2011-12-15

    The German Energy Agency GmbH (Berlin, Federal Republic of Germany) reports on smart metering as a solution module for a future-oriented energy system by means of the following contributions: (1) Key role for smart meters; (2) What is smart metering? (3) Implementation of smart metering in Europe; (4) The market development to date in Germany; (5) Practical experiences with smart metering in Germany; (6) Frequently asked questions; (7) Smart metering in intelligent networks; (8) Legal framework conditions; (9) Data security and data protection in the utilisation of smart meters; (10) Ongoing information; (11) Efficient energy systems.

  18. Smart material screening machines using smart materials and controls

    Science.gov (United States)

    Allaei, Daryoush; Corradi, Gary; Waigand, Al

    2002-07-01

    The objective of this product is to address the specific need for improvements in the efficiency and effectiveness in physical separation technologies in the screening areas. Currently, the mining industry uses approximately 33 billion kW-hr per year, costing 1.65 billion dollars at 0.05 cents per kW-hr, of electrical energy for physical separations. Even though screening and size separations are not the single most energy intensive process in the mining industry, they are often the major bottleneck in the whole process. Improvements to this area offer tremendous potential in both energy savings and production improvements. Additionally, the vibrating screens used in the mining processing plants are the most costly areas from maintenance and worker health and safety point of views. The goal of this product is to reduce energy use in the screening and total processing areas. This goal is accomplished by developing an innovative screening machine based on smart materials and smart actuators, namely smart screen that uses advanced sensory system to continuously monitor the screening process and make appropriate adjustments to improve production. The theory behind the development of Smart Screen technology is based on two key technologies, namely smart actuators and smart Energy Flow ControlT (EFCT) strategies, developed initially for military applications. Smart Screen technology controls the flow of vibration energy and confines it to the screen rather than shaking much of the mass that makes up the conventional vibratory screening machine. Consequently, Smart Screens eliminates and downsizes many of the structural components associated with conventional vibratory screening machines. As a result, the surface area of the screen increases for a given envelope. This increase in usable screening surface area extends the life of the screens, reduces required maintenance by reducing the frequency of screen change-outs and improves throughput or productivity.

  19. 29 CFR 4.123 - Administrative limitations, variances, tolerances, and exemptions.

    Science.gov (United States)

    2010-07-01

    ... microelectronic circuitry or other technology of at least similar sophistication is an essential element (for... servicing of cards (including credit cards, debit cards, purchase cards, smart cards, and similar card... military personnel in buying and selling homes (which shall not include actual moving or storage of...

  20. From smart city to smart destination. The case of three Canadian cities

    Directory of Open Access Journals (Sweden)

    François Bédard

    2018-03-01

    Full Text Available Several cities around the world are self-proclaimed "smart" by integrating, in varying degrees, new technologies in the different spheres of the city. Nevertheless, despite this effervescence around the smart city, the concept requires more conceptualization from the researchers. This is even more important when it comes time to distinguishing between smart city and smart destination. The relationship between these two concepts is blurred and the transition from the smart city to the smart destination is not automatic. This situation is explained by the fact that the intrinsic characteristics of their respective target populations, being the citizens and the tourists, are different. This article compares three Canadian cities in the province of Quebec with the aim of demonstrating that the realization of a smart destination project requires the adaptation of governance structure and the involvement of all the stakeholders and more particularly in tourism.

  1. 21 CFR 1301.36 - Suspension or revocation of registration; suspension of registration pending final order...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Suspension or revocation of registration; suspension of registration pending final order; extension of registration pending final order. 1301.36... registration pending final order; extension of registration pending final order. (a) For any registration...

  2. Consumer Credit Card Use Intention and Influence Factors Analysis

    Directory of Open Access Journals (Sweden)

    Wang Yantao

    2017-01-01

    Full Text Available Credit card as a kind of advanced means of payment and the new way of consumer credit in the world widely, but in our country is faced with some problems, such as their per capita spending is low, open the card number is small, motionless bank card is a lot. In this paper, using the Logit model to analyze the Anshan city in Liaoning province consumer credit card usage. And combined with empirical analysis to provide banking management Suggestions and marketing countermeasures, including targeted to provide different kinds of credit card.

  3. The possibility of using "Job Card" for career education

    OpenAIRE

    横山, 裕; ヨコヤマ, ユタカ; Yutaka, YOKOYAMA

    2009-01-01

    This paper described the advantage of using a "job card" for career education. "The job card system" is a new system that began this year. The original purpose of "the job card system" is to support a person looking for a job. When a job seeker writes a "job card", the job seeker can understand his own work experience and employment possibilities while getting the advice of the career counselor. If a teacher utilized a "job card" for career education in this way, the student can understand hi...

  4. Prefrontal system dysfunction and credit card debt.

    Science.gov (United States)

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.

  5. The Signal Validation method of Digital Process Instrumentation System on signal conditioner for SMART

    International Nuclear Information System (INIS)

    Moon, Hee Gun; Park, Sang Min; Kim, Jung Seon; Shon, Chang Ho; Park, Heui Youn; Koo, In Soo

    2005-01-01

    The function of PIS(Process Instrumentation System) for SMART is to acquire the process data from sensor or transmitter. The PIS consists of signal conditioner, A/D converter, DSP(Digital Signal Process) and NIC(Network Interface Card). So, It is fully digital system after A/D converter. The PI cabinet and PDAS(Plant Data Acquisition System) in commercial plant is responsible for data acquisition of the sensor or transmitter include RTD, TC, level, flow, pressure and so on. The PDAS has the software that processes each sensor data and PI cabinet has the signal conditioner, which is need for maintenance and test. The signal conditioner has the potentiometer to adjust the span and zero for test and maintenance. The PIS of SMART also has the signal conditioner which has the span and zero adjust same as the commercial plant because the signal conditioner perform the signal condition for AD converter such as 0∼10Vdc. But, To adjust span and zero is manual test and calibration. So, This paper presents the method of signal validation and calibration, which is used by digital feature in SMART. There are I/E(current to voltage), R/E(resistor to voltage), F/E(frequency to voltage), V/V(voltage to voltage). Etc. In this paper show only the signal validation and calibration about I/E converter that convert level, pressure, flow such as 4∼20mA into signal for AD conversion such as 0∼10Vdc

  6. Survey report on smart-tribo-mechanics; Smart tribo mechanics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    Survey results of smart-tribo-mechanics are described. For the smart-tribo-mechanics differing from the conventional tribology, an intelligent system is constructed by making full use of various science and technology ranging from basic to application, to solve problems. Self-diagnosis and self-remediation, active control, passive control, and smart-biotribo-mechanics are typical methods. Electronics, telecommunication, healthcare, and new biotechnology are new and advanced application areas. In these areas, tribology to control and act to the material surface in the atomic and molecular scale should be the key technology. In addition, the smart-tribo-mechanics is expected to be used for sustaining basic industry, such as material, transportation, and life industries. 101 refs., 67 figs., 14 tabs.

  7. 21 CFR 710.8 - Misbranding by reference to registration or to registration number.

    Science.gov (United States)

    2010-04-01

    ... HUMAN SERVICES (CONTINUED) COSMETICS VOLUNTARY REGISTRATION OF COSMETIC PRODUCT ESTABLISHMENTS § 710.8 Misbranding by reference to registration or to registration number. Registration of a cosmetic product... products by the Food and Drug Administration. Any representation in labeling or advertising that creates an...

  8. CARDS MARKET – A RESISTANT MARKET TO CRISIS

    Directory of Open Access Journals (Sweden)

    Tudose Geanina - Gabriela

    2012-07-01

    Full Text Available At the same time with the development of market and consumer behavior of Romanians, the growth rate of cards market accelerated. Of course, infrastructure and acceptance network were very important, they are the factors that allowed the widespread use of cards. Currently, any natural person or legal entity is engaged in commercial relationships involving financial transactions, the electronic payments having an important role, representing virtually future transactions, both nationally and across borders. The financial institutions have made a more rapid segmentation of the portfolio of cards and began to focus increasingly on services and benefits situated behind the payment instruments. Meanwhile, cardholders were becoming more educated and sophisticated, knowing what to ask of cards. More, many financial institutions have adapted so that network to accept chip cards. On the Romanian market, the chip cards will increase which are much more effective in terms of security transactions, as well as for co-branded cards, that offers the possibility of the loyalty of the customers. They will try to get as many benefits from different types of cards, but at the same time, they will focus on niche products, business cards, cards for shopping or for payment of public services. The scientific paper aims to capture aspects that emphasize the fact that the permanent market monitoring and the continuous adaptation of it will become necessary for the next period. The current client is more demanding, more educated and less tolerant in the relation to the suppliers of any kind and especially with those of financial services. The tendency to use co-branded cards for everyday payments will increase as merchants and issuing banks will attach more and more benefits on these cards, which will ultimately increase trading volumes on the card to merchants. The bank clients benefited of the cutting - edge technologies, of dual cards functionality - debit and credit.

  9. Book-Smart, Not Street-Smart: Blockchain-Based Smart Contracts and The Social Workings of Law

    OpenAIRE

    Karen E. C. Levy

    2017-01-01

    This paper critiques blockchain-based “smart contracts,” which aim to automatically and securely execute obligations without reliance on a centralized enforcement authority. Though smart contracts do have some features that might serve the goals of social justice and fairness, I suggest that they are based on a thin conception of what law does, and how it does it. Smart contracts focus on the technical form of contract to the exclusion of the social contexts within which contracts operate, an...

  10. Health innovation for patient safety improvement.

    Science.gov (United States)

    Sellappans, Renukha; Chua, Siew Siang; Tajuddin, Nur Amani Ahmad; Mei Lai, Pauline Siew

    2013-01-01

    Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be the lack of continuity of care due to the breakdown of communication between multiple healthcare providers. Solutions may include consideration of "health smart cards" that carry vital patient medical information in the form of a "credit card" or use of the Malaysian identification card. However, costs and technical aspects associated with the implementation of this health smart card will be a significant barrier. Security and confidentiality, on the other hand, are expected to be of primary concern to patients. Challenges associated with the implementation of a health smart card might include physician buy-in for use in his or her everyday practice. Training and technical support should also be available to ensure the smooth implementation of this system. Despite these challenges, implementation of a health smart card moves us closer to seamless care in our country, thereby increasing the productivity and quality of healthcare.

  11. 78 FR 39020 - Market Test on Gift Cards

    Science.gov (United States)

    2013-06-28

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 1755] Market Test on Gift Cards... Service filing requesting a temporary extension of a market test on gift cards. This notice informs the... INFORMATION: On June 18, 2013, the United States Postal Service moved to temporarily extend its Gift Card...

  12. A Review of Systems and Technologies for Smart Homes and Smart Grids

    Directory of Open Access Journals (Sweden)

    Gabriele Lobaccaro

    2016-05-01

    Full Text Available In the actual era of smart homes and smart grids, advanced technological systems that allow the automation of domestic tasks are developing rapidly. There are numerous technologies and applications that can be installed in smart homes today. They enable communication between home appliances and users, and enhance home appliances’ automation, monitoring and remote control capabilities. This review article, by introducing the concept of the smart home and the advent of the smart grid, investigates technologies for smart homes. The technical descriptions of the systems are presented and point out advantages and disadvantages of each technology and product today available on the market. Barriers, challenges, benefits and future trends regarding the technologies and the role of users have also been discussed.

  13. Towards a smart learning environment for smart city governance

    OpenAIRE

    Hammad, R.; Ludlow, D.; Computer Science and Creative Technology; Centre for Sustainable Planning

    2016-01-01

    Educational services provided to various stakeholders need to be actively developed to accommodate the diversity of learning models and to get the advantages of available resources (e.g. data) in smart cities governance. Despite the substantial literature on smart cities, for Technology-Enhanced Learning (TEL) and its related domains such as learning analytics and big data, little effort has been given to the creation of connectivity to smart cities governance to meet stakeholders’ demands, e...

  14. Towards the Smart World. Smart Platform: Infrastructure and Analytics

    CSIR Research Space (South Africa)

    Velthausz, D

    2012-10-01

    Full Text Available In this presentation the author outlines the 'smart world' concept and how technology (smart infrastructure, analytics) can foster smarter cities, smarter regions and a smarter world....

  15. 8 CFR 1212.6 - Border crossing identification cards.

    Science.gov (United States)

    2010-01-01

    ... combined B-1/B-2 visitor visa and non-biometric border crossing identification card or (a similar stamp in... non-biometric border crossing identification card (or similar stamp in a passport), issued by the DOS... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Border crossing identification cards. 1212...

  16. 76 FR 3180 - Market Test of Gift Cards

    Science.gov (United States)

    2011-01-19

    ... are very similar to money orders. Id. at 7. The Postal Service asserts that gift cards purchased from... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 647] Market Test of Gift Cards AGENCY... Service proposal to conduct a 2-year market test involving the sale of gift cards. This document describes...

  17. Traffic Information Systems for Smart Mobility as part of Smart Cities

    OpenAIRE

    Suske, David; Touko Tcheumadjeu, Louis Calvin; Sohr, Alexander; Xiaoxu, Bei

    2016-01-01

    The unlimited and unrestricted mobility of people and goods in urban areas is one of the key factors for economic and social development of the city. Today with the availability of smart technologies and various intelligent transportation and telematics solutions the Smart Mobility as part of a Smart City is possible to maintain the mobility ecosystem in the city. But to make the urban mobility smart by assuring the sustainability, safety, low emission and comfort in urban transport new mobil...

  18. Smart houses for a smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Kok, J.K.; Warmer, C.J. [ECN Efficiency and Infrastructure, Petten (Netherlands); Karnouskos, S.; Weidlich, A. [SAP Research, Karlsruhe Institute of Technology, (Germany); Nestle, D.; Strauss, P. [The Institut fuer Solare Energieversorgungstechnik ISET, University of Kassel, Kassel (Germany); Dimeas, A.; Hatziargyriou, N. [Institute Computers Communications Systems ICCS, National Technical University of Athens NTUA, Athens (Greece); Buchholz, B.; Drenkard, S. [MVV Energie, Berlin (Germany); Lioliou, V. [Public Power Corporation PPC, Athens (Greece)

    2009-08-15

    Innovative technologies and concepts will emerge as we move towards a more dynamic, service-based, market-driven infrastructure, where energy efficiency and savings can be facilitated by interactive distribution networks. A new generation of fully interactive Information and Communication Technologies (ICT) infrastructure has to be developed to support the optimal exploitation of the changing, complex business processes and to enable the efficient functioning of the deregulated energy market for the benefit of citizens and businesses. The architecture of such distributed system landscapes must be designed and validated, standards need to be created and widely supported, and comprehensive, reliable IT applications will need to be implemented. The collaboration between a smart house and a smart grid is a promising approach which, with the help of ICT can fully unleash the capabilities of the smart electricity network.

  19. Insuficiencia cardíaca y diabetes

    Directory of Open Access Journals (Sweden)

    Jorge Thierer

    2006-01-01

    Full Text Available La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la enzima convertidora ejercen una influencia favorable, en tanto que el uso de glitazonas todavía es controversial. La insuficiencia cardíaca puede a su vez generar diabetes, debido a la activación del sistema nervioso simpático y al efecto del tratamiento. La comprensión adecuada de estos hechos es fundamental para tomar decisiones correctas y mejorar la suerte de los pacientes.

  20. CRC-cards for Product Modelling

    DEFF Research Database (Denmark)

    Hvam, Lars; Riis, Jesper; Hansen, Benjamin Loer

    2003-01-01

    , transportation, service and decommissioning. A main challenge when building product models is to collect and document the product related data, information and knowledge in a structured way. CRC cards are index cards (or computerized versions of these) which are used to record proposed classes, the behavior......This paper describes the CRC (class, responsibility, collaboration) modelling process for building product models. A product model is normally represented in an IT system which contains data, information and knowledge on industrial products and their life cycle properties e.g. manufacturing...... of the classes, their responsibilities, and their relationship to other classes (collaboration). CRC modelling gives an effective, low-tech method for domain-experts, programmers and users to work closely together to identify, structure, understand and document a product model. CRC cards were originally...

  1. Smart Cities and the Idea of Smartness in Urban Development - A Critical Review

    Science.gov (United States)

    Husár, Milan; Ondrejička, Vladimír; Ceren Varış, Sıla

    2017-10-01

    The concept of smart cities is becoming another mantra for both developing and developed cities. For instance, Indian government in 2015 announced its objective to build one hundred smart cities all over the country. They clearly stated that they are choosing smart development as the underlying concept for their future growth as a way to foster economic development in smart way to avoid the paths of rapid industrialization and pollution of cities as it took place in Europe and United States. The first of these smart cities, Dholera, is already under construction and it attracts journalists and urban planners from all over the world. The aim of this paper is to critically discuss the theoretical backgrounds and the practices of smart cities and examine the ways the concept is implemented. The paper is based on thorough study of literature and examining the two case studies of Dholera (India) and Songdo (South Korea). Smart city is a contested concept without a unified definition. It stems from the idea of digital and information city promoted using information and communication technologies (ICT) to develop cities. By installation of ICT municipalities obtain large sets of data which are then transformed into effective urban policies. One of the pilot projects of this kind was Rio de Janeiro and building the Center of Operations by IBM Company. City made a great investment into the smart information system before two huge events took place - FIFA World Cup in 2014 and Olympic Games in 2016. The project raised many questions including whether and how it improved the life of its citizens and in what way it made the city smart. The other definition of smart city is the idea of smartness in city development in broader sense. It focuses on smart use of resources, smart and effective management and smart social inclusion. Within this view, the ICTs are one component of the concept, by no means its bread and butter. Technologies can be used in a variety of ways. Problem

  2. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  3. Final report SmartProofS. Results of projects of the SmartProofS program; Eindrapport SmartProofS. Projectresultaten van het SmartProofS programma

    Energy Technology Data Exchange (ETDEWEB)

    Van Hoorik, P.; Westerga, R. [Energy Valley, Groningen (Netherlands)

    2011-05-15

    The SmartProofs program aims to develop tools which must show that the principle of a Smart Power System (SPS) works and how. An SPS can ensure that the supply and demand of electricity in the grid is balanced, even in case more decentralized energy techniques will be put into use. This final report summarizes the main results and conclusions of the SmartProofs program. As part of the SPS program attention is paid to the impacts on the girds, the effects of centralized and decentralized management, disaster resilience, pricing models, potential benefits of control and new business models [Dutch] Het SmartProofs programma heeft tot doel om een concept van een Smart Power System (SPS) te ontwikkelen waarmee kan worden aangetoond dat het principe van een SPS werkt en op welke manier. Een SPS kan zorgen dat het aanbod van elektriciteit op het net op elk moment van de dag overeenkomt met de vraag, ook als er straks veel meer decentrale energietechnieken gebruikt worden waarmee zowel de vraag als het aanbod van elektriciteit onvoorspelbaar wordt. Dit eindrapport geeft een overzicht van de belangrijkste resultaten en conclusies van het SmartProofs programma. Het programma heeft in de werkpakketten deelvraagstukken rondom SmartProofS onderzocht rondom de effecten op onze energienetten, de effecten van zowel centrale- als decentrale aansturing, disaster resilience, prijsmodellen, mogelijke baten van aansturing en nieuwe business modellen.

  4. Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision

    DEFF Research Database (Denmark)

    Lynggaard, Per; Skouby, Knud Erik

    2016-01-01

    The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world’s population will live their lives in smart homes and in smart cities...... the “smart” vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the “big challenges” and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits......% of the wastewater energy in a smart residential building. By letting the smart city infrastructure coordinate and control the harvest time and duration, it is possible to achieve considerable energy savings in the smart homes, and it is possible to reduce the peak-load for district heating plants....

  5. Smart City and Smart Tourism: A Case of Dubai

    OpenAIRE

    M. Sajid Khan; Mina Woo; Kichan Nam; Prakash K. Chathoth

    2017-01-01

    Over the past decade, the advent of new technology has brought about the emergence of smart cities aiming to provide their stakeholders with technology-based solutions that are effective and efficient. Insofar as the objective of smart cities is to improve outcomes that are connected to people, systems and processes of businesses, government and other public- and private-sector entities, its main goal is to improve the quality of life of all residents. Accordingly, smart tourism has emerged o...

  6. Why do card issuers charge proportional fees?

    OpenAIRE

    Oz Shy; Zhu Wang

    2008-01-01

    This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...

  7. Energy conservation through smart homes in a smart city: A lesson for Singapore households

    International Nuclear Information System (INIS)

    Bhati, Abhishek; Hansen, Michael; Chan, Ching Man

    2017-01-01

    Energy saving is a hot topic due to the proliferation of climate changes and energy challenges globally. However, people's perception about using smart technology for energy saving is still in the concept stage. This means that people talk about environmental awareness readily, yet in reality, they accept to pay the given energy bill. Due to the availability of electricity and its integral role, modulating consumers’ attitudes towards energy savings can be a challenge. Notably, the gap in today's smart technology design in smart homes is the understanding of consumers’ behaviour and the integration of this understanding into the smart technology. As part of the Paris Climate change agreement (2015), it is paramount for Singapore to introduce smart technologies targeted to reduce energy consumption. This paper focused on the perception of Singapore households on smart technology and its usage to save energy. Areas of current research include: (1) energy consumption in Singapore households, (2) public programs and policies in energy savings, (3) use of technology in energy savings, and (4) household perception of energy savings in smart homes. Furthermore, three case studies are reviewed in relation to smart homes and smart technology, while discussing the maturity of existing solutions. - Highlights: • Analyse perception of Singapore households about the usage of smart technology to save energy. • Reviews energy consumption, public policies and household perception of energy savings. • Three case studies were developed and reviewed in relation to smart homes and smart technology. • Analyse research gap of household behaviours and perceptions as smart home design focus.

  8. Participation Dynamics of Voters Using ID Card in Local Elections: A Case Study of the 2015 Local Election in South Sulawesi

    Directory of Open Access Journals (Sweden)

    Andi Ahmad Yani

    2017-10-01

    Full Text Available The number of voters is an essential element in the legitimacy of a democratic regime. There are various factors that may influence voter turnout in elections; among other factors particularly is electoral management in voter’s registration. The problem of voters' data has always been a scourge in every general or local election due to poor population data management in Indonesia. Hence, the General Elections Commission (KPU responded to this issue with a number of policies to increase the number of voter participation in all elections, especially for those who have not been registered properly. The Commission made a specific regulation to allow voters who were not registered in the voter lists (DPS to use their ID card (KTP or other legal documents in voting. This study used qualitative methods in five regions in the South Sulawesi Province that conducted the 2015 local election. This study explores the dynamics of voters using ID card or other legal documents by identifying their reasons and characteristics in using KTP as well as examining the responses of the local election institutions regarding this policy. This condition tends to apply to countries in the transitional period of democracy where the electoral administration system has not been properly regulated. The causes include the failure of administrative systems of management and population data collection with e-KTP card system in Indonesia.

  9. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  10. Prototype ALICE front-end card

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    This circuit board is a prototype 48-channel front end digitizer card for the ALICE time projection chamber (TPC), which takes electrical signals from the wire sensors in the TPC and shapes the data before converting the analogue signal to digital data. A total of 4356 cards will be required to process the data from the ALICE TPC, the largest of this type of detector in the world.

  11. Credit Card Attitudes and Behaviors of College Students

    Science.gov (United States)

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  12. Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision.

    Science.gov (United States)

    Lynggaard, Per; Skouby, Knud Erik

    2016-11-02

    The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world's population will live their lives in smart homes and in smart cities. To deal with these challenges, to support a sustainable urban development, and to improve the quality of life for citizens, a multi-disciplinary approach is needed. It seems evident, however, that a new, advanced Information and Communications Technology ICT infrastructure is a key feature to realize the "smart" vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the "big challenges" and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits of this infrastructure, a complex IoT system has been deployed, simulated and elaborated. This simulation deals with wastewater energy harvesting from smart buildings located in a smart city context. From the simulations, it has been found that the proposed infrastructure is able to harvest between 50% and 75% of the wastewater energy in a smart residential building. By letting the smart city infrastructure coordinate and control the harvest time and duration, it is possible to achieve considerable energy savings in the smart homes, and it is possible to reduce the peak-load for district heating plants.

  13. Smart City Planning

    DEFF Research Database (Denmark)

    Ekman, Ulrik

    2018-01-01

    This article reflects on the challenges for urban planning posed by the emergence of smart cities in network societies. In particular, it reflects on reductionist tendencies in existing smart city planning. Here the concern is with the implications of prior reductions of complexity which have been...... undertaken by placing primacy in planning on information technology, economical profit, and top-down political government. Rather than pointing urban planning towards a different ordering of these reductions, this article argues in favor of approaches to smart city planning via complexity theory....... Specifically, this article argues in favor of approaching smart city plans holistically as topologies of organized complexity. Here, smart city planning is seen as a theory and practice engaging with a complex adaptive urban system which continuously operates on its potential. The actualizations in the face...

  14. The legal framework for data privacy and protection in smart metering and smart grids; Der Rechtsrahmen beim Datenschutz fuer Smart Metering und Smart Grids

    Energy Technology Data Exchange (ETDEWEB)

    Stamm, Markus [Alcatel-Lucent Deutschland AG, Nuernberg (Germany)

    2011-07-01

    The legal framework for data privacy and protection in Smart Meter and Smart Grid applications has been substantially changed through modifications of the German law on the supply of electricity and gas (Energiewirtschaftsgesetz - EnWG), especially through its sections 21c et seq. Nonetheless, these modifications have on partially attained the goal of the reform, to create a secure legal framework for the use of Smart Meters and Smart Grids, and some of the newly introduced regulations actually decrease the security of the framework through the use of systematically incorrect terminology. This article gives an overview of the content of the key regulations and the issues to be resolved which result from them. (orig.)

  15. Registration performance on EUV masks using high-resolution registration metrology

    Science.gov (United States)

    Steinert, Steffen; Solowan, Hans-Michael; Park, Jinback; Han, Hakseung; Beyer, Dirk; Scherübl, Thomas

    2016-10-01

    Next-generation lithography based on EUV continues to move forward to high-volume manufacturing. Given the technical challenges and the throughput concerns a hybrid approach with 193 nm immersion lithography is expected, at least in the initial state. Due to the increasing complexity at smaller nodes a multitude of different masks, both DUV (193 nm) and EUV (13.5 nm) reticles, will then be required in the lithography process-flow. The individual registration of each mask and the resulting overlay error are of crucial importance in order to ensure proper functionality of the chips. While registration and overlay metrology on DUV masks has been the standard for decades, this has yet to be demonstrated on EUV masks. Past generations of mask registration tools were not necessarily limited in their tool stability, but in their resolution capabilities. The scope of this work is an image placement investigation of high-end EUV masks together with a registration and resolution performance qualification. For this we employ a new generation registration metrology system embedded in a production environment for full-spec EUV masks. This paper presents excellent registration performance not only on standard overlay markers but also on more sophisticated e-beam calibration patterns.

  16. SMART-NPA evaluation report

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hee Kyung; Lee, G. H.; Yoon, H. Y.; Kim, H. C. [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2002-05-01

    SMART(System-integrated Modular Advanced ReacTor) is a 330 MWt integral reactor which is currently under development at Korea Atomic Energy Research Institute for desalination and electricity generation. SMART-NPA is the second user interface part of TASS/SMR in order to improve GUI(Graphic User Interface). Using SMART-NPA the analyzer not only can see the running status of SMART but make change of major SMART parameters. TASS/SMR, the calculation part, was written in Fortran whereas the first user interface part, called TASSWin, was written in Visual C{sup ++}. For these reason, the ActiveX control was chosen as the solution of SMART-NPA development. The five ActiveX controls were built in Visual Basic. They were Overview, Primary, Secondary, PRHRS and Control Panel ActiveX controls. They were contained in tab control, and can easily selected by user. They could communicate with TASSWin using many interface functions. The graph screens were also developed for the display of major variable's trend. The purpose of this report is the verification of SMART-NPA. The input decks were 100-200-100% power maneuvering operation, Feed Line Break Accident and user's input on Control Panel. The results of SMART-NPA for these cases were compared with the results of TASS/SMR stand alone version. The comparison results were same respectively. And all screens of SMART-NPA reflected the calculated results of TASS/SMR very well. That means SMART-NPA was calculated results of TASS/SMR very well. That means SMART-NPA was verified. 9 refs., 30 figs., 4 tabs. (Author)

  17. Loyalty Card Promotional Activity in Budget Hotel

    OpenAIRE

    Teng, Fei

    2010-01-01

    Loyalty card is one of the most commonly used promotional activities in business. Thus far, there are some research has been done on luxury hotel, but very few researches are on budget hotel. So, the purpose of the thesis is finding out the Swedish customers’ attitude and behavior towards budget hotel’s loyalty card; getting to know what factors influence Swedish customers’ response towards the loyalty card and budget hotels. In the thesis, the main research problem is “How do Swedish custome...

  18. Benefits of Using Vocabulary Flash Cards in an EFL Classroom

    OpenAIRE

    Jonathan, Aliponga; Christopher C, Johnston

    2013-01-01

    This paper was written to research and advocate the use of English word cards withregard to vocabulary acquisition and English productive and receptive competency. Also,student perceptions of using and making word cards will be examined to show theimportance of including a word card policy in an EFL classroom. Despite all the positiveresearch done on word cards, it is surprising how many Japanese EFL students do notutilize word cards in their English studies. For this research, 108 students f...

  19. Tumores cardíacos primarios

    Directory of Open Access Journals (Sweden)

    Rosa Eugenia Díaz Garriga

    2013-10-01

    Full Text Available Introducción: los tumores cardíacos primarios son aquellos que se originan en Miocardio o Pericardio. El 90% son benignos, no son invasivos, pero debido a su localización pueden provocar alteraciones hemodinámicas graves y arrítmias. Presentación del caso: dos casos portadores de tumores cardíacos diagnosticados en la etapa prenatal, una gestante de 32 años, portadora de una Neurofribromatosis que en la ecocardiografía fetal de su hijo, se identifican dos tipos de tumores cardíacos, un mixoma auricular y un fibroma, y un niño que desde la etapa prenatal se diagnosticó un rabdomioma, lo cual se confirmó al nacimiento y que regresó espontáneamente. Conclusiones: a ecocardiografía fetal permite cada vez con más frecuencia, el diagnóstico intraútero de tumores cardíacos. Los rabdomiomas regresan en más del 50% de los casos, pero pueden ser un marcador de Esclerosis Tuberosa. Los tumores cardiacos se asocian a otras afecciones congénitas y requieren de tratamiento quirúrgico. Aspectos todos a tener en consideración para realizar el asesoramiento genético a la familia.

  20. Smart City project

    KAUST Repository

    Al Harbi, Ayman

    2018-01-24

    A \\'smart city\\' is an urban region that is highly advanced in terms of overall infrastructure, sustainable real estate, communications and market viability. It is a city where information technology is the principal infrastructure and the basis for providing essential services to residents. Yanbu Industrial City- Smart City Project - First large scale smart city in The kingdom.