WorldWideScience

Sample records for registration id card

  1. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  2. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  3. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  4. ID card number detection algorithm based on convolutional neural network

    Science.gov (United States)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  5. Picture This: How to Establish an Effective School ID Card Program

    Science.gov (United States)

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  6. Authentications of Myanmar National Registration Card

    Directory of Open Access Journals (Sweden)

    Myint Myint Sein

    2013-04-01

    Full Text Available The automatic identification system of Myanmar national registration card (NRC holder is presented in this paper. The proposed system can be handled the identification by the extracted low quality face image and fingerprint image from Myanmar NRC. Both of the facial recognition and fingerprint recognition system are developed for Myanmar citizenship confirmation. Age invariant face recognition algorithm is performed based on combination of DiaPCA (Diagonal principal Component Analysis and KNN (Kth nearest neighbor classifier approaches. An algorithm of the fingerprint recognition is proposed for recognition of the poor quality fingerprint image with fabric background.  Several experiments have been done for confirming the effectiveness of the proposed approach.

  7. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  8. Use of false ID cards and other deceptive methods to purchase alcoholic beverages during high school.

    Science.gov (United States)

    Schwartz, R H; Farrow, J A; Banks, B; Giesel, A E

    1998-01-01

    Altered motor vehicle drivers's licenses or other falsified or counterfeit photo identification cards are widely and illegally used by teenagers to obtain beer and other alcohol beverages. We obtained information on the methods currently used by teenagers to purchase beer and wine by asking nine hundred teenagers, between 16-19 years old to complete a brief, confidential questionnaire. High school students most often obtained alcoholic beverages by requesting someone of legal age to purchase it for them. College students used borrowed, altered, or counterfeit identification (ID) more often than high school students. Photo IDs purchased through mail order from a magazine advertisement were used infrequently and when use was attempted, they were sometimes (25%) unsuccessful. Fifteen percent of high school students, 14% of college freshmen, and 24% of teenage drug abusers were able to purchase beer by the case with borrowed, altered, or fake ID. Suggestions to reduce sales of alcohol-containing beverages to minors include universal "carding" of prospective purchasers, use of two view or hologram photos on a drivers' license, requiring three different ID cards at the point of purchase, and penalties to stores that fail to make a good effort to identify underage customers.

  9. Using Efficient TRNGs for PSEUDO Profile in National eID Card

    OpenAIRE

    Blerim Rexha; Dren Imeraj; Isak Shabani

    2018-01-01

    Applications that requires true random number generator (TRNG), which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID) beyond the true identity of ...

  10. Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports

    Directory of Open Access Journals (Sweden)

    RIAD, R.

    2016-11-01

    Full Text Available Security checking can be improved by watermarking identity (ID images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter. Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user.

  11. Rancang Sistem Absensi Siswa Menggunakan Id Card Dengan Pemberitahuan SMS Berbasis Mikrokontroller At Mega 16

    OpenAIRE

    Rangkuti, Nur Hafiz Ahmad

    2017-01-01

    150821053 The system of Radio frequency identification (RFID) is a technology that uses communication via electromagnetic waves to change data between terminals with an object such as product goods, animals, or humans with the aim to Here the author uses identification identification is a STUDENT ID CARD and searches the trail through the use of a device called the RFID tag. RFID tags can be active or passive. Passive RFID tags do not have their own power supply, so the price is cheaper th...

  12. Participation Dynamics of Voters Using ID Card in Local Elections: A Case Study of the 2015 Local Election in South Sulawesi

    Directory of Open Access Journals (Sweden)

    Andi Ahmad Yani

    2017-10-01

    Full Text Available The number of voters is an essential element in the legitimacy of a democratic regime. There are various factors that may influence voter turnout in elections; among other factors particularly is electoral management in voter’s registration. The problem of voters' data has always been a scourge in every general or local election due to poor population data management in Indonesia. Hence, the General Elections Commission (KPU responded to this issue with a number of policies to increase the number of voter participation in all elections, especially for those who have not been registered properly. The Commission made a specific regulation to allow voters who were not registered in the voter lists (DPS to use their ID card (KTP or other legal documents in voting. This study used qualitative methods in five regions in the South Sulawesi Province that conducted the 2015 local election. This study explores the dynamics of voters using ID card or other legal documents by identifying their reasons and characteristics in using KTP as well as examining the responses of the local election institutions regarding this policy. This condition tends to apply to countries in the transitional period of democracy where the electoral administration system has not been properly regulated. The causes include the failure of administrative systems of management and population data collection with e-KTP card system in Indonesia.

  13. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    Science.gov (United States)

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  14. Using Efficient TRNGs for PSEUDO Profile in National eID Card

    Directory of Open Access Journals (Sweden)

    Blerim Rexha

    2018-03-01

    Full Text Available Applications that requires true random number generator (TRNG, which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID beyond the true identity of his bearer and to address the increasing concern of user privacy while doing business in Internet an additional pseudo profile is set. This pseudo profile uses 20-byte random value generated by database server, using a script during personalization process. In this paper, we present a novel algorithm that enables efficient distribution conversion in low power devices. The low memory requirements and efficient processing make it suitable for implementation low power cryptographic devices but also in complex personalization systems. Furthermore, we compare the random data generated by our efficient TRNG vs. those generated by database server.

  15. 77 FR 65166 - Information Collection; Request for Comment; Visitor Permit and Visitor Registration Card

    Science.gov (United States)

    2012-10-25

    ..., number of dogs and number of pack and saddle stock (that is, the number of animals either carrying people... dogs, number of pack and saddle stock (that is, the number of animals either carrying people or their... people. The information collected from the Visitor's Permit (FS-2300-30) and Visitor Registration Card...

  16. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  17. Vitek 2 ANC card versus BBL Crystal Anaerobe and RapID ANA II for identification of clinical anaerobic bacteria.

    Science.gov (United States)

    Blairon, Laurent; Maza, Mengi L; Wybo, Ingrid; Piérard, Denis; Dediste, Anne; Vandenberg, Olivier

    2010-08-01

    The Vitek 2 Anaerobe and Corynebacterium Identification Card (ANC) was recently evaluated in a multicentre study. In the present work, this system was compared with the BBL Crystal Anaerobe and RapID ANA II panels. These kits were tested using 196 strains of anaerobes that had been previously identified by gas-liquid chromatography. Identification to the species or to the genus level was 75.0%, 81.1% and 70.9% for Crystal, RapID and Vitek, respectively. Vitek ANC failed to provide any identification in 20.4% of the strains, but it had fewer misidentifications than RapID. The confidence factors provided on the results report of each kit were not always correlated with a lower risk of major errors, with the exception of Vitek 2 in which a confidence factor higher than 0.86 excluded the risk of misidentification in more than 87% of isolates. The lower rate of identification by the Vitek and Crystal panels is mostly due the lower ability of these systems to identify the Clostridia. Overall, the three panels are comparable but need improvement to a better accuracy. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  18. The Cardiology Audit and Registration Data Standards (CARDS), European data standards for clinical cardiology practice

    NARCIS (Netherlands)

    M.R. Flynn (Rachel); C. Barrett (Conor); F.G. Cosio (Francisco); A.K. Gitt (Anselm); L.C. Wallentin (Lars); P. Kearney (Peter); M. Lonergan (Moira); E. Shelley (Emer); M.L. Simoons (Maarten)

    2005-01-01

    textabstractAIMS: Systematic registration of data from clinical practice is important for clinical care, local, national and international registries, and audit. Data to be collected for these different purposes should be harmonized. Therefore, during Ireland's Presidency of the European Union (EU)

  19. [Evaluation of a registration card for logging electrocardiographic records into standard personal computers].

    Science.gov (United States)

    Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M

    1997-01-01

    The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and

  20. Hydride, hydrogen, proton, and electron affinities of imines and their reaction intermediates in acetonitrile and construction of thermodynamic characteristic graphs (TCGs) of imines as a "molecule ID card".

    Science.gov (United States)

    Zhu, Xiao-Qing; Liu, Qiao-Yun; Chen, Qiang; Mei, Lian-Rui

    2010-02-05

    A series of 61 imines with various typical structures were synthesized, and the thermodynamic affinities (defined as enthalpy changes or redox potentials in this work) of the imines to abstract hydride anions, hydrogen atoms, and electrons, the thermodynamic affinities of the radical anions of the imines to abstract hydrogen atoms and protons, and the thermodynamic affinities of the hydrogen adducts of the imines to abstract electrons in acetonitrile were determined by using titration calorimetry and electrochemical methods. The pure heterolytic and homolytic dissociation energies of the C=N pi-bond in the imines were estimated. The polarity of the C=N double bond in the imines was examined using a linear free-energy relationship. The idea of a thermodynamic characteristic graph (TCG) of imines as an efficient "Molecule ID Card" was introduced. The TCG can be used to quantitatively diagnose and predict the characteristic chemical properties of imines and their various reaction intermediates as well as the reduction mechanism of the imines. The information disclosed in this work could not only supply a gap of thermodynamics for the chemistry of imines but also strongly promote the fast development of the applications of imines.

  1. Registration Service

    CERN Multimedia

    GS Department

    2010-01-01

    Following a reorganization in Building 55, please note that the Registration Service is now organised as follows :  Ground floor: access cards (76903). 1st floor : registration of external firms’ personnel (76611 / 76622); car access stickers (76633); biometric registration (79710). Opening hours: 07-30 to 16-00 non-stop. GS-SEM Group General Infrastructure Services Department

  2. MALDI-TOF MS is more accurate than VITEK II ANC card and API Rapid ID 32 A system for the identification of Clostridium species.

    Science.gov (United States)

    Kim, Young Jin; Kim, Si Hyun; Park, Hyun-Jung; Park, Hae-Geun; Park, Dongchul; Song, Sae Am; Lee, Hee Joo; Yong, Dongeun; Choi, Jun Yong; Kook, Joong-Ki; Kim, Hye Ran; Shin, Jeong Hwan

    2016-08-01

    All 50 Clostridium difficile strains were definitely identified by Vitek2 system, Rapid ID 32A system, and MALDI-TOF. For 18 non-difficile Clostridium strains, the identification results were correct in 0, 2, and 17 strains by Vitek2, Rapid ID 32A, and MALDI-TOF, respectively. MALDI-TOF could be used as the primary tool for identification of Clostridium species. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  4. 32 CFR 1615.1 - Registration.

    Science.gov (United States)

    2010-07-01

    ... registration card or other method of registration prescribed by the Director of Selective Service by a person... the records (master computer file) of the Selective Service System. Registration is completed when... Director include completing a Selective Service Registration Card at a classified Post Office, registration...

  5. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  6. Security and Privacy Improvements for the Belgian eID Technology

    Science.gov (United States)

    Verhaeghe, Pieter; Lapon, Jorn; de Decker, Bart; Naessens, Vincent; Verslype, Kristof

    The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals.

  7. Information from the Registration Service

    CERN Multimedia

    GS Department

    2011-01-01

    Please note that the Registration Service (Bldg 55-1st floor) will be exceptionally open during the annual end of year closure from 10:00 to 12:00 on the following days: 22, 23, 26, 27,28, 29 et 30 December 2011 and 2,3, et 4 January 2012. All the activities related to the Registration Service will be operational: registration for contractors’ personnel; registrations for professional visits; access cards; car stickers; biometric registration. The Registration Service

  8. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  9. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  10. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  11. Best practices for the implementation of the REAL ID Act.

    Science.gov (United States)

    2015-10-01

    The REAL ID Act specifies the minimum standards that must be used to produce and issue drivers license and : identification cards that are REAL ID compliant. Beginning in 2020, if a person does not possess a form of : identification that meets REA...

  12. 76 FR 3180 - Market Test of Gift Cards

    Science.gov (United States)

    2011-01-19

    ... are very similar to money orders. Id. at 7. The Postal Service asserts that gift cards purchased from... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 647] Market Test of Gift Cards AGENCY... Service proposal to conduct a 2-year market test involving the sale of gift cards. This document describes...

  13. Sample Development on Java Smart-Card Electronic Wallet Application

    OpenAIRE

    Toma Cristian

    2009-01-01

    In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet ...

  14. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  15. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  16. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  17. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  18. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  19. Historical WBAN ID Assignments

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — 4"x6" index cards represent the first written assignments of Weather Bureau Army Navy (WBAN) station identifier numbers by the National Climatic Data Center....

  20. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  1. Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges

    Science.gov (United States)

    Büger, Matthias

    The German federal government plans to issue an electronic citizen card (eID) in 2009, replacing the current identity card (Personalausweis). Since the eID should be good for identification in E-government as well as E-business applications, it is aimed to be used in the banking environment. One application would be opening a bank account in the internet. If this was possible, the process would be much easier than today. However, German law still requires a physical ID card. We will discuss the opportunities and the challenges of possible usage of eID in banking.

  2. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  3. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Machine readable technology on the driver's..., Verification, and Card Issuance Requirements § 37.19 Machine readable technology on the driver's license or identification card. For the machine readable portion of the REAL ID driver's license or identification card...

  4. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  5. Registration system of cloud campus by using android smart tablet.

    Science.gov (United States)

    Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko

    2014-01-01

    Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.

  6. Interoperability for electronic ID

    OpenAIRE

    Zygadlo, Zuzanna

    2009-01-01

    Electronic Business, including eBanking, eCommerce and eGovernmental services, is today based on a large variety of security solutions, comprising electronic IDs provided by a broad community of Public Key Infrastructure (PKI) vendors. Significant differences in implementations of those solutions introduce a problem of lack of interoperability in electronic business, which have not yet been resolved by standardization and interoperability initiatives based on existing PKI trust models. It i...

  7. FlowIDS

    OpenAIRE

    Sabolčák, Peter

    2006-01-01

    FlowIDS is system which can detect some of the undesirable traffi c in computer networks (undesirable traffic could be also ie. virus activity or overloading of network) and mostly doing counteraction which are set by administrator. Information about data ows are provided by hardware of network infrastructure, eliminitaion of undesirable activity is done through changes in network hardware settings. Regarding the quantity of solution which are provided on market, I decided to focus on Cisco n...

  8. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  9. 77 FR 2613 - Registration of Swap Dealers and Major Swap Participants

    Science.gov (United States)

    2012-01-19

    ... natural person who is a principal of an applicant for registration to file a fingerprint card. The... and text identical to that which existed prior to this unintentional deletion. The Commission also... apply for registration must file a Form 7-R, and a Form 8-R and fingerprint card for each principal of...

  10. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  11. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  12. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  13. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  14. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  15. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  16. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  17. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  18. Facts about Infectious Diseases (ID)

    Science.gov (United States)

    ... an ID Specialist? Facts about ID Pocketcard Infectious diseases are caused by microscopic organisms that penetrate the body’s natural ... from diseases such as AIDS or treatment of diseases such as cancer, may allow ... of contaminated food or water, bites from vectors such as ticks or mosquitoes ...

  19. REMINDER - PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2003-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  20. REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2002-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards.Relations with the Host States Service Tel. 72848

  1. REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS

    CERN Multimedia

    Relations with the Host States Service

    2002-01-01

    The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  2. An Improvement on Remote User Authentication Schemes Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2018-01-01

    Full Text Available In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.

  3. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  4. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  5. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  6. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  7. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  8. Factors Determining Availability, Utilization and Retention of Child Health Card in Western Nepal.

    Science.gov (United States)

    Paudel, K P; Bajracharya, D C; Karki, K; K C, A

    2016-05-01

    The immunization card is revised with addition of general information about child health and is later called as child health card. This card is a tool used by Health Management Information System in Nepal. It is important for tracking the records of immunization. Aim is to identify the factors determining the availability, utilization and retention of the child health card in Western Nepal. A cross sectional study was conducted among mothers having children education. Retention of the card was found to be 82.2%. 90.3% retention was seen among 0-12 months children age group whereas it was 74 % among12 to 24 months age group. The reasons for less retention were torn by the child/played by child (54.6%) followed by lack of proper place,unaware about importance and poor quality of card.The new child health cards were insufficient, compelling use of both new and old cards which created problem in consistency. Regarding utilization of child health card, it was found to be used for birth registration and for further studies in abroad. The areas of utilization of child health card should be broadened so that the retention of card can be increased. The main reasons for less retention of the card are torn by children and lack of the proper place.

  9. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  10. 76 FR 51417 - Surinder Dang, M.D.; Revocation of Registration

    Science.gov (United States)

    2011-08-18

    ... and handed him a business card listing her name as R.K. and her position as ``president.'' Id. R.K... the latter's report.\\7\\ Id. at 6. \\7\\ More specifically, there were 14 bottles of 500 count of hydrocodone/apap 7.5/500 mg, 10 bottles of 500 count hydrocodone/ apap 10/500 mg, 36 bottles of 500 count...

  11. Credit Card Quiz.

    Science.gov (United States)

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  12. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  13. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  14. Buccal DNA collection: comparison of buccal swabs with FTA cards.

    Science.gov (United States)

    Milne, Elizabeth; van Bockxmeer, Frank M; Robertson, Laila; Brisbane, Joanna M; Ashton, Lesley J; Scott, Rodney J; Armstrong, Bruce K

    2006-04-01

    Collection and analysis of DNA, most commonly from blood or buccal cells, is becoming more common in epidemiologic studies. Buccal samples, which are painless to take and relatively easily collected, are often the preferred source. There are several buccal cell collection methods: swabs, brushes, mouthwash, and treated cards, such as FTA or IsoCode cards. Few studies have systematically compared methods of buccal cell collection with respect to DNA yield and amplification success under similar conditions. We compared buccal DNA collection and amplification using buccal swabs and FTA cards in 122 control subjects from our Australian case-control study of childhood acute lymphoblastic leukaemia. Buccal DNA was quantified using a real-time PCR for beta-actin and genotyped at the loci of three polymorphisms (MTHFR 677C>T, ACE I/D, and XPD 1012G>A). PCR was successful with DNA from buccal swabs for 62% to 89% of subjects and from FTA cards for 83% to 100% of subjects, depending on the locus. The matched pair odds ratios (95% confidence interval) comparing success of FTA cards with buccal swabs are as follows: MTHFR 677C>T using PCR-RFLP, 12.5 (11.6-13.5) and using real-time PCR, 130.0 (113.1-152.8); ACE I/D using PCR-amplified fragment length polymorphism, 3.36 (3.2-3.5); XPD 1012G>A using real-time PCR, 150.0 (132.7-172.3). FTA cards are a robust DNA collection method and generally produce DNA suitable for PCR more reliably than buccal swabs. There are, however, technical challenges in handling discs punched from FTA cards that intending users should be aware of.

  15. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database (Ethernet and wire-less cards) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (security problems, viruses, etc.) • Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) • Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/registerVisitorComp...

  16. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database including all network access cards (Ethernet AND wireless) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (e.g. security problems, viruses, etc.) Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/regis...

  17. Secure E-Business applications based on the European Citizen Card

    Science.gov (United States)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  18. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  19. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  20. 78 FR 78356 - Notice of Receipt of Pesticide Products; Registration Applications To Register New Uses

    Science.gov (United States)

    2013-12-26

    ... January 27, 2014. ADDRESSES: Submit your comments, identified by docket identification (ID) number and the... vegetables, fruiting vegetables, strawberries, tree nuts, and wheat. (RD) 3. EPA Registration Number: 7969...

  1. 76 FR 4940 - Algirdas J. Krisciunas, M.D.; Revocation of Registration

    Science.gov (United States)

    2011-01-27

    ... deaths in Broward County, ``they have * * * extra workers inspecting, they got a lot of money from the... just $250 at a couple of places. Id. Registrant told Rix that a new law passed in February would...

  2. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  3. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  4. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  5. Smart Icon Cards

    Science.gov (United States)

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  6. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  7. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  8. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...

  9. VLM Tool for IDS Integration

    Directory of Open Access Journals (Sweden)

    Cǎtǎlin NAE

    2010-03-01

    Full Text Available This paper is dedicated to a very specific type of analysis tool (VLM - Vortex Lattice Method to be integrated in a IDS - Integrated Design System, tailored for the usage of small aircraft industry. The major interest is to have the possibility to simulate at very low computational costs a preliminary set of aerodynamic characteristics for basic aerodynamic global characteristics (Lift, Drag, Pitching Moment and aerodynamic derivatives for longitudinal and lateral-directional stability analysis. This work enables fast investigations of the influence of configuration changes in a very efficient computational environment. Using experimental data and/or CFD information for a specific calibration of VLM method, reliability of the analysis may me increased so that a first type (iteration zero aerodynamic evaluation of the preliminary 3D configuration is possible. The output of this tool is basic state aerodynamic and associated stability and control derivatives, as well as a complete set of information on specific loads on major airframe components.The major interest in using and validating this type of methods is coming from the possibility to integrate it as a tool in an IDS system for conceptual design phase, as considered for development for CESAR project (IP, UE FP6.

  10. ID Barrel installed in cryostat

    CERN Multimedia

    Apsimon, R.; Romaniouk, A.

    Wednesday 23rd August was a memorable day for the Inner Detector community as they witnessed the transport and installation of the central part of the inner detector (ID-barrel) into the ATLAS detector. Many members of the collaboration gathered to witness this moment at Point 1. After years of design, construction and commissioning, the outer two detectors (TRT and SCT) of the ID barrel were moved from the SR1 cleanroom to the ATLAS cavern. The barrel was moved across the car park from building 2175 to SX1. Although only a journey of about 100 metres, this required weeks of planning and some degree of luck as far as the weather was concerned. Accelerometers were fitted to the barrel to provide real-time monitoring and no values greater than 0.1 g were recorded, fully satisfying the transport specification for this extremely precise and fragile detector. Muriel, despite her fear of heights, bravely volunteered to keep a close eye on the detector. Swapping cranes to cross the entire parking lot, while Mur...

  11. A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM

    OpenAIRE

    Xu , Fei; Yau , Ken; Zhang , Ping; Chow , Kam-Pui

    2015-01-01

    Part 2: INTERNET CRIME INVESTIGATIONS; International audience; Internet real-name registration requires a user to provide personal identification credentials including his/her real name to an online service provider when registering for an account. In China, real-name registration has been implemented since 2010 for purchasing train tickets and mobile phone SIM cards. In 2013, the Chinese government announced that real-name registration would be implemented for Internet users to protect again...

  12. Application of IC Card License for Road Transportation in Commercial Vehicles Supervision and Service

    Directory of Open Access Journals (Sweden)

    Li Weiwei

    2016-01-01

    Full Text Available IC card electronic license for road transport includes the IC card commercial vehicle’s certificate and IC card practitioner’s qualification certificate. In China, the IC card electronic license for road transport is the electronic ID card which must be carried by each commercial vehicles and practitioners. This paper briefly introduces the basic situation, data format and security keys architecture of IC card electronic license for road transportation of China. In order to strengthen the supervision and service of commercial vehicles, this paper puts forward the overall application framework of IC card electronic license for road transport. The application examples of IC card license in the supervision of passenger station, dangerous goods transport management, governance overload and logistics park and port area management are discussed. The practical application results show that the application of IC card electronic license for road transport is an important technical means to improve the supervision ability and service quality of the road transportation industry.

  13. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  14. Japanese Tarot Cards

    Directory of Open Access Journals (Sweden)

    Laura Miller

    2017-04-01

    Full Text Available This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced with images from the world of Japanese art, history, and popular culture. These substitutions either gloss over the gaps between Western and Japanese world views or meld them into a new form, allowing the tarot entry into a different or hybrid metaphysical culture. Attention to tarot cards is important because of their great economic and cultural impact in contemporary Japan. A widespread love of tarot in Japan provides insight into domains of pleasure, spiritual exploration, and fandom.

  15. 7 CFR 274.10 - Use of identification cards and redemption of coupons by eligible households.

    Science.gov (United States)

    2010-01-01

    ... separate form. The household shall not be required to travel to a food stamp office to execute an emergency... Agriculture (Continued) FOOD AND NUTRITION SERVICE, DEPARTMENT OF AGRICULTURE FOOD STAMP AND FOOD DISTRIBUTION..., shall present the household's ID card at issuance points, retail food stores or meal services in order...

  16. Japanese Tarot Cards

    OpenAIRE

    Laura Miller

    2017-01-01

    This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced wit...

  17. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  18. RECORD OF THE BINARY DATA ON SD CARD ARDUINO DUE

    Directory of Open Access Journals (Sweden)

    V. G. Mikhailov

    2016-01-01

    Full Text Available The short review of microcontrollers of family Arduino, their characteristics and application fields is given. Importance of record of parameters of researched object is marked to produce debugging of control systems on microcontrollers Arduino. Unique possibility of registration of parameters in family Arduino is record on SD a card in an alpha mode with usage of functions print (, write (. The problems connected to record of the binary data on SD a card on microcontroller Arduino Due are considered. The analysis of methods of record of the binary data on SD card Arduino Due, originating problems with neo-cleaning of memory from the previous program leading to possibility of duplication of the data on SD to a card, presence of the erratic point of view about restriction of volumes of data record and necessity of usage become outdated SD cards is carried out. Ways of elimination of the marked lacks are considered. The estimation of high-speed performance of various approaches of a data recording on SD a card is led. On the basis of the led researches the approach of multiplexing of the writeable information at the expense of conversion of the binary data is offered is byte-serial in a character array in code ASCI without magnification of their volume and record by units on 240 byte. It allows to use as much as possible standard function possibilities write ( Arduino and specificity of the organization of memory SD of cards and to increase high-speed performance more than in 1100 times in comparison with record in a character type on one byte.It is marked that usage of decisions of an exception of duplication of the data offered at forums does not provide completeness of their elimination. For Arduino Due for storage cleaning it is necessary usages of the special programmator or setting of the new program of loading.

  19. Electron ID in ATLAS Run 2

    CERN Document Server

    Thais, Savannah Jennifer; The ATLAS collaboration

    2018-01-01

    Efficient and accurate electron identification is of critical importance to measuring many physics processes with leptons in the final state, including H->4l, dark vector boson searches, and various SUSY searches. This poster will describe the current status of the Likelihood driven Electron ID, highlighting the recent move from a MC driven ID to a data-driven ID. It will include the most recent identification efficiency and scale-factor measurements. Additionally, it will describe continued improvements for Run 2 electron ID, highlighting improvements in the low pt region and potential Machine Learning improvements.

  20. Tinjauan Desain Website Kemlu.Go.Id

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2013-04-01

    Full Text Available Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007. At the end of the article, several recommendations in developing kemlu.go.id website are presented to create better appearance.  

  1. Tinjauan Desain Website Kemlu.Go.Id

    OpenAIRE

    Danu Widhyatmoko

    2013-01-01

    Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007). At the end of the article, several recommendations in developing kemlu.go.id website are...

  2. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  3. Id1 and Id3 expression is associated with increasing grade of prostate cancer: Id3 preferentially regulates CDKN1B

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Patel, Divya; Chaudhary, Jaideep

    2012-01-01

    As transcriptional regulators of basic helix–oop–helix (bHLH) transcription and non-bHLH factors, the inhibitor of differentiation (Id1, Id2, Id3, and Id4) proteins play a critical role in coordinated regulation of cell growth, differentiation, tumorigenesis, and angiogenesis. Id1 regulates prostate cancer (PCa) cell proliferation, apoptosis, and androgen independence, but its clinical significance in PCa remains controversial. Moreover, there is lack of evidence on the expression of Id2 and Id3 in PCa progression. In this study we investigated the expression of Id2 and Id3 and reevaluated the expression of Id1 in PCa. We show that increased Id1 and Id3 protein expression is strongly associated with increasing grade of PCa. At the molecular level, we report that silencing either Id1 or Id3 attenuates cell cycle. Although structurally and mechanistically similar, our results show that both these proteins are noncompensatory at least in PCa progression. Moreover, through gene silencing approaches we show that Id1 and Id3 primarily attenuates CDKN1A (p21) and CDKN1B (p27), respectively. We also demonstrate that silencing Id3 alone significantly attenuates proliferation of PCa cells as compared with Id1. We propose that increased Id1 and Id3 expression attenuates all three cyclin-dependent kinase inhibitors (CDKN2B, -1A, and -1B) resulting in a more aggressive PCa phenotype

  4. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  5. Investigation into Plastic Cards

    Directory of Open Access Journals (Sweden)

    Neringa Stašelytė

    2015-03-01

    Full Text Available The article examines the strength of laminating plastic cards at different lamination temperatures. For investigation purposes, two types of plastic substrate and films have been used. Laminate strength has been tested (CMYK to establish the impact of colours on the strength of laminate. The paper compares inks supplied by two different producers. The colour characteristics of CIE L*a*b* space before and after the lamination process have been found. According to lamination strength and characteristics of the colours, the most suitable inks, temperature and films have been chosen.

  6. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  7. A proposed HTTP service based IDS

    Directory of Open Access Journals (Sweden)

    Mohamed M. Abd-Eldayem

    2014-03-01

    Full Text Available The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. Security administrators use Intrusion-Detection System (IDS to monitor network traffic and host activities to detect attacks against hosts and network resources. In this paper IDS based on Naïve Bayes classifier is analyzed. The main objective is to enhance IDS performance through preparing the training data set allowing to detect malicious connections that exploit the http service. Results of application are demonstrated and discussed. In the training phase of the proposed IDS, at first a feature selection technique based on Naïve Bayes classifier is used, this technique identifies the most important HTTP traffic features that can be used to detect HTTP attacks. In the testing and running phases proposed IDS classifies the network traffic based on the requested service, then based on the selected features Naïve Bayes classifier is used to analyze the HTTP service based traffic and identifies the HTTP normal connections and attacks. The performance of the IDS is measured through experiments using NSL-KDD data set. The results show that the detection rate of the IDS is about 99%, the false-positive rate is about 1%, and the false-negative rate is about 0.25%; therefore, proposed IDS holds the highest detection rate and the lowest false alarm compared with other leading IDS. In addition, the proposed IDS based on Naïve Bayes is used to classify network connections as a normal or attack. And it holds a high detection rate and a low false alarm.

  8. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  9. 76 FR 62387 - Public User ID Badging

    Science.gov (United States)

    2011-10-07

    ... collection, as required by the Paperwork Reduction Act of 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A... Search Facility reference desk and providing proper identification. The plastic online access cards...

  10. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  11. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  12. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  13. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  14. Registration of Space Objects

    Science.gov (United States)

    Schmidt-Tedd, Bernhard

    2017-07-01

    Space objects are subject to registration in order to allocate "jurisdiction and control" over those objects in the sovereign-free environment of outer space. This approach is similar to the registration of ships in view of the high sea and for aircrafts with respect to the international airspace. Registration is one of the basic principles of space law, starting with UN General Assembly Resolution 1721 B (XVI) of December 20, 1961, followed by Resolution 1962 (XVIII) of December 13, 1963, then formulated in Article VIII of the Outer Space Treaty of 1967 and as specified in the Registration Convention of 1975. Registration of space objects can be seen today as a principle of customary international law, relevant for each spacefaring state. Registration is divided into a national and an international level. The State Party establishes a national registry for its space objects, and those registrations have to be communicated via diplomatic channel to the UN Register of space objects. This UN Register is handled by the UN Office for Outer Space Affairs (UNOOSA) and is an open source of information for space objects worldwide. Registration is linked to the so-called launching state of the relevant space object. There might be more than one launching state for the specific launch event, but only one state actor can register a specific space object. The state of registry gains "jurisdiction and control" over the space object and therefore no double registration is permissible. Based on the established UN Space Law, registration practice was subject to some adaptions due to technical developments and legal challenges. After the privatization of the major international satellite organizations, a number of non-registrations had to be faced. The state actors reacted with the UN Registration Practice Resolution of 2007 as elaborated in the Legal Subcommittee of UNCOPUOS, the Committee for the Peaceful Use of Outer Space. In this context an UNOOSA Registration Information

  15. Rethinking the REAL ID Act and National Identification Cards as a Counterterrorism Tool

    Science.gov (United States)

    2009-12-01

    www.latimes.com/entertainment/news/ music /la-me-fraud26-2009jul26,0,7924251.story?track=rss (accessed July 27, 2009). 26 goods; the money from...Theft Ring, July 26 , 2009. http://www.latimes.com/entertainment/news/ music /la-me-fraud26-2009jul26,0,7924251.story?track=rss (accessed July 27, 2009...been extensive. According to Colonel Eloy Campos : During my tenure in Iraq we collected in excess of 250,000 biometric scans on the local

  16. Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals

    Science.gov (United States)

    1992-12-30

    Encl 5) Cayman Islands CJ Central African Republic CT Chad CD Chile CI China CH Christmas Island KT Clipperton Islands IP Cocos (Keeling) Islands CK...PA Puerto Rico PR Rhode Island RI South Carolina SC South Dakota SD Tennessee TN Federated States of Marshall Islands , Palau TT Texas TX Utah UT...Vermont VT Virginia VA Virgin Islands VI Washington WA West Virginia WV Wisconsin WI Wyoming WY Block 17. ZIP Code. Enter the correct nine-digit ZIP Code

  17. 75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...

    Science.gov (United States)

    2010-08-06

    ... coordination with the Under Secretary of Defense for Intelligence (USD(I)), Assistant Secretary of Defense for... secondary) fingerprint minutia from the full 10-print fingerprints captured as part of the initial...

  18. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  19. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  20. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  1. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  2. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  3. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  4. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  5. Pengalaman Komunikasi Pelanggan Zalora.co.id (Studi Fenomenologi Pelanggan Zalora.co.id)

    OpenAIRE

    Aji, Widya Andhika; Pradekso, Tandiyo; Ulfa, Nurist Surayya

    2013-01-01

    1PENGALAMAN KOMUNIKASI PELANGGAN ZALORA.CO.ID(Studi Fenomenologi Pelanggan Zalora.co.id)Oleh:Widya Andhika AjiFakultas Ilmu Sosial dan Ilmu PolitikUniversitas Diponegoro SemarangABSTRAKPenelitian ini bertujuan untuk menganalisis pengalaman komunikasi danpemahaman penerimaan konsumen terkait pesan komunikasi pemasaran dalamberbelanja di Zalora.co.id. Dengan menggunakan sampel pada lima informandan metode wawancara, dapat ditarik kesimpulan: Pelanggan Zalora.co.idmemiliki pengalaman komunikasi ...

  6. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  7. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  8. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves [El Cerrito, CA; Campisi, Judith [Berkeley, CA

    2008-09-30

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  10. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  11. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  12. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  14. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  15. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  16. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  17. Card counting in continuous time

    OpenAIRE

    Andersson, Patrik

    2012-01-01

    We consider the problem of finding an optimal betting strategy for a house-banked casino card game that is played for several coups before reshuffling. The sampling without replacement makes it possible to take advantage of the changes in the expected value as the deck is depleted, making large bets when the game is advantageous. Using such a strategy, which is easy to implement, is known as card counting. We consider the case of a large number of decks, making an approximat...

  18. Play the European card

    International Nuclear Information System (INIS)

    Majewski, O.

    1999-01-01

    Dr. Otto Majewski, Chief Executive Officer of the Bayernwerk AG utility, in his capacity as Chairman of the European Nuclear Council pointed out at ENC 98 in Nice that national energy policies constituted a major danger to the use of nuclear power. At the same time, he indicated ways and means by which to evade that danger. The decisions taken in Sweden and in the Federal Republic of Germany to opt out of the use of nuclear power show that national energy policies can seriously jeopardize the use of nuclear power. Bayernwerk CEO Dr. Majewski urged nuclear power plant operators to counteract these tendencies by playing the European card. Nuclear power anyway was a classical topic of European cooperation which, in the past, had resulted in higher safety standards and in the development of the EPR. It should also be attempted, by working on European institutions, to strengthen the use of nuclear power, even on a national level. He invoked economic arguments against nuclear opponents, especially the preservation of competitiveness by means of lower electricity prices, and arguments of climate protection. (orig.) [de

  19. JALFHCC - Patient Registration Service

    Data.gov (United States)

    Department of Veterans Affairs — The Captain James A. Lovell Federal Health Care Center (JALFHCC) Patient Registration Service supports the operation of the first VA/Navy Federal Health Care Center...

  20. Visitor Registration System

    Data.gov (United States)

    US Agency for International Development — Visitor Registration System (VRS) streamlines visitor check-in and check-out process for expediting visitors into USAID. The system captures visitor information...

  1. Pesticide Registration Information System

    Data.gov (United States)

    U.S. Environmental Protection Agency — PRISM provides an integrated, web portal for all pesticide related data, communications, registrations and transactions for OPP and its stakeholders, partners and...

  2. Vibrational measurements in 3-ID-B

    International Nuclear Information System (INIS)

    Sutter, J.; Alp, E.; Barraza, J.; Shu, D.

    1998-04-01

    The authors have undertaken a series of vibrational measurements in hutch 3-ID-B. Their motivation was to compare two different methods of mounting an interferometer for effectiveness in vibrational isolation and stability. In addition they were able to compare the stability of the optical table with and without its eight large bolts inserted

  3. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  4. Registration of the cancer

    International Nuclear Information System (INIS)

    Morales, F.; Campos, X.

    2002-01-01

    A database for the registration of the cancer was designed in ambient access, of the Microsoft Office, to take the registrations at national level. With this database the statistics will be obtained about the incidence of the cancer in the population, evaluation of the sanitary services of prevention, diagnose and treatment of the illness, etc. The used codes are according to the listings of code of the Ministry of Health (MINSA) and OPS

  5. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  6. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  7. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  8. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  10. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  11. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  12. Reminder: Swiss and French cards

    CERN Multimedia

    2012-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of personnel concerned that they are obliged to: • hold a valid Swiss  Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; • return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken towards the member of personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide. Users and Unpaid Associates must contact the Users Office HR Department Tel.: 729...

  13. Swiss and French cards - Reminder

    CERN Multimedia

    HR Department

    2011-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of the personnel concerned that they are obliged to: hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken with respect to the member of the personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide: https://cern.ch/admin-eguide/cartes/proc_cartes_home.asp Users and Unpaid Associates must ...

  14. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  15. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  16. Calibration of TOB+ Thermometer's Cards

    CERN Document Server

    Banitt, Daniel

    2014-01-01

    Motivation - Under the new upgrade of the CMS detector the working temperature of the trackers had been reduced to -27 Celsius degrees. Though the thermal sensors themselves (Murata and Fenwal thermistors) are effective at these temperatures, the max1542 PLC (programmable logic controller) cards, interpreting the resistance of the thermal sensors into DC counts usable by the DCS (detector control system), are not designed for these temperatures in which the counts exceed their saturation and therefor had to be replaced. In my project I was in charge of handling the emplacement and calibration of the new PLC cards to the TOB (tracker outer barrel) control system.

  17. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  18. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  19. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  20. Palmistry, tarot cards, and psychotherapy.

    Science.gov (United States)

    Pejic, Nicholas G

    2008-01-01

    The author summarizes his experience with palm and Tarot card readers in New Orleans. The history, practice, and psychodynamics of palmistry and Tarot are explored. It's postulated that these practices are forms of archaic psychotherapy, which employ supportive treatment and placebo. These tactics are used to elicit hope for its clients.

  1. Towards an open sound card

    DEFF Research Database (Denmark)

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    The architecture of a sound card can, in simple terms, be described as an electronic board containing a digital bus interface hardware, and analog-to-digital (A/D) and digital-to-analog (D/A) converters; then, a soundcard driver software on a personal computer's (PC) operating system (OS) can con...

  2. Comparing Candidate Hospital Report Cards

    Energy Technology Data Exchange (ETDEWEB)

    Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

    1997-12-31

    We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

  3. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  4. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  5. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  6. Does Environmental Sustainability Play a Role in the Adoption of Smart Card Technology at Universities in Taiwan: An Integration of TAM and TRA

    Directory of Open Access Journals (Sweden)

    Ching-Wei Ho

    2015-08-01

    Full Text Available Smart cards are able to store and protect relatively large amounts of data. When applied in universities, they can act as multi-purpose, multi-function and smart ID cards. This would avoid the waste of resources and maintain environmental sustainability. This study proposes a model that integrates Technology Acceptance Model and Theory of Reasoned Action into a framework incorporating the notion of environmental concern in order to explore the factors that affect students’ behavioral intention to use University Smart Cards. This study employs a quantitative method for primary data collection via a structured questionnaire for university students. The findings indicated that the perceived usefulness and subjective norm of university smart card systems have the most significant predictive power on potential users’ attitudes and intentions of adopting the card.

  7. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  8. Beam transport radiation shielding for branch lines 2-ID-B and 2-ID-C

    International Nuclear Information System (INIS)

    Feng, Y.P.; Lai, B.; McNulty, I.; Dejus, R.J.; Randall, K.J.; Yun, W.

    1995-01-01

    The x-ray radiation shielding requirements beyond the first optics enclosure have been considered for the beam transport of the 2-ID-B and 2-ID-C branch lines of Sector 2 (SRI-CAT) of the APS. The first three optical components (mirrors) of the 2-ID-B branch are contained within the shielded first optics enclosure. Calculations indicate that scattering of the primary synchrotron beam by beamline components outside the enclosure, such as apertures and monochromators, or by gas particles in case of vacuum failure is within safe limits for this branch. A standard 2.5-inch-diameter stainless steel pipe with 1/16-inch-thick walls provides adequate shielding to reduce the radiation dose equivalent rate to human tissue to below the maximum permissible limit of 0.25 mrem/hr. The 2-ID-C branch requires, between the first optics enclosure where only two mirrors are used and the housing for the third mirror, additional lead shielding (0.75 mm) and a minimum approach distance of 2.6 cm. A direct beam stop consisting of at least 4.5 mm of lead is also required immediately downstream of the third mirror for 2-ID-C. Finally, to stop the direct beam from escaping the experimental station, a beam stop consisting of at least 4-mm or 2.5-mm steel is required for the 2-ID-B or 2-ID-C branches, respectively. This final requirement can be met by the vacuum chambers used to house the experiments for both branch lines

  9. Effects of refrigerating preinoculated Vitek cards on microbial physiology and antibiotic susceptibility

    Science.gov (United States)

    Skweres, Joyce A.; Bassinger, Virginia J.; Mishra, S. K.; Pierson, Duane L.

    1992-01-01

    Reference cultures of 16 microorganisms obtained from the American Type Culture Collection and four clinical isolates were used in standardized solutions to inoculate 60 cards for each test strain. A set of three ID and three susceptibility cards was processed in the Vitek AutoMicrobic System (AMS) immediately after inoculation. The remaining cards were refrigerated at 4 C, and sets of six cards were removed and processed periodically for up to 17 days. The preinoculated AMS cards were evaluated for microorganism identification, percent probability of correct identification, length of time required for final result, individual substrate reactions, and antibiotic minimal inhibitory/concentration (MIC) values. Results indicate that 11 of the 20 microbes tested withstood refrigerated storage up to 17 days without detectable changes in delineating characteristics. MIC results appear variable, but certain antibiotics proved to be more stable than others. The results of these exploratory studies will be used to plan a microgravity experiment designed to study the effect of microgravity on microbial physiology and antibiotic sensitivity.

  10. Constructing activity–mobility trajectories of college students based on smart card transaction data

    Directory of Open Access Journals (Sweden)

    Negin Ebadi

    2017-12-01

    Full Text Available In this research, we use UB card as a convenient source of combined smart transaction data in order to define a campus-wide model for constructing students’ activity–mobility trajectories in time–space dimension. UB Card is a student’s official ID at the University at Buffalo and is used across campus for various activities including Stampedes and Shuttles (on-campus bus system, facilities access, library services, dining, shopping, and etc. Two activity–mobility trajectory construction algorithms are developed. The base algorithm constructs students’ activity–mobility patterns in space–time dimension using a set of smart card transaction data points as the only inputs. The modified individualized algorithm constructs activity–mobility patterns with prior knowledge of students’ previous patterns as they have similar patterns for certain days of the week. A database of 37 students’ travel survey and UB card transactions that contains a period of 5 days have been used to illustrate the results of the study. Three measures of errors have been proposed to capture the time allocation, location deviation, and activity sequences. These errors present an acceptable accuracy (12–25% error ranges for activity types and average 0.04–0.16 miles of error for location predictions and show the potential of inferring activity–mobility behaviors based on smart card transaction type data sets.

  11. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  12. Signal processing for smart cards

    Science.gov (United States)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  13. Biomedical Image Registration

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the 8th International Workshop on Biomedical Image Registration, WBIR 2018, held in Leiden, The Netherlands, in June 2018. The 11 full and poster papers included in this volume were carefully reviewed and selected from 17 submitted papers. The pap...

  14. Locally orderless registration

    DEFF Research Database (Denmark)

    Darkner, Sune; Sporring, Jon

    2013-01-01

    This paper presents a unifying approach for calculating a wide range of popular, but seemingly very different, similarity measures. Our domain is the registration of n-dimensional images sampled on a regular grid, and our approach is well suited for gradient-based optimization algorithms. Our app...

  15. Registration of Plant Varieties

    African Journals Online (AJOL)

    Registration of two Sorghum Hybrids, ESH-1 and ESH-2. Sorghum (Sorghum bicolor (L) Moench) is an indigenous crop to Ethiopia and staple for many millions of people in most parts of Africa. The crop is one of the most important cereals grown in arid and semi arid areas where others often fail to survive. In Eastern Africa ...

  16. Idékatalog Appetit på maden

    DEFF Research Database (Denmark)

    Jensen, Tenna; Jespersen, Astrid Pernille; Grønnow, Liv Cæcilie

    2015-01-01

    Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune.......Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune....

  17. Sustainability Cards: Design for Longevity

    DEFF Research Database (Denmark)

    Hasling, Karen Marie; Ræbild, Ulla

    2017-01-01

    Product longevity is considered widely as a relevant strategic approach, amongst many, within the field of sustainability. Yet, how to design for increased product lifetime may not be so obvious for practitioners. The complexity of the surrounding issues can constitute a barrier for designers...... for designers and other stakeholders in the design process. The paper is based on a developmental project carried out in the Autumn 2017, within a larger research and collaboration project between raw fur manufacturer Kopenhagen Fur and Design School Kolding investigating sustainability perspectives. The paper...... describes the development of a deck of sustainability cards aiming for product longevity and presents the final deck. Furthermore, the paper contributes with insights on how designers may apply design cards in the design process and how this practice can further sustainable considerations and strategies...

  18. Review of sound card photogates

    International Nuclear Information System (INIS)

    Gingl, Zoltan; Mingesz, Robert; Mellar, Janos; Makra, Peter

    2011-01-01

    Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card - an interface for analogue signals. It is possible to make very simple yet highly accurate photogates for cents, while much more sophisticated solutions are also available at a still very low cost. In our paper we show several experimentally tested ways of implementing sound card photogates in detail, and we also provide full-featured, free, open-source photogate software as a much more efficient experimentation tool than the usually used sound recording programs. Further information is provided on a dedicated web page, www.noise.physx.u-szeged.hu/edudev.

  19. News reports: update on buying indoor UV tanning with university debit cards.

    Science.gov (United States)

    Goff, Kiera L; Karimkhani, Chante; Boyers, Lindsay N; Hernandez, Melia D; Pederson, Hannah; Royer, Eryn L; Dellavalle, Robert P

    2014-12-13

    Indoor tanning by adults under 35 years of age increases the risk of developing melanoma 59% to 75%. Cost is a major barrier limiting young adults from purchasing indoor tanning services. Our recent study by Boyers et al determined that 18 of 96 major universities, all in the eastern and southern United States, had university-sponsored debit cards with indoor tanning affiliations. These debit cards, which conveniently link with student identification (ID) cards, help with student living expenses and are often loaded with money by parents. By creating agreements with indoor tanning salon vendors, universities are endorsing a World Health Organization class I carcinogen. To expand the results of our previous study, we broadened our search to further assess universities in the western United States as well as Australia, New Zealand, Ireland, Canada, and the United Kingdom. Using www.collegeboard.edu, we identified the 4 largest residential colleges in Arizona, California, Colorado, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, and Wyoming. Additionally, we investigated the top international universities, utilizing www.topuniversities.com. Internet searches, phone calls, and email correspondence were used to determine if an institution had a student ID-linked debit card. Universities with affiliations to bank debit cards and cards that could only be used on campus were excluded. In the western United States, indoor tanning merchants were affiliated with University of Arizona, Embry-Riddle Aeronautical University: Prescott Campus, and the University of Denver student debit cards. Of the original 18 schools with affiliations according to the Boyers et al study, 2 universities no longer have agreements and 5 created agreements with additional tanning salons. Of 45 universities examined in our international search, no debit cards were discovered for off-campus purchases. Therefore, the concerning issue of university associations with tanning salons appears

  20. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  1. Valutazione economica dello studio CARDS

    Directory of Open Access Journals (Sweden)

    Simona de Portu

    2007-10-01

    Full Text Available Introduction: cardiovascular diseases (CVD are the major component of premature mortality, generate disability and are a relevant source of cost. The growing incidence of CVD is associated with lifestyle and other modifiable risk factors. Prevention and preclinical detection of CVD reduce morbidity and mortality. Type 2 diabetes is associated with a substantially increased risk of cardiovascular disease. Objective: the aim of the study was to evaluate the health economic consequence of medical therapy with atorvastatin for primary prevention of major cardiovascular events in patients with type 2 diabetes in Italy. Materials and method: in order to reach our objective we drew clinical information from the CARDS study. This economic evaluation was carried out conducting a cost/effectiveness analysis from the perspective of National Health Service (NHS. The analysis was applied to a time horizon in conformity with the observational period adopted in the CARDS study (3.9 years. An incremental cost/effectiveness ratio (ICER was calculated and is expressed as cost per life years gained (LYG. In order to test the robustness of the results, a one-way sensitivity analysis was performed. Results: the total cost of atorvastatin therapy over 3.9 years amounts to around 1.5 million of euros per 1,000 patients. The total cost of adding atorvastatin to standard care in people treated for primary prevention of major cardiovascular events in type 2 diabetes as those involved in the CARDS study would entail an additional cost of about 1,2 million of euros per 1,000 patients treated per 3.9 years, with an incremental cost/effectiveness ratio (ICER equivalent to 36,566 euros per patient per LYG. Discussion: the current study is the first economic evaluation of CARDS study to the Italian situation. The results of the current study show that hypolipemic therapy with atorvastatin 10 mg in diabetic individuals is to be considered cost effective.

  2. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  3. Rh-flash acquisition card

    International Nuclear Information System (INIS)

    Bourrion, O.

    2003-01-01

    The rh-flash card main purpose is to convert and store the image of the analog data present at input into an output buffer, namely in a given timing window besides a stop signal (like a digital oscilloscope). It is conceived in VME format 1U wide with an additional connector. Novelty of this card is its ability to sample at a high frequency, due to flash coders, and this at a high repetition rate. To do that the card allows the storage of the data considered 'useful' and that is done by storing only the data exceeding a certain threshold. This can be useful for instance for viewing peaks in a spectrum, and obtaining their relative location. The goal is to stock and process the data sampled before and after the arrival of a stop signal (what entails a storage depth). A threshold is defined and any peak exceeding its level will really be stored in the output buffer which is readable through the VME bus. The peak values will be stored as well as m preceding and n subsequent values (both programmable). Obviously, if the threshold is zero the system of data processing is off and all data will be stored. The document is structured on six sections titled: 1. Description; 2. Specifications; 3. Explaining the design of channels; 4. Explaining the shared part of the design; 5. Addressing (→ user guide); 6. Software precautions. (author)

  4. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  5. The hidden KPI registration accuracy.

    Science.gov (United States)

    Shorrosh, Paul

    2011-09-01

    Determining the registration accuracy rate is fundamental to improving revenue cycle key performance indicators. A registration quality assurance (QA) process allows errors to be corrected before bills are sent and helps registrars learn from their mistakes. Tools are available to help patient access staff who perform registration QA manually.

  6. How report cards on physicians, physician groups, and hospitals can have greater impact on consumer choices.

    Science.gov (United States)

    Sinaiko, Anna D; Eastman, Diana; Rosenthal, Meredith B

    2012-03-01

    Public report cards with quality and cost information on physicians, physician groups, and hospital providers have proliferated in recent years. However, many of these report cards are difficult for consumers to interpret and have had little impact on the provider choices consumers are making. To gain a more focused understanding of why these reports cards have not been more successful and what improvements could be made, we interviewed experts and surveyed registrants at the March 2011 AHRQ National Summit on Public Reporting for Consumers in Health Care. We found broad agreement that public reporting has been disconnected from consumer decisions about providers because of weaknesses in report card content, design, and accessibility. Policy makers have an opportunity to change the landscape of public reporting by taking advantage of advances in measurement, data collection, and information technology to deliver a more consumer-centered report card. Overcoming the constraint of limited public funding, and achieving the acceptance of providers, is critical to realizing future success.

  7. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  8. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  9. Automatic spent fuel ID number reader (I)

    International Nuclear Information System (INIS)

    Tanabe, S.; Kawamoto, H.; Fujimaki, K.; Kobe, A.

    1991-01-01

    An effective and efficient technique has been developed for facilitating identification works of LWR spent fuel stored in large scale spent fuel storage pools of such as processing plants. Experience shows that there are often difficulties in the implementation of operator's nuclear material accountancy and control works as well as safeguards inspections conducted on spent fuel assemblies stored in deep water pool. This paper reports that the technique is realized as an automatic spent fuel ID number reader system installed on fuel handling machine. The ID number reader system consists of an optical sub-system and an image processing sub-system. Thousands of spent fuel assemblies stored in under water open racks in each storage pool could be identified within relatively short time (e.g. within several hours) by using this combination. Various performance tests were carried out on image processing sub-system in 1990 using TV images obtained from different types of spent fuel assemblies stored in various storage pools of PWR and BWR power stations

  10. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  11. Registration of acute stroke

    DEFF Research Database (Denmark)

    Wildenschild, Cathrine; Mehnert, Frank; Thomsen, Reimar Wernich

    2014-01-01

    BACKGROUND: The validity of the registration of patients in stroke-specific registries has seldom been investigated, nor compared with administrative hospital discharge registries. The objective of this study was to examine the validity of the registration of patients in a stroke-specific registry...... (The Danish Stroke Registry [DSR]) and a hospital discharge registry (The Danish National Patient Registry [DNRP]). METHODS: Assuming that all patients with stroke were registered in either the DSR, DNRP or both, we first identified a sample of 75 patients registered with stroke in 2009; 25 patients...... in the DSR, 25 patients in the DNRP, and 25 patients registered in both data sources. Using the medical record as a gold standard, we then estimated the sensitivity and positive predictive value of a stroke diagnosis in the DSR and the DNRP. Secondly, we reviewed 160 medical records for all potential stroke...

  12. Image registration with uncertainty analysis

    Science.gov (United States)

    Simonson, Katherine M [Cedar Crest, NM

    2011-03-22

    In an image registration method, edges are detected in a first image and a second image. A percentage of edge pixels in a subset of the second image that are also edges in the first image shifted by a translation is calculated. A best registration point is calculated based on a maximum percentage of edges matched. In a predefined search region, all registration points other than the best registration point are identified that are not significantly worse than the best registration point according to a predetermined statistical criterion.

  13. A new TLD badge with machine readable ID for fully automated readout

    International Nuclear Information System (INIS)

    Kannan, S. Ratna P.; Kulkarni, M.S.

    2003-01-01

    The TLD badge currently being used for personnel monitoring of more than 40,000 radiation workers has a few drawbacks such as lack of on-badge machine readable ID code, delicate two-point clamping of dosimeters on an aluminium card with the chances of dosimeters falling off during handling or readout, projections on one side making automation of readout difficult etc. A new badge has been designed with a 8-digit identification code in the form of an array of holes and smooth exteriors to enable full automation of readout. The new badge also permits changing of dosimeters when necessary. The new design does not affect the readout time or the dosimetric characteristics. The salient features and the dosimetric characteristics are discussed. (author)

  14. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  15. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  16. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  17. Why do card issuers charge proportional fees?

    OpenAIRE

    Oz Shy; Zhu Wang

    2008-01-01

    This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...

  18. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  19. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  20. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  1. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  2. Authenticated, private, and secured smart cards (APS-SC)

    Science.gov (United States)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  3. Toronto Smog Summit Report Card

    International Nuclear Information System (INIS)

    2001-01-01

    This 'report card' provides a summary of actions taken, and progress achieved by the federal government, the provincial government and the City of Toronto, respectively, in response to various previous commitments regarding air quality, sustainable transportation, climate and atmospheric research, investing in green infrastructure (federal government), environmental assessment regulations, transboundary air pollution, improved monitoring and reporting regulations. Ratings also cover efforts in imposing emissions caps on the electric industry, emissions reduction trading system, toll-free public air pollution hotline, regulation of ozone depleting substances (provincial government), public education campaign on smog reduction, energy efficiency initiatives, corporate smog alert response plan, and a number of other environmental issues (City of Toronto)

  4. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  5. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  6. Wire Scanner Motion Control Card

    CERN Document Server

    Forde, S E

    2006-01-01

    Scientists require a certain beam quality produced by the accelerator rings at CERN. The discovery potential of LHC is given by the reachable luminosity at its interaction points. The luminosity is maximized by minimizing the beam size. Therefore an accurate beam size measurement is required for optimizing the luminosity. The wire scanner performs very accurate profile measurements, but as it can not be used at full intensity in the LHC ring, it is used for calibrating other profile monitors. As the current wire scanner system, which is used in the present CERN accelerators, has not been made for the required specification of the LHC, a new design of a wire scanner motion control card is part of the LHC wire scanner project. The main functions of this card are to control the wire scanner motion and to acquire the position of the wire. In case of further upgrades at a later stage, it is required to allow an easy update of the firmware, hence the programmable features of FPGAs will be used for this purpose. The...

  7. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    Science.gov (United States)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  8. Summer Camp Registrations 2018

    CERN Multimedia

    Staff Association

    2018-01-01

    Registration for the CERN SA Summer camp, for children from 4 to 6 years old, is now open. The general conditions are available on the EVE and School website: http://nurseryschool.web.cern.ch For further questions, please contact us by email at  Summer.Camp@cern.ch An inscription per week is proposed, for 450.-CHF/week, lunch included. The camp will be open on weeks 27, 28, 29 and 30, from 8:30 am to 5:30 pm. This year the theme will be Vivaldi’s Four Seasons.

  9. The Household Registration System

    Directory of Open Access Journals (Sweden)

    2000-06-01

    Full Text Available Although longitudinal experimental community health research is crucial to testing hypotheses about the demographic impact of health technologies, longitudinal demographic research field stations are rare, owing to the complexity and high cost of developing requisite computer software systems. This paper describes the Household Registration System (HRS, a software package that has been used for the rapid development of eleven surveillance systems in sub-Saharan Africa and Asia. Features of the HRS automate software generation for a family of surveillance applications, obviating the need for new and complex computer software systems for each new longitudinal demographic study.

  10. Registration Summer Camp 2016

    CERN Multimedia

    2016-01-01

    Reminder: registration for the CERN Staff Association Summer Camp is now open for children from 4 to 6 years old.   More information on the website: http://nurseryschool.web.cern.ch/. The summer camp is open to all children. The proposed cost is 480.-CHF/week, lunch included. The camp will be open weeks 27, 28, 29 and 30, from 8:30 a.m. to 5:30 p.m. For further questions, you are welcome to contact us by email at Summer.Camp@cern.ch. CERN Staff Association

  11. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  12. Real Communication through Interview and Conversation Cards

    Science.gov (United States)

    Bonin, Therese M.; Birckbichler, Diane W.

    1975-01-01

    A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)

  13. College Student Performance and Credit Card Usage.

    Science.gov (United States)

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  14. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  15. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  16. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  17. Enhancing Students' Learning: Instant Feedback Cards

    Science.gov (United States)

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  18. Overcoming credit card fraud in South Africa

    African Journals Online (AJOL)

    A credit card is a convenient method of payment, but it does carry risks. The enormous ... Identity theft and the exponential ... Unique Security Features of a Credit Card with the Aim of Identifying ..... technology in an attempt to try and curb the.

  19. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  20. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  1. Commissioning of the IDS Neutron Detector and $\\beta$-decay fast-timing studies at IDS

    CERN Document Server

    Piersa, Monika

    2016-01-01

    The following report describes my scientific activities performed during the Summer Student Programme at ISOLDE. The main part of my project was focused on commissioning the neutron detector dedicated to nuclear decay studies at ISOLDE Decay Station (IDS). I have participated in all the steps needed to make it operational for the IS609 experiment. In the testing phase, we obtained expected detector response and calibrations confirmed its successful commissioning. The detector was mounted in the desired geometry at IDS and used in measurements of the beta-delayed neutron emission of $^8$He. After completing aforementioned part of my project, I became familiar with the fast-timing method. This technique was applied at IDS in the IS610 experiment performed in June 2016 to explore the structure of neutron-rich $^{130-134}$Sn nuclei. Since the main part of my PhD studies will be the analysis of data collected in this experiment, the second part of my project was dedicated to acquiring knowledge about technical de...

  2. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.

  3. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  4. Prepaid cards: how do they function? how are they regulated?

    OpenAIRE

    Mark Furletti

    2004-01-01

    This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...

  5. Point card compatible automatic vending machine for canned drink; Point card taio kan jido hanbaiki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)

  6. Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool

    Science.gov (United States)

    Hyppönen, Konstantin; Hassinen, Marko; Trichina, Elena

    Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We present an architecture that facilitates the use of the mobile phone as a personalised electronic identity tool. The tool can work as a replacement for numerous ID cards and licenses. Design for privacy principles have been applied, such as minimisation of data collection and informed consent of the user. We describe an implementation of a lightweight version of the of the mobile identity tool using currently available handset technology and off-the-shelf development tools.

  7. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  8. Click to "like" organ donation: the use of online media to promote organ donor registration.

    Science.gov (United States)

    Stefanone, Michael; Anker, Ashley E; Evans, Melanie; Feeley, Thomas Hugh

    2012-06-01

    Efforts to promote organ donation have traditionally relied on mass-mediated or interpersonal communication to promote donor registration. Despite its popularity, the use of online media has yet to be carefully evaluated as a platform to promote organ donation. To describe results of an intervention to promote donor registration that relies solely on online media to communicate to target audiences. For 3 years, 6 campaigns were implemented in 3 different online media formats. Online media formats included (1) traditional online advertising, (2) student seeders' social networking sites campaigns, and (3) challenge campaigns. Online media campaigns primarily targeted college-aged individuals.Intervention-Each campaign directed individuals to the dedicated project website, where they could access educational material about donation and request a donor registration card. Unique website visitors, webpages viewed per site visit, time spent on site, and organ donor cards requested/received were tracked in relation to each online media format. Traditional online advertising offered greater message exposure but failed to result in a higher proportion of website visitors who registered their donation intentions. Use of student seeders (ie, motivated students who promote donation by using social networking sites) and challenge campaigns resulted in greater attention to the project website, donor card requests, and subsequent returns. Additional research is recommended to reveal the effect of combining 2 or more varying online media formats within a single campaign.

  9. Insider protection: A report card

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is now focusing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. The authors discuss the general trends in insider protection and the limitations of protection measures currently in use. They also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel

  10. Insider protection: a report card

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is not focussing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. We discuss the general trends in insider protection and the limitations of protection measures currently in use. We also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel

  11. Card - Electronic Money. Comparative Study

    Directory of Open Access Journals (Sweden)

    Mariana Rodica TIRLEA

    2012-11-01

    Full Text Available This type of coin and appeared as a result of the needs for a proper management of the financial resources available in the market, but also to improve the payments system in our country. The card is an alternative to the conventional instruments of payment is a payment instrument with and without cash by means of which the holder disposes of the current account. It is a standardized, secure information and individualized, through which you can perform operations of cash withdrawal, payment for the goods or services purchased, payment obligations by the public administration authorities and funds transfers between accounts, other than those ordered and executed by financial institutions, carried out through the electronic payment instrument.

  12. A microprocessor card software server to support the Quebec health microprocessor card project.

    Science.gov (United States)

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  13. Extending and implementing the Persistent ID pillars

    Science.gov (United States)

    Car, Nicholas; Golodoniuc, Pavel; Klump, Jens

    2017-04-01

    The recent double decade anniversary of scholarly persistent identifier use has triggered journal special editions such as "20 Years of Persistent Identifiers". For such a publication, it is apt to consider the longevity of some persistent identifier (PID) mechanisms (Digital Object Identifiers) and the partial disappearance of others (Life Sciences IDs). We have previously postulated a set of "PID Pillars" [1] which are design principles aimed at ensuring PIDs can survive technology and social change and thus persist for the long term that we have drawn from our observations of PIDs at work over many years. The principles: describe how to ensure identifiers' system and organisation independence; codify the delivery of essential PID system functions; mandate a separation of PID functions from data delivery mechanisms; and require generation of policies detailing how change is handled. In this presentation, first we extend on our previous work of introducing the pillars by refining their descriptions, giving specific suggestions for each and presenting some work that addresses them. Second, we propose a baseline data model for persistent identifiers that, if used, would assist the separation of PID metadata and PID system functioning. This would allow PID system function specifics to change over time (e.g. resolver services or even resolution protocols) and yet preserve the PIDs themselves. Third, we detail our existing PID system — the PID Service [2] — that partially implements the pillars and describe both its successes and shortcomings. Finally, we describe our planned next-generation system that will aim to use the baseline data model and fully implement the pillars.

  14. IMI's CANCER-ID: Status of liquid biopsy standardization

    NARCIS (Netherlands)

    Pantel, Klaus; Terstappen, Leon W. M. M.; Baggiani, Barbara; Krahn, Thomas; Schlange, Thomas

    The CANCER-ID (www.cancer-id.eu) consortium was established in early 2015 with more than 30 partners as part of the Innovative Medicines Initiative (IMI), Europe's largest public-private partnership funded in equal parts by the European Union and the European Federation of Pharmaceutical Industries

  15. Evaluation of ID-PaGIA syphilis antibody test.

    Science.gov (United States)

    Naaber, Paul; Makoid, Ene; Aus, Anneli; Loivukene, Krista; Poder, Airi

    2009-01-01

    Laboratory diagnosis of syphilis is usually accomplished by serology. There are currently a large number of different commercial treponemal tests available that vary in format, sensitivity and specificity. To evaluate the ID-PaGIA Syphilis Antibody Test as an alternative to other specific treponemal tests for primary screening or confirmation of diagnosis. Serum samples from healthy adults (n = 100) were used for detection of specificity of ID-PaGIA. To evaluate sensitivity of ID-PaGIA serum samples (n = 101) from patients with confirmed or suspected syphilis were tested for syphilis antibodies with FTA-Abs IgM, ID-PaGIA, ELISA IgM and TPHA tests. No false-positive results were found with ID-PaGIA. Sensitivity of various treponemal tests was the following: FTA-Abs IgM: 95.5%, ID-PaGIA and ELISA IgM: 94%, and TPHA 75%. The positive and negative predictive values of ID-PaGIA were 100 and 89.5%, respectively. Compared with other treponemal tests ID-PaGIA has excellent sensitivity and specificity.

  16. Security analysis for biometric data in ID documents

    NARCIS (Netherlands)

    Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, A.A.C.M.

    2005-01-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents

  17. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  18. 78 FR 65555 - Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-11-01

    ...-0531; Airspace Docket No. 13-ANM-20] Establishment of Class E Airspace; Salmon, ID AGENCY: Federal... at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules (IFR) aircraft under control of Salt Lake...

  19. Cyclin D1, Id1 and EMT in breast cancer

    International Nuclear Information System (INIS)

    Tobin, Nicholas P; Sims, Andrew H; Lundgren, Katja L; Lehn, Sophie; Landberg, Göran

    2011-01-01

    Cyclin D1 is a well-characterised cell cycle regulator with established oncogenic capabilities. Despite these properties, studies report contrasting links to tumour aggressiveness. It has previously been shown that silencing cyclin D1 increases the migratory capacity of MDA-MB-231 breast cancer cells with concomitant increase in 'inhibitor of differentiation 1' (ID1) gene expression. Id1 is known to be associated with more invasive features of cancer and with the epithelial-mesenchymal transition (EMT). Here, we sought to determine if the increase in cell motility following cyclin D1 silencing was mediated by Id1 and enhanced EMT-features. To further substantiate these findings we aimed to delineate the link between CCND1, ID1 and EMT, as well as clinical properties in primary breast cancer. Protein and gene expression of ID1, CCND1 and EMT markers were determined in MDA-MB-231 and ZR75 cells by western blot and qPCR. Cell migration and promoter occupancy were monitored by transwell and ChIP assays, respectively. Gene expression was analysed from publicly available datasets. The increase in cell migration following cyclin D1 silencing in MDA-MB-231 cells was abolished by Id1 siRNA treatment and we observed cyclin D1 occupancy of the Id1 promoter region. Moreover, ID1 and SNAI2 gene expression was increased following cyclin D1 knock-down, an effect reversed with Id1 siRNA treatment. Similar migratory and SNAI2 increases were noted for the ER-positive ZR75-1 cell line, but in an Id1-independent manner. In a meta-analysis of 1107 breast cancer samples, CCND1 low /ID1 high tumours displayed increased expression of EMT markers and were associated with reduced recurrence free survival. Finally, a greater percentage of CCND1 low /ID1 high tumours were found in the EMT-like 'claudin-low' subtype of breast cancer than in other subtypes. These results indicate that increased migration of MDA-MB-231 cells following cyclin D1 silencing can be mediated by Id

  20. 16 CFR 1130.8 - Requirements for Web site registration or alternative e-mail registration.

    Science.gov (United States)

    2010-01-01

    ... registration. (a) Link to registration page. The manufacturer's Web site, or other Web site established for the... web page that goes directly to “Product Registration.” (b) Purpose statement. The registration page... registration page. The Web site registration page shall request only the consumer's name, address, telephone...

  1. 21 CFR 1301.36 - Suspension or revocation of registration; suspension of registration pending final order...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Suspension or revocation of registration; suspension of registration pending final order; extension of registration pending final order. 1301.36... registration pending final order; extension of registration pending final order. (a) For any registration...

  2. SD card projects using the PIC microcontroller

    CERN Document Server

    Ibrahim, Dogan

    2010-01-01

    PIC Microcontrollers are a favorite in industry and with hobbyists. These microcontrollers are versatile, simple, and low cost making them perfect for many different applications. The 8-bit PIC is widely used in consumer electronic goods, office automation, and personal projects. Author, Dogan Ibrahim, author of several PIC books has now written a book using the PIC18 family of microcontrollers to create projects with SD cards. This book is ideal for those practicing engineers, advanced students, and PIC enthusiasts that want to incorporate SD Cards into their devices. SD cards are che

  3. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Jorge Thierer

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la en...

  4. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Thierer, Jorge

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los betabloqueantes vasodilatadores y los inhibidores de la enzim...

  5. 'Smart card' speeds triage, boosts safety.

    Science.gov (United States)

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.

  6. Loyalty Card Promotional Activity in Budget Hotel

    OpenAIRE

    Teng, Fei

    2010-01-01

    Loyalty card is one of the most commonly used promotional activities in business. Thus far, there are some research has been done on luxury hotel, but very few researches are on budget hotel. So, the purpose of the thesis is finding out the Swedish customers’ attitude and behavior towards budget hotel’s loyalty card; getting to know what factors influence Swedish customers’ response towards the loyalty card and budget hotels. In the thesis, the main research problem is “How do Swedish custome...

  7. Expression of Id2 in the Second Heart Field and Cardiac Defects in Id2 Knock-Out Mice

    NARCIS (Netherlands)

    Jongbloed, M. R. M.; Vicente-Steijn, R.; Douglas, Y. L.; Wisse, L. J.; Mori, K.; Yokota, Y.; Bartelings, M. M.; Schalij, M. J.; Mahtab, E. A.; Poelmann, R. E.; Gittenberger-De Groot, A. C.

    2011-01-01

    The inhibitor of differentiation Id2 is expressed in mesoderm of the second heart field, which contributes myocardial and mesenchymal cells to the primary heart tube. The role of Id2 in cardiac development is insufficiently known. Heart development was studied in sequential developmental stages in

  8. Critical Discourse Analysis towards Authority Ideology "Case of Mega Corruption E-KTP (Electronic ID Card " in Tempo Magazine

    Directory of Open Access Journals (Sweden)

    Martono Martono

    2018-03-01

    Full Text Available The ideology that is reflected in the discourse of Tempo Magazine in 2017 'the case of Mega Corruption e-KTP is seen from the text structure which includes the macrostructure. The global meanings studied are interrelated. The data obtained by journalists are used to discuss the topic of e-KTP case. "Fireball Corruption KTP". Superstructure discourse discussed based on the introduction, the contents, the cover, but not found conclusions. The preliminary section described has always supported the title of the discourse. The content section is the focus of journalist's study on e-KTP corruption issues. The closing section used by journalists always gives a settlement of the news presented. The microstructure of the discourse uses effective, straightforward and diction sentences. Ideology is seen from social cognition. There is a linkage of texts that journalists describe with the community. All perceptions and actions, and ultimately the production and interpretation of this discourse are based on the mental representation of every event that takes place. Events are presented based on a lot of evidence and believed to be true. Ideology is seen from the social context that includes the practice of power and access to affect the discourse. The practice of power in the discourse on the topic of mega corruption is related to the members of the People's Legislative Assembly and the Chief Judge of the Court. The Chief Justice used his power to reprimand the accused. Judging from the access that influences discourse then found a character who can use and or influence the discourse.

  9. From IDs to Ice Cream to "I, Claudius": Security Is in the Cards at Cleveland Hill Union Free School District.

    Science.gov (United States)

    Passmore, Cheryl

    2002-01-01

    Describes the use of plastic identity badges with photographs and barcodes issued to all administrators, teachers, staff members, and students in grades 6-12 at the Cleveland Hill Union Free School District in Cheektowaga, New York. (PKP)

  10. 12 CFR 226.12 - Special credit card provisions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  11. Fingerprint match-on-card: review and outlook

    CSIR Research Space (South Africa)

    Shabalala, MB

    2015-03-01

    Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...

  12. 75 FR 81721 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2010-12-28

    ... cards not marketed or labeled as a gift card or certificate. EFTA Section 920 provides, however, that... cardholder initiates a purchase by providing his or her card or card information to a merchant. In the case... purchases at retailers in the early 1980s. It was not until the mid-1990s, however, that PIN debit became a...

  13. Notification: Purchase Card and Convenience Check Audit

    Science.gov (United States)

    Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.

  14. Prefrontal system dysfunction and credit card debt.

    Science.gov (United States)

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.

  15. College Student Credit Card Usage and Debt.

    Science.gov (United States)

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  16. 25 CFR 249.3 - Identification cards.

    Science.gov (United States)

    2010-04-01

    ... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...

  17. FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue are available here.   Human Resources Division Tel. 74469

  18. EuCARD final project report

    CERN Document Server

    Koutchouk, J P

    2014-01-01

    After four years of activity, EuCARD has most of its objectives fulfilled, with some new objectives added and a few others on excellent tracks while requiring additional time. The management has been active in reinforcing the collaborative links between partners and projects, contributing to the preparation of FP7-EuCARD2, initiating FP7-HiLumi-LHC Design Study, to favour sustained collaborations beyond EuCARD. An out-of-contract network has been successfully launched on laser plasma acceleration, to combine forces between accelerator, laser and plasma communities. Communication and dissemination activities have led to two highlights: Accelerating News, an accelerator R&D newsletter initiated by EuCARD and now common to all FP7 accelerator projects (over 1000 subscribers) and a series of monographs on accelerator sciences that is progressively finding its public. The scientific networks have more than fulfilled their initial objectives: roadmaps are defined for neutrino facilities, submitted to the Europe...

  19. Software for a multichannel acquisition card

    International Nuclear Information System (INIS)

    Arista Romeu, E. J.; Diaz Garcia, A.; Vela Morales, O.

    2013-01-01

    A software developed in C++ for a multichannel acquisition card is presented. The use of an acquisition add-on card with multiple channels is a suitable solution to substitute several instruments, allowing simultaneous acquisition with each channel. In this work, the limitations of a concrete hardware are discussed and also several different approaches have been suggested. Some preliminary results obtained in laboratory conditions are shown. (Author)

  20. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  1. Pc Card Sony Ericsson: Semiotik Dan Iklan

    OpenAIRE

    Mutmainnah, Yulia

    2014-01-01

    Through advertisement, producers send messages for their product strength to consumers. Those messages are conveyed through various kinds of signs either in the form of language, picture, caption, icon, index, or symbol. There is communicative exchange on GC79 PC Card Sony Ericsson advertisement between sender and receiver. Sender (advertisement maker) of this advertisement makes good use of reward polluter style, which is, persuading comsumers to use PC Card Sony Ericsson product.

  2. Prototype ALICE front-end card

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    This circuit board is a prototype 48-channel front end digitizer card for the ALICE time projection chamber (TPC), which takes electrical signals from the wire sensors in the TPC and shapes the data before converting the analogue signal to digital data. A total of 4356 cards will be required to process the data from the ALICE TPC, the largest of this type of detector in the world.

  3. Image Registration: A Necessary Evil

    Science.gov (United States)

    Bell, James; McLachlan, Blair; Hermstad, Dexter; Trosin, Jeff; George, Michael W. (Technical Monitor)

    1995-01-01

    Registration of test and reference images is a key component of nearly all PSP data reduction techniques. This is done to ensure that a test image pixel viewing a particular point on the model is ratioed by the reference image pixel which views the same point. Typically registration is needed to account for model motion due to differing airloads when the wind-off and wind-on images are taken. Registration is also necessary when two cameras are used for simultaneous acquisition of data from a dual-frequency paint. This presentation will discuss the advantages and disadvantages of several different image registration techniques. In order to do so, it is necessary to propose both an accuracy requirement for image registration and a means for measuring the accuracy of a particular technique. High contrast regions in the unregistered images are most sensitive to registration errors, and it is proposed that these regions be used to establish the error limits for registration. Once this is done, the actual registration error can be determined by locating corresponding points on the test and reference images, and determining how well a particular registration technique matches them. An example of this procedure is shown for three transforms used to register images of a semispan model. Thirty control points were located on the model. A subset of the points were used to determine the coefficients of each registration transform, and the error with which each transform aligned the remaining points was determined. The results indicate the general superiority of a third-order polynomial over other candidate transforms, as well as showing how registration accuracy varies with number of control points. Finally, it is proposed that image registration may eventually be done away with completely. As more accurate image resection techniques and more detailed model surface grids become available, it will be possible to map raw image data onto the model surface accurately. Intensity

  4. Pro Forma Registration of Companies

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2010-01-01

    The article analyses the view taken by Community law on companies' pro forma registration in another EU or EEA country. Community law recognises pro forma registration under company law, i.e. a brass plate is sufficient, whereas it does not recognise pro forma registration under tax law, i.......e. a brass plate is not sufficient. The article provides reasons for the differential treatment of the two contexts and clarifies the difference on the basis of the Hubbard criterion, in which it was ruled that the effectiveness of Community law cannot vary according to the various branches of national law....

  5. Correlates of credit card ownership in men and women.

    Science.gov (United States)

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  6. The Regulation of the Credit Card Market in Turkey

    OpenAIRE

    Ahmet Faruk Aysan; L. Yildiz

    2006-01-01

    The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...

  7. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  8. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  9. An overview of smart card technology and markets

    OpenAIRE

    Mark Furletti

    2002-01-01

    As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...

  10. Benefits of Using Vocabulary Flash Cards in an EFL Classroom

    OpenAIRE

    Jonathan, Aliponga; Christopher C, Johnston

    2013-01-01

    This paper was written to research and advocate the use of English word cards withregard to vocabulary acquisition and English productive and receptive competency. Also,student perceptions of using and making word cards will be examined to show theimportance of including a word card policy in an EFL classroom. Despite all the positiveresearch done on word cards, it is surprising how many Japanese EFL students do notutilize word cards in their English studies. For this research, 108 students f...

  11. READING, PREPROCESSING OF ACCELERATIONS AND CORNERS INCLINATION WITH MPU-6050 I RECORD THEM ON SD-CARD THE ARDUINO DUE

    Directory of Open Access Journals (Sweden)

    V. G. Mikhailov

    2016-01-01

    Full Text Available The short review of microcontrollers of family Arduino, their characteristics and application fields is given. Importance of record of parameters of researched object is marked to produce debugging of control systems on microcontrollers Arduino. Unique possibility of registration of parameters in family Arduino is record on SD a card in an alpha mode with usage of functions print (, write (. The problems connected to record of the binary data on SD a card on microcontroller Arduino Due are considered. The analysis of methods of record of the binary data on SD-card Arduino Due, originating problems with neocleaning of memory from the previous program leading to possibility of duplication of the data on SD to a card, presence of the erratic point of view about restriction of volumes of data record and necessity of usage become outdated SD-cards is carried out. Ways of elimination of the marked lacks are considered. The estimation of high-speed performance of various approaches of a data recording on SD a card is led. On the basis of the led researches the approach of multiplexing of the writeable information at the expense of conversion of the binary data is offered is byte-serial in a character array in code ASCI without magnification of their volume and record by units on 240 byte. It allows to use as much as possible standard function possibilities write ( Arduino and specificity of the organization of memory SD of cards and to increase high-speed performance more than in 1100 times in comparison with record in a character type on one byte.It is marked that usage of decisions of an exception of duplication of the data offered at forums does not provide completeness of their elimination. For Arduino Due for storage cleaning it is necessary usages of the special programmator or setting of the new program of loading.

  12. Drug Establishments Current Registration Site

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Drug Establishments Current Registration Site (DECRS) is a database of current information submitted by drug firms to register establishments (facilities) which...

  13. Individual Pesticides in Registration Review

    Science.gov (United States)

    You can used the Chemical Search database to search pesticides by chemical name and find their registration review dockets, along with Work Plans, risk assessments, interim and final decisions, tolerance rules, and cancellation actions.

  14. Spherical Demons: Fast Surface Registration

    Science.gov (United States)

    Yeo, B.T. Thomas; Sabuncu, Mert; Vercauteren, Tom; Ayache, Nicholas; Fischl, Bruce; Golland, Polina

    2009-01-01

    We present the fast Spherical Demons algorithm for registering two spherical images. By exploiting spherical vector spline interpolation theory, we show that a large class of regularizers for the modified demons objective function can be efficiently implemented on the sphere using convolution. Based on the one parameter subgroups of diffeomorphisms, the resulting registration is diffeomorphic and fast – registration of two cortical mesh models with more than 100k nodes takes less than 5 minutes, comparable to the fastest surface registration algorithms. Moreover, the accuracy of our method compares favorably to the popular FreeSurfer registration algorithm. We validate the technique in two different settings: (1) parcellation in a set of in-vivo cortical surfaces and (2) Brodmann area localization in ex-vivo cortical surfaces. PMID:18979813

  15. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  16. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  17. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  18. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  19. The Antibody Response of Pregnant Cameroonian Women to VAR2CSA ID1-ID2a, a Small Recombinant Protein Containing the CSA-Binding Site

    Science.gov (United States)

    Babakhanyan, Anna; Leke, Rose G. F.; Salanti, Ali; Bobbili, Naveen; Gwanmesia, Philomina; Leke, Robert J. I.; Quakyi, Isabella A.; Chen, John J.; Taylor, Diane Wallace

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8–9% of males had antibodies to full-length VAR2CSA, but 90–96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a. PMID:24505415

  20. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site.

    Directory of Open Access Journals (Sweden)

    Anna Babakhanyan

    Full Text Available In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8-9% of males had antibodies to full-length VAR2CSA, but 90-96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a.

  1. La certificazione professionale I&D in Europa

    OpenAIRE

    Franco, Augusta

    2003-01-01

    The statement points out the activity of I&D European associations in the field of competences' certification, in ECIA federation's area as well as in the national one. In the statement there are references on history and outcomes of DECIDoc project; objectives and operative stages of CERTIDoc project, promoted by ECIA; and enterprises of I&D associations in France, Spain, Germany and Italy. Secondly, it is illustrated the activity of Italian librarians and archivists associatio...

  2. A Remote Registration Based on MIDAS

    Science.gov (United States)

    JIN, Xin

    2017-04-01

    We often need for software registration to protect the interests of the software developers. This article narrated one kind of software long-distance registration technology. The registration method is: place the registration information in a database table, after the procedure starts in check table registration information, if it has registered then the procedure may the normal operation; Otherwise, the customer must input the sequence number and registers through the network on the long-distance server. If it registers successfully, then records the registration information in the database table. This remote registration method can protect the rights of software developers.

  3. Problem and solution of tally segment card in MCNP code

    International Nuclear Information System (INIS)

    Xie Jiachun; Zhao Shouzhi; Sun Zheng; Jia Baoshan

    2010-01-01

    Wrong results may be given when FS card (tally segment card) was used for tally with other tally cards in Monte Carlo code MCNP. According to the comparison of segment tally results which were obtained by FS card of three different models of the same geometry, the tally results of fuel regions were found to be wrong in fill pattern. The reason is that the fuel cells were described by Universe card and FILL card, and the filled cells were always considered at Universe card definition place. A proposed solution was that the segment tally for filled cells was done at Universe card definition place. Radial flux distribution of one example was calculated in this way. The results show that the fault of segment tally with FS card in fill pattern could be solved by this method. (authors)

  4. Patient health record on a smart card.

    Science.gov (United States)

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  5. Medical image registration for analysis

    International Nuclear Information System (INIS)

    Petrovic, V.

    2006-01-01

    Full text: Image registration techniques represent a rich family of image processing and analysis tools that aim to provide spatial correspondences across sets of medical images of similar and disparate anatomies and modalities. Image registration is a fundamental and usually the first step in medical image analysis and this paper presents a number of advanced techniques as well as demonstrates some of the advanced medical image analysis techniques they make possible. A number of both rigid and non-rigid medical image alignment algorithms of equivalent and merely consistent anatomical structures respectively are presented. The algorithms are compared in terms of their practical aims, inputs, computational complexity and level of operator (e.g. diagnostician) interaction. In particular, the focus of the methods discussion is placed on the applications and practical benefits of medical image registration. Results of medical image registration on a number of different imaging modalities and anatomies are presented demonstrating the accuracy and robustness of their application. Medical image registration is quickly becoming ubiquitous in medical imaging departments with the results of such algorithms increasingly used in complex medical image analysis and diagnostics. This paper aims to demonstrate at least part of the reason why

  6. Neural fraud detection in credit card operations.

    Science.gov (United States)

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.

  7. Data card system for filmless radiography

    International Nuclear Information System (INIS)

    Siedband, M.P.

    1987-01-01

    Data cards using the sample principles as music compact discs can store 4 MB of digital data. This is sufficient for 4 uncompressed radiographic images or 16 images with 4:1 average compression. Radiograph memory screens (stimulable phosphors) can be scanned at 1023 lines to provide the input signals. A filmless radiographic x-ray system is described which uses digital data cards of the size of common credit cards. These can be used in the same way as films are now used: placed in patient folders, copied, mailed, seen on view boxes, etc. The techniques of data acquisition, processing, compression, storage and display are described. The advantages of the system are explained in terms of economies, elimination of film (chemicals and processing), and compatibility with other data transmission methods. Suggestions are made for standardization of data storage and control so that this method may be used for other medical imaging applications, such as CT and ultrasound

  8. CRC-cards for Product Modelling

    DEFF Research Database (Denmark)

    Hvam, Lars; Riis, Jesper; Hansen, Benjamin Loer

    2003-01-01

    , transportation, service and decommissioning. A main challenge when building product models is to collect and document the product related data, information and knowledge in a structured way. CRC cards are index cards (or computerized versions of these) which are used to record proposed classes, the behavior......This paper describes the CRC (class, responsibility, collaboration) modelling process for building product models. A product model is normally represented in an IT system which contains data, information and knowledge on industrial products and their life cycle properties e.g. manufacturing...... of the classes, their responsibilities, and their relationship to other classes (collaboration). CRC modelling gives an effective, low-tech method for domain-experts, programmers and users to work closely together to identify, structure, understand and document a product model. CRC cards were originally...

  9. Authoring of digital games via card games

    DEFF Research Database (Denmark)

    Valente, Andrea; Marchetti, Emanuela

    2014-01-01

    Literature and previous studies show that creative play is easy to emerge when children interact with tangible, low-tech toys and games than with digital games. This paradoxical situation is linked to the long-standing problem of end-users (or players) authoring of digital contents and systems. We...... are to show how card games can represent digital games, how playful play can emerge in card games and digital games, and to begin defining a new way to express game behavior without the use of universal programming languages....... propose a new scenario in which trading card games help making sense and re-design computer games, to support players express themselves aesthetically and in a highly creative way. Our aim is to look for a middle ground between players becoming programmers and simply editing levels. The main contributions...

  10. A Laboratory-Developed TaqMan Array Card for Simultaneous Detection of 19 Enteropathogens

    Science.gov (United States)

    Liu, Jie; Gratz, Jean; Amour, Caroline; Kibiki, Gibson; Becker, Stephen; Janaki, Lalitha; Verweij, Jaco J.; Taniuchi, Mami; Sobuz, Shihab U.; Haque, Rashidul; Haverstick, Doris M.

    2013-01-01

    The TaqMan Array Card (TAC) system is a 384-well singleplex real-time PCR format that has been used to detect multiple infection targets. Here we developed an enteric TaqMan Array Card to detect 19 enteropathogens, including viruses (adenovirus, astrovirus, norovirus GII, rotavirus, and sapovirus), bacteria (Campylobacter jejuni/C. coli, Clostridium difficile, Salmonella, Vibrio cholerae, diarrheagenic Escherichia coli strains including enteroaggregative E. coli [EAEC], enterotoxigenic E. coli [ETEC], enteropathogenic E. coli [EPEC], and Shiga-toxigenic E. coli [STEC]), Shigella/enteroinvasive E. coli (EIEC), protozoa (Cryptosporidium, Giardia lamblia, and Entamoeba histolytica), and helminths (Ascaris lumbricoides and Trichuris trichiura), as well as two extrinsic controls to monitor extraction and amplification efficiency (the bacteriophage MS2 and phocine herpesvirus). Primers and probes were newly designed or adapted from published sources and spotted onto microfluidic cards. Fecal samples were spiked with extrinsic controls, and DNA and RNA were extracted using the QiaAmp Stool DNA minikit and the QuickGene RNA Tissue kit, respectively, and then mixed with Ag-Path-ID One Step real-time reverse transcription-PCR (RT-PCR) reagents and loaded into cards. PCR efficiencies were between 90% and 105%, with linearities of 0.988 to 1. The limit of detection of the assays in the TAC was within a 10-fold difference from the cognate assays performed on plates. Precision testing demonstrated a coefficient of variation of below 5% within a run and 14% between runs. Accuracy was evaluated for 109 selected clinical specimens and revealed an average sensitivity and specificity of 85% and 77%, respectively, compared with conventional methods (including microscopy, culture, and immunoassay) and 98% and 96%, respectively, compared with our laboratory-developed PCR-Luminex assays. This TAC allows fast, accurate, and quantitative detection of a broad spectrum of enteropathogens and

  11. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    Science.gov (United States)

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  12. UTILIZAÇÃO DE JAVA CARD COMO PLATAFORMA PARA O DESENVOLVIMENTO DE APLICAÇÕES EM SMART CARD.

    Directory of Open Access Journals (Sweden)

    Lucas Plis Dolce

    2011-12-01

    Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.

  13. FBCT fast intensity measurement using TRIC cards

    CERN Document Server

    Allica, J C; Belohrad, D; Jensen, L; Lenardon, F; SØby, L

    2015-01-01

    At the CERN PS complex, precise fast intensity measurements are very important in order to optimize the transfer efficiencies between the different accelerators. Over the last two years a complete renovation has been ongoing, where the old electronics, based on analogue integrators, have been replaced by a fully digital system enclosed in a single VME based card. This new system called TRIC (Transformer Integration Card) is based on a 12 bit, 212 MS/s ADC and an FPGA for the signal processing. Also located on the same board one finds a 250 V/1.5 W DCDC converter used to generate precise calibration pulses.

  14. Card controlled beta backscatter thickness measuring instrument

    International Nuclear Information System (INIS)

    Schlesinger, J.

    1978-01-01

    An improved beta backscatter instrument for the nondestructive measurement of the thickness of thin coatings on a substrate is described. Included therein is the utilization of a bank of memory stored data representative of isotope, substrate, coating material and thickness range characteristics in association with a control card having predetermined indicia thereon selectively representative of a particular isotope, substrate material, coating material and thickness range for conditioning electronic circuit means by memory stored data selected in accord with the predetermined indicia on a control card for converting backscattered beta particle counts into indicia of coating thickness

  15. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  16. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  17. Language proficiency and nursing registration.

    Science.gov (United States)

    Müller, Amanda

    2016-02-01

    This discussion paper focuses on English proficiency standards for nursing registration in Australia, how Australia has dealt with the issue of language proficiency, and the factors which have led to the establishment of the current language standards. Also, this paper will provide a comparison of the two language tests that are currently accepted in Australia (OET and IELTS), including the appropriateness of these tests and the minimum standards used. The paper will also examine the use of educational background as an indicator of language proficiency. Finally, communication-based complaints in the post-registration environment will be explored, and some discussion will be provided about why pre-registration measures might have failed to prevent such problematic situations from occurring. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Numerical methods for image registration

    CERN Document Server

    Modersitzki, Jan

    2003-01-01

    Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians, computer scientists, engineers, medical physicists, and radiologists.Image registration is utilised whenever information obtained from different viewpoints needs to be combined or compared and unwanted distortion needs to be eliminated. For example, CCTV imag

  19. RENEWAL OF CRIMINAL LAW AGAINST ABUSE OF CREDIT CARDS

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-07-01

    Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people.   On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia.   A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.

  20. Barber's Point, Oahu, Hawaii Drift Card Study 2002-2004

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Drift cards were be released from Barber's Point, Oahu, approximately once a month during the two year span to get an idea of the distribution of card drift under...

  1. Increasing Opportunities for Student Responding: Response Cards in the Classroom

    Science.gov (United States)

    Helf, Shawnna

    2015-01-01

    Response cards are designed to encourage active student engagement during instruction. In this article, the use of response cards is described, along with ways teachers can use the information to inform their work and considerations for implementation.

  2. Credit and Debit Card Usage and Cash Flow Management Control ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Simiyu, Justo Simiyu - Department of Business Management, Chuka. University College ... Key words: Debit cards, credit cards, commercial banks, Kenya. Introduction ..... saving at once convenience without proper planning.

  3. Puppet Visual Adaptation on Playing Cards as Educational Media

    Directory of Open Access Journals (Sweden)

    Joko Wiyoso

    2017-02-01

    Full Text Available This study aims at presenting an effective media in a form of puppet picture playing cards as a means to introduce traditional puppet to the society. Research and Development (R&D was chosen as the method to develop the playing cards. Results were presented in a form of the design of puppet picture playing cards as many as 54 cards as well as 54 puppet characters as the background pictures. The design of the playing cards is adjusted to the common playing cards which are distributed widely in the society, including both the sizes and symbols, like the pictures of spade, heart, diamond, and club. In detail, the design comprises: (1 the size of playing cards which is 6 cm width of the upper and lower sides and 9 cm length for the left and right sides. (2 The playing cards’ background is in a bright color so does the puppet picture on the card can be seen clearly.

  4. Aliénation et idéologie

    OpenAIRE

    Kanabus, Benoît; Popa, Délia

    2017-01-01

    Dès lors, on entend mieux la question sur laquelle se referment les mille pages du Marx : « La pensée de Marx nous place devant la question abyssale : qu’est-ce que la vie » ? Cette question peut être reposée à nouveaux frais à l’âge du capitalisme avancé, où, comme le notait Adorno, la vie est devenue « l’idéologie de sa propre absence ». La recherche d’un autre rapport à l’idéologie vient alors prendre le relais de la lutte anti-idéologique de la théorie critique. Cette recherche part du po...

  5. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  6. Studi Perkembangan Pasar Smart Card Indonesia Pada Sektor Perbankan

    OpenAIRE

    Onny Rafizan

    2017-01-01

    Smart card merupakan salah satu teknologi yang sudah banyak digunakan di Indonesia di berbagai sektor. Dari sisi teknologi, industri dalam negeri sebenarnya sudah mampu memproduksi smart card, sehingga industri ini sangat potensial untuk dikembangkan menuju kemandirian. Penelitian ini dilakukan sebagai bagian dalam USAha pemerintah untuk mendorong perkembangan industri smart card dalam negeri, dengan tujuan memberikan gambaran kondisi pasar smart card di Indonesia saat ini. Pengumpulan data p...

  7. Smart Card sebagai Pengaman Sepeda Motor Berbasis Mikrokontroler

    OpenAIRE

    Yohanes Chrisostomus Purba; Antonius Wibowo

    2010-01-01

    Pengaman sepeda motor yang berbentuk smart card terdiri dari bagian yang memuat chip EEPROM dan bagian pengaman smart card. Pembacaan smart card didesain dan ditempatkan pada sepeda motor. Untuk pembacaan data chip SLE 4442, dan pembacaan data pengaman smart card digunakan mikrokontroler AT89S51. Untuk pengaturan aktif maupun tidak aktifnya CDI, dan starter juga digunakan mikrokontroler AT89S51. Sistem pengaman sepeda motor akan menjadi aktif bila sepeda motor dalam keadaan mati. Smart car...

  8. 75 FR 55392 - Employment Network Report Card

    Science.gov (United States)

    2010-09-10

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0046] Employment Network Report Card AGENCY: Social Security Administration (SSA). ACTION: Notice of Webinar and National Teleconference Call listening sessions--announcing two opportunities for SSA to hear public comments on Employment Network...

  9. Looking at Debit and Credit Card Fraud

    Science.gov (United States)

    Porkess, Roger; Mason, Stephen

    2012-01-01

    This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

  10. Artist Trading Cards: Connecting with Other Communities

    Science.gov (United States)

    Bovio, Deborah

    2011-01-01

    Creating and exchanging Artist Trading Cards (ATCs) has been a rapidly growing trend. These miniature works of art are fun to make--and even more fun to share. The intrigue of developing these handmade treasures begins with the intent of creating art simply for the love of art. In this article, the author describes how her students made their…

  11. Melting Metal on a Playing Card

    Science.gov (United States)

    Greenslade, Thomas B., Jr.

    2016-01-01

    Many of us are familiar with the demonstration of boiling water in a paper cup held over a candle or a Bunsen burner; the ignition temperature of paper is above the temperature of 100°C at which water boils under standard conditions. A more dramatic demonstration is melting tin held in a playing card. This illustration is from Tissandier's book on…

  12. Integration through a Card-Sort Activity

    Science.gov (United States)

    Green, Kris; Ricca, Bernard P.

    2015-01-01

    Learning to compute integrals via the various techniques of integration (e.g., integration by parts, partial fractions, etc.) is difficult for many students. Here, we look at how students in a college level Calculus II course develop the ability to categorize integrals and the difficulties they encounter using a card sort-resort activity. Analysis…

  13. Tumores cardíacos primarios

    Directory of Open Access Journals (Sweden)

    Rosa Eugenia Díaz Garriga

    2013-10-01

    Full Text Available Introducción: los tumores cardíacos primarios son aquellos que se originan en Miocardio o Pericardio. El 90% son benignos, no son invasivos, pero debido a su localización pueden provocar alteraciones hemodinámicas graves y arrítmias. Presentación del caso: dos casos portadores de tumores cardíacos diagnosticados en la etapa prenatal, una gestante de 32 años, portadora de una Neurofribromatosis que en la ecocardiografía fetal de su hijo, se identifican dos tipos de tumores cardíacos, un mixoma auricular y un fibroma, y un niño que desde la etapa prenatal se diagnosticó un rabdomioma, lo cual se confirmó al nacimiento y que regresó espontáneamente. Conclusiones: a ecocardiografía fetal permite cada vez con más frecuencia, el diagnóstico intraútero de tumores cardíacos. Los rabdomiomas regresan en más del 50% de los casos, pero pueden ser un marcador de Esclerosis Tuberosa. Los tumores cardiacos se asocian a otras afecciones congénitas y requieren de tratamiento quirúrgico. Aspectos todos a tener en consideración para realizar el asesoramiento genético a la familia.

  14. Optical security features for plastic card documents

    Science.gov (United States)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  15. Insuficiencia cardíaca y diabetes

    Directory of Open Access Journals (Sweden)

    Jorge Thierer

    2006-01-01

    Full Text Available La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la enzima convertidora ejercen una influencia favorable, en tanto que el uso de glitazonas todavía es controversial. La insuficiencia cardíaca puede a su vez generar diabetes, debido a la activación del sistema nervioso simpático y al efecto del tratamiento. La comprensión adecuada de estos hechos es fundamental para tomar decisiones correctas y mejorar la suerte de los pacientes.

  16. INTERFACE ELECTRONIC MEDICAL CARD ON MOBILE DEVICE

    Directory of Open Access Journals (Sweden)

    Y. L. Nechyporenko

    2013-05-01

    Full Text Available The concept designed by electronic medical card for heterogeneous environment of medical information systems at various levels. Appropriate model and technical solution. Done evaluating operating systems for mobile devices. Designed and produced by the project mobile application on Android OS as an electronic medical record on a Tablet PC Acer.

  17. FT 3 Flight Test Cards for Export

    Science.gov (United States)

    Marston, Michael L.

    2015-01-01

    These flight test cards will be made available to stakeholders who participated in FT3. NASA entered into the relationship with our stakeholders, including the FAA, to develop requirements that will lead to routine flights of unmanned aircraft systems flying in the national airspace system.

  18. "It's in the Cards": The Contribution of Illustrated Metaphor Cards to Exploring Values Within Narratives.

    Science.gov (United States)

    Karnieli-Miller, Orit; Nissim, Geffen; Goldberg, Miriam

    2017-01-01

    In this article, we present the use of illustrated metaphorical cards as a technique to enrich the qualitative narrative interview. We examine the advantages of incorporating a projective tool to assist in constructing and understanding personal narratives of people living with severe mental illness. We interviewed 25 participants-staff and members of a clubhouse in Israel (an international community model of rehabilitation in mental health)-and sought to understand their stories focused on personal and organizational values. The findings revealed that, in most cases, the cards contributed to data collection by enhancing the interviewees' ability for expression and by facilitating richer, more comprehensive stories and descriptions. This in turn enhanced the researcher's ability to understand the messages and stories presented. The research conclusions discuss the cards' potential contribution to improving data collection and analysis. The cards became an additional channel for expressing participants' experiences, emotions, and unique voice. © The Author(s) 2015.

  19. 8 CFR 1212.6 - Border crossing identification cards.

    Science.gov (United States)

    2010-01-01

    ... combined B-1/B-2 visitor visa and non-biometric border crossing identification card or (a similar stamp in... non-biometric border crossing identification card (or similar stamp in a passport), issued by the DOS... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Border crossing identification cards. 1212...

  20. 25 CFR 11.422 - Unauthorized use of credit cards.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  1. 77 FR 37558 - Disclosure of Certain Credit Card Complaint Data

    Science.gov (United States)

    2012-06-22

    ... Certain Credit Card Complaint Data AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of... Bureau plans to exercise its discretion to publicly disclose certain credit card complaint data that do not include personally identifiable information. The Bureau receives credit card complaints from...

  2. 77 FR 75410 - Request for Information Regarding Credit Card Market

    Science.gov (United States)

    2012-12-20

    ... Regarding Credit Card Market AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice and request for information. SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and Disclosure Act of... review (Review) of the consumer credit card market, within the limits of its existing resources available...

  3. Credit Card Attitudes and Behaviors of College Students

    Science.gov (United States)

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  4. Clinicians completion rate of radiology request card in a Nigerian ...

    African Journals Online (AJOL)

    The importance of adequately completing the radiology request card by the clinicians, in management of patient cannot be overemphasized. Omission of information on the request card may lead to reporting error. This study investigated the compliance rate of filling the radiology request card by clinicians received in a ...

  5. 46 CFR 154.1814 - Cargo information cards.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo information cards. 154.1814 Section 154.1814... cards. (a) No person may operate a vessel unless a cargo information card for each cargo being... accessible to the person in charge of the watch. (b) When a vessel is moored at a terminal, the master shall...

  6. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  7. 76 FR 43393 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2011-07-20

    ... programs and certain reloadable, general-use prepaid cards not marketed or labeled as a gift card or gift... evolved to support payments made by consumers for the purchase of goods or services at merchants... of the purchase transaction. Debit cards are generally issued by depository institutions to their...

  8. On Cyclic Plans for Scheduling a Smart Card Personalisation System

    NARCIS (Netherlands)

    Nieberg, T.

    An industrial case study for scheduling the personalisation of smart cards is presented and analysed. Smart cards are personalised in several machines that are served by an underlying conveyor belt connecting these. As there are usually a very high number of smart cards to be personalised, the focus

  9. 78 FR 39020 - Market Test on Gift Cards

    Science.gov (United States)

    2013-06-28

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 1755] Market Test on Gift Cards... Service filing requesting a temporary extension of a market test on gift cards. This notice informs the... INFORMATION: On June 18, 2013, the United States Postal Service moved to temporarily extend its Gift Card...

  10. Contacts in the Office of Pesticide Programs, Registration Division

    Science.gov (United States)

    The Registration Division (RD) is responsible product registrations, amendments, registrations, tolerances, experimental use permits, and emergency exemptions for conventional chemical pesticides. Find contacts in this division.

  11. What drives Users' Website Registration?

    NARCIS (Netherlands)

    T. Li (Ting); P.A. Pavlou (Paul)

    2013-01-01

    textabstractUser registration is an important prerequisite for the success of many websites by enabling users to gain access to domain information and personalized content. It is not always desirable for users, however, because they need to disclose personal information. This paper examines what

  12. ACIR: automatic cochlea image registration

    Science.gov (United States)

    Al-Dhamari, Ibraheem; Bauer, Sabine; Paulus, Dietrich; Lissek, Friedrich; Jacob, Roland

    2017-02-01

    Efficient Cochlear Implant (CI) surgery requires prior knowledge of the cochlea's size and its characteristics. This information helps to select suitable implants for different patients. To get these measurements, a segmentation method of cochlea medical images is needed. An important pre-processing step for good cochlea segmentation involves efficient image registration. The cochlea's small size and complex structure, in addition to the different resolutions and head positions during imaging, reveals a big challenge for the automated registration of the different image modalities. In this paper, an Automatic Cochlea Image Registration (ACIR) method for multi- modal human cochlea images is proposed. This method is based on using small areas that have clear structures from both input images instead of registering the complete image. It uses the Adaptive Stochastic Gradient Descent Optimizer (ASGD) and Mattes's Mutual Information metric (MMI) to estimate 3D rigid transform parameters. The use of state of the art medical image registration optimizers published over the last two years are studied and compared quantitatively using the standard Dice Similarity Coefficient (DSC). ACIR requires only 4.86 seconds on average to align cochlea images automatically and to put all the modalities in the same spatial locations without human interference. The source code is based on the tool elastix and is provided for free as a 3D Slicer plugin. Another contribution of this work is a proposed public cochlea standard dataset which can be downloaded for free from a public XNAT server.

  13. Clearing and settlement of interbank card transactions: a MasterCard tutorial for Federal Reserve payments analysts

    OpenAIRE

    Susan Herbst-Murphy

    2013-01-01

    The Payment Cards Center organized a meeting at which senior officials from MasterCard shared information with Federal Reserve System payments analysts about the clearing and settlement functions that MasterCard performs for its client banks. These functions involve the transfer of information pertaining to card-based transactions (clearing) and the exchange of monetary value (settlement) that takes place between the banks whose customers are cardholders and those banks whose customers are ca...

  14. Digitizing Villanova University's Eclipsing Binary Card Catalogue

    Science.gov (United States)

    Guzman, Giannina; Dalton, Briana; Conroy, Kyle; Prsa, Andrej

    2018-01-01

    Villanova University’s Department of Astrophysics and Planetary Science has years of hand-written archival data on Eclipsing Binaries at its disposal. This card catalog began at Princeton in the 1930’s with notable contributions from scientists such as Henry Norris Russel. During World War II, the archive was moved to the University of Pennsylvania, which was one of the world centers for Eclipsing Binary research, consequently, the contributions to the catalog during this time were immense. It was then moved to University of Florida at Gainesville before being accepted by Villanova in the 1990’s. The catalog has been kept in storage since then. The objective of this project is to digitize this archive and create a fully functional online catalog that contains the information available on the cards, along with the scan of the actual cards. Our group has built a database using a python-powered infrastructure to contain the collected data. The team also built a prototype web-based searchable interface as a front-end to the catalog. Following the data-entry process, information like the Right Ascension and Declination will be run against SIMBAD and any differences between values will be noted as part of the catalog. Information published online from the card catalog and even discrepancies in information for a star, could be a catalyst for new studies on these Eclipsing Binaries. Once completed, the database-driven interface will be made available to astronomers worldwide. The group will also acquire, from the database, a list of referenced articles that have yet to be found online in order to further pursue their digitization. This list will be comprised of references in the cards that were neither found on ADS nor online during the data-entry process. Pursuing the integration of these references to online queries such as ADS will be an ongoing process that will contribute and further facilitate studies on Eclipsing Binaries.

  15. Thermorewritable card by using dyes; Senryo wo mochiita kakikae kanona card

    Energy Technology Data Exchange (ETDEWEB)

    Muto, Y.

    1998-06-01

    Described herein are thermorewritable cards which use dyes. Rewritable cards, mainly used for membership and point cards, are themselves used repeatedly and required to be rewritable repeatedly for information they carry. The dyes and developers used for the conventional heat- and pressure-sensitive papers are colorless, leuco-dye precursors and acidic compounds with a phenolic hydroxyl group or the like. They transfer electrons to each other, opening the lactone ring of the dye precursor to develop the color. Developing and erasing the color are reversible chemical reactions, where the color is developed under heat and maintained by quenching. For erasing the color, it is heated and then slowly cooled to separate the precursor and developer phases from each other. A printer (thermal head) is required for developing and erasing a color. Durability under various conditions is another requirement of the card; it must be adaptable to weather conditions and resistant to sweat. The new thermorewritable card is protected from various adverse effects on its chemical reactions, and made as durable as the conventional cards. 3 refs., 5 figs., 1 tab.

  16. Efficient nonrigid registration using ranked order statistics

    DEFF Research Database (Denmark)

    Tennakoon, Ruwan B.; Bab-Hadiashar, Alireza; de Bruijne, Marleen

    2013-01-01

    of research. In this paper we propose a fast and accurate non-rigid registration method for intra-modality volumetric images. Our approach exploits the information provided by an order statistics based segmentation method, to find the important regions for registration and use an appropriate sampling scheme......Non-rigid image registration techniques are widely used in medical imaging applications. Due to high computational complexities of these techniques, finding appropriate registration method to both reduce the computation burden and increase the registration accuracy has become an intense area...... to target those areas and reduce the registration computation time. A unique advantage of the proposed method is its ability to identify the point of diminishing returns and stop the registration process. Our experiments on registration of real lung CT images, with expert annotated landmarks, show...

  17. Evaluation of the use of registration stickers.

    Science.gov (United States)

    2011-04-01

    This research evaluated the potential costs and benefits of doing away with license plate registration stickers as part : of the registration renewal process for Pennsylvania. The research consisted of a comprehensive literature review, a : survey of...

  18. Fuels Registration, Reporting, and Compliance Help

    Science.gov (United States)

    Information about the requirements for registration and health effects testing of new fuels or fuel additives and mandatory registration for fuels reporting and about mandatory reporting forms for parties regulated under EPA fuel programs.

  19. Identification of Staphylococcus species and subspecies with the MicroScan Pos ID and Rapid Pos ID panel systems.

    Science.gov (United States)

    Kloos, W E; George, C G

    1991-01-01

    The accuracies of the MicroScan Pos ID and Rapid Pos ID panel systems (Baxter Diagnostic Inc., MicroScan Division, West Sacramento, Calif.) were compared with each other and with the accuracies of conventional methods for the identification of 25 Staphylococcus species and 4 subspecies. Conventional methods included those used in the original descriptions of species and subspecies and DNA-DNA hybridization. The Pos ID panel uses a battery of 18 tests, and the Rapid Pos ID panel uses a battery of 42 tests for the identification of Staphylococcus species. The Pos ID panel has modified conventional and chromogenic tests that can be read after 15 to 48 h of incubation; the Rapid Pos ID panel has tests that use fluorogenic substrates or fluorometric indicators, and test results can be read after 2 h of incubation in the autoSCAN-W/A. Results indicated that both MicroScan systems had a high degree of congruence (greater than or equal to 90%) with conventional methods for the species S. capitis, S. aureus, S. auricularis, S. saprophyticus, S. cohnii, S. arlettae, S. carnosus, S. lentus, and S. sciuri and, in particular, the subspecies S. capitis subsp. capitis and S. cohnii subsp. cohnii. The Rapid Pos ID panel system also had greater than or equal to 90% congruence with conventional methods for S. epidermidis, S. caprae, S. warneri subsp. 2, S. xylosus, S. kloosii, and S. caseolyticus. For both MicroScan systems, congruence with conventional methods was 80 to 90% for S. haemolyticus subsp. 1, S. equorum, S. intermedius, and S. hyicus; and in addition, with the Rapid Pos ID panel system congruence was 80 to 89% for S. capitis subsp. ureolyticus, S. warneri subsp. 1, S. hominis, S. cohnii subsp. urealyticum, and S. simulans. The MicroScan systems identified a lower percentage (50 to 75%) of strains of S. lugdunensis, S. gallinarum, S. schleiferi, and S. chromogenes, although the addition of specific tests to the systems might increase the accuracy of identification

  20. The European Commission's Decision in MasterCard : Issues Facing the Payment Card Industry for the Future

    OpenAIRE

    John Wotton

    2008-01-01

    The Decision in MasterCard displays a fundamental divergence between the Commission’s and MasterCard’s approaches to the analysis of the competitive effects of open payment card schemes.

  1. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-10-19

    Oct 19, 2009 ... variants (Koyama et al., 2008). This method removed the chances of mistyping and gave 100% accuracy in the confirmation of ID heterozygotes but expenses of chromatography did not prove it to be cost effective. Normally, genomic DNA is used as template DNA for. PCR based studies. It is very difficult to ...

  2. Screening of Lactobacillus plantarum isolated from fermented idli ...

    African Journals Online (AJOL)

    Probiotics are defined as live microorganisms which when administered in adequate amounts confer a health benefit on the host. The objective of this study was to screen eight potential probiotic Lactobacillus plantarum strains from fermented idli batter using in vitro assays such as bile tolerance, acid tolerance, transit ...

  3. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  4. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    ACE ID polymorphism is inevitable for genetic epidemiology of several cardiovascular and non cardiovascular diseases due to its direct influence on ACE activity level. In the present work, conditions were optimized for its analysis using conventional and direct blood PCR (DB PCR). Blood samples from nine normotensive ...

  5. Anmeldung in ILIAS ohne Uni-Login-ID

    OpenAIRE

    Schanz, Nadja

    2016-01-01

    Gewusst wie...! Online-Tutorial der Universitätsbibliothek Tübingen. Erklärt die Anmeldung in Ilias zu Führungen ohne Uni-Login-ID Online Tutorial from university library tuebingen. teaches how to register in Ilias for courses and guided tours without university login

  6. idRHa+ProMod - Rail Hardening Control System

    International Nuclear Information System (INIS)

    Ferro, L

    2016-01-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl (paper)

  7. The Danish eID Case: Twenty years of Delay

    DEFF Research Database (Denmark)

    Hoff, Jens Villiam; Hoff, Frederik Villiam

    2010-01-01

    the technological, organizational and legal dimensions of eID in Denmark, and comparing these with a number of other European countries made it possible to explain this paradox. Thus, the three main reasons for the special route development has taken in Denmark seems to be concerns over privacy, lack...

  8. idRHa+ProMod - Rail Hardening Control System

    Science.gov (United States)

    Ferro, L.

    2016-03-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl

  9. The mother's card: a simplified aid for primary health workers.

    Science.gov (United States)

    Shah, K P; Shah, P M

    1981-02-01

    The Mother's Card and its use are described. The card is filled out by the health worker and provides data on the mother concerning family planning, menstrual cycles, pregnancy period (including whether at risk, state of nutrition, immunization against tetanus, and expected date of birth), and breastfeeding. The card is kept by the mother, and the health worker keeps a copy. Each card has space for 10 years and up to 4 pregnancies. The cards have been used successfully in India since 1976 and in Somalia since early 1980, and were useful in strengthening family planning programs as well as identifying pregnancies at risk for special attention.

  10. Consumer Credit Card Use Intention and Influence Factors Analysis

    Directory of Open Access Journals (Sweden)

    Wang Yantao

    2017-01-01

    Full Text Available Credit card as a kind of advanced means of payment and the new way of consumer credit in the world widely, but in our country is faced with some problems, such as their per capita spending is low, open the card number is small, motionless bank card is a lot. In this paper, using the Logit model to analyze the Anshan city in Liaoning province consumer credit card usage. And combined with empirical analysis to provide banking management Suggestions and marketing countermeasures, including targeted to provide different kinds of credit card.

  11. PC add on card for processing of LSC signals

    International Nuclear Information System (INIS)

    Jadhav, S.R.; Nikhare, D.M.; Gurna, R.K.; Paulson, Molly; Kulkarni, C.P.; Vaidya, P.P.

    2001-01-01

    This paper describes PC- add on card developed at Electronics Division for processing of LSC signals. This card uses highly integrated digital and analog circuits, for entire processing of signals available from preamplifiers to get complete beta energy spectrum corresponding to coincident events in Liquid Scintillation Counting. LSC card along with High Voltage PC-add on card gives complete electronics required for LSC system. This card is also used in automatic LSC system along with interface circuits, which are used to control mechanical movements. (author)

  12. The possibility of using "Job Card" for career education

    OpenAIRE

    横山, 裕; ヨコヤマ, ユタカ; Yutaka, YOKOYAMA

    2009-01-01

    This paper described the advantage of using a "job card" for career education. "The job card system" is a new system that began this year. The original purpose of "the job card system" is to support a person looking for a job. When a job seeker writes a "job card", the job seeker can understand his own work experience and employment possibilities while getting the advice of the career counselor. If a teacher utilized a "job card" for career education in this way, the student can understand hi...

  13. Health care report cards: what about consumers' perspectives?

    Science.gov (United States)

    McGee, J; Knutson, D

    1994-10-01

    Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.

  14. 12 CFR 583.18 - Registrant.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Registrant. 583.18 Section 583.18 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING SAVINGS AND LOAN HOLDING COMPANIES § 583.18 Registrant. The term registrant means a savings and loan...

  15. Clinical trial registration in oral health journals.

    Science.gov (United States)

    Smaïl-Faugeron, V; Fron-Chabouis, H; Durieux, P

    2015-03-01

    Prospective registration of randomized controlled trials (RCTs) represents the best solution to reporting bias. The extent to which oral health journals have endorsed and complied with RCT registration is unknown. We identified journals publishing RCTs in dentistry, oral surgery, and medicine in the Journal Citation Reports. We classified journals into 3 groups: journals requiring or recommending trial registration, journals referring indirectly to registration, and journals providing no reference to registration. For the 5 journals with the highest 2012 impact factors in each group, we assessed whether RCTs with results published in 2013 had been registered. Of 78 journals examined, 32 (41%) required or recommended trial registration, 19 (24%) referred indirectly to registration, and 27 (35%) provided no reference to registration. We identified 317 RCTs with results published in the 15 selected journals in 2013. Overall, 73 (23%) were registered in a trial registry. Among those, 91% were registered retrospectively and 32% did not report trial registration in the published article. The proportion of trials registered was not significantly associated with editorial policies: 29% with results in journals that required or recommended registration, 15% in those that referred indirectly to registration, and 21% in those providing no reference to registration (P = 0.05). Less than one-quarter of RCTs with results published in a sample of oral health journals were registered with a public registry. Improvements are needed with respect to how journals inform and require their authors to register their trials. © International & American Associations for Dental Research.

  16. Solid Mesh Registration for Radiotherapy Treatment Planning

    DEFF Research Database (Denmark)

    Noe, Karsten Østergaard; Sørensen, Thomas Sangild

    2010-01-01

    We present an algorithm for solid organ registration of pre-segmented data represented as tetrahedral meshes. Registration of the organ surface is driven by force terms based on a distance field representation of the source and reference shapes. Registration of internal morphology is achieved usi...

  17. 32 CFR 634.19 - Registration policy.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Registration policy. 634.19 Section 634.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Motor Vehicle Registration § 634.19 Registration policy. (a) Motor vehicles will be...

  18. 21 CFR 710.8 - Misbranding by reference to registration or to registration number.

    Science.gov (United States)

    2010-04-01

    ... HUMAN SERVICES (CONTINUED) COSMETICS VOLUNTARY REGISTRATION OF COSMETIC PRODUCT ESTABLISHMENTS § 710.8 Misbranding by reference to registration or to registration number. Registration of a cosmetic product... products by the Food and Drug Administration. Any representation in labeling or advertising that creates an...

  19. 21 CFR 710.6 - Notification of registrant; cosmetic product establishment registration number.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Notification of registrant; cosmetic product... OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS VOLUNTARY REGISTRATION OF COSMETIC PRODUCT ESTABLISHMENTS § 710.6 Notification of registrant; cosmetic product establishment registration number. The...

  20. 21 CFR 1301.52 - Termination of registration; transfer of registration; distribution upon discontinuance of business.

    Science.gov (United States)

    2010-04-01

    ... discontinues business or professional practice. Any registrant who ceases legal existence or discontinues... registration; distribution upon discontinuance of business. 1301.52 Section 1301.52 Food and Drugs DRUG... of registration; transfer of registration; distribution upon discontinuance of business. (a) Except...

  1. Card products market in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Ivana Šučur

    2007-12-01

    Full Text Available Card business in the Republic of Croatia started to develop more than 30 years ago in the form of non-bank card products, issued by American Express and Diners Club global payment systems. These card products were defined as standard charge cards and had been the only card products present in the market until bank cards appeared about ten years ago. The situation changed completely when banks started to enter the market as active participants in the card business. In co-operation with bank global payment systems, MasterCard Worldwide and Visa International, banks have issued several millions of various cards in just a few years, while non-bank issuers have followed the same trend with new card products. This paper explores the current situation in the domestic market; it determines who the cardholders of particular products are, which products they are familiar with, whether they use them or not and for what reason. Cardholders’ opinions, attitudes and preferences towards existing products have been explored, as well as the benefits they would like to get. The results obtained imply that cardholders are familiar with all bank and non-bank card brands, but that they use mostly those which provide them with specific benefits. Therefore, instead of focusing on providing more similar products, issuers should concentrate on designing differentiated products that have been tailored to cardholders’ real needs.

  2. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    Jathar, M.R.; Vikas, Meshram; Patidar, S.C.

    2015-01-01

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  3. Summer Camp July 2017 - Registration

    CERN Multimedia

    EVE et École

    2017-01-01

    The CERN Staff Association’s Summer Camp will be open for children from 4 to 6 years old during four weeks, from 3 to 28 July. Registration is offered on a weekly basis for 450 CHF, lunch included. This year, the various activities will revolve around the theme of the Four Elements. Registration opened on 20 March 2017 for children currently attending the EVE and School of the Association. It will be open from 3 April for children of CERN Members of Personnel, and starting from 24 April for all other children. The general conditions are available on the website of the EVE and School of CERN Staff Association: http://nurseryschool.web.cern.ch. For further questions, please contact us by email at Summer.Camp@cern.ch.

  4. Epigenetic inactivation of inhibitor of differentiation 4 (Id4) correlates with prostate cancer

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Chinaranagari, Swathi; Patel, Divya; Carey, Jason; Chaudhary, Jaideep

    2012-01-01

    The inhibitor of DNA-binding (Id) proteins, Id1–4 are negative regulators of basic helix-loop-helix (bHLH) transcription factors. As key regulators of cell cycle and differentiation, expression of Id proteins are increasingly observed in many cancers and associated with aggressiveness of the disease. Of all the four Id proteins, the expression of Id1, Id2, and to a lesser extent, Id3 in prostate cancer and the underlying molecular mechanism is relatively well known. On the contrary, our previous results demonstrated that Id4 acts as a potential tumor suppressor in prostate cancer. In the present study, we extend these observations and demonstrate that Id4 is down-regulated in prostate cancer due to promoter hypermethylation. We used prostate cancer tissue microarrays to investigate Id4 expression. Methylation specific PCR on bisulfite treated DNA was used to determine methylation status of Id4 promoter in laser capture micro-dissected normal, stroma and prostate cancer regions. High Id4 expression was observed in the normal prostate epithelial cells. In prostate cancer, a stage-dependent decrease in Id4 expression was observed with majority of high grade cancers showing no Id4 expression. Furthermore, Id4 expression progressively decreased in prostate cancer cell line LNCaP and with no expression in androgen-insensitive LNCaP-C81 cell line. Conversely, Id4 promoter hypermethylation increased in LNCaP-C81 cells suggesting epigenetic silencing. In prostate cancer samples, loss of Id4 expression was also associated with promoter hypermethylation. Our results demonstrate loss of Id4 expression in prostate cancer due to promoter hypermethylation. The data strongly support the role of Id4 as a tumor suppressor

  5. Falla cardíaca aguda

    OpenAIRE

    Sénior Sánchez, Juan Manuel; Gándara Ricardo, Jairo Alfonso

    2015-01-01

    Se presenta el caso clínico de una mujer de 26 años de edad, que acudió al Hospital Universitario San Vicente Fundación (Medellín) con síntomas y signos de falla cardíaca aguda y diagnóstico previo de falla cardíaca crónica con fracción de expulsión disminuida, de origen no claro, tromboembolismo pulmonar y ataque cerebrovascular isquémico, sin modulación neurohormonal óptima. Ingresó a la institución con hallazgos clínicos de sobrecarga hídrica y baja perfusión tisular, con requerimiento de ...

  6. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  7. SUPPORT CARD FOR THE FORWARD SCT MODULE

    CERN Document Server

    Greenall, A

    2002-01-01

    Previously in the development and testing stage of ATLAS SCT Forward modules support cards have been used which interface the module to the DAQ by using only the Redundant inputs for the module configuration and the 'spying' of the ABCD Master chip(s) data. As module development has matured there is now a necessity to be able to test modules in the laboratory using also their Primary input/output data routes i.e. using the optical chips DORIC [1] and VDC [2] but without the need of optical fibres. A Forward Kapton Support Card, FKSC, has been developed so that both Primary and Redundant data routes can be used for module testing.

  8. Organic Functional Group Playing Card Deck

    Science.gov (United States)

    Welsh, Michael J.

    2003-04-01

    The recognition and identification of organic functional groups, while essential for chemistry and biology majors, is also very useful for non-science majors in the study of molecules in art and life. In order to make this task more palatable for the non-science major (art and communications students), the images of a traditional playing deck of cards (heart, spade, diamond, and club) have been replaced with four representations of common organic functional groups. The hierarchy rules for naming two groups in a molecule is loosely incorporated to represent the sequence (King, Queen, Jack, ?, Ace) of the deck. Students practice recognizing and identifying organic groups by playing simple card games of "Old Maid" and "Go Fish". To play games like "Poker" or "Gin", a student must not only recognize the functional groups, but also master a naming hierarchy for the organic groups.

  9. Sistem Pencatatan Kehadiran Berbasis Java Card

    Directory of Open Access Journals (Sweden)

    Lidya Octarina

    2010-12-01

    Full Text Available The purposes of this research are to prevent jockey in exams, reduce the occurrence of error in attendance record at practicum or exams, and reduce error in filling students' attendance status to the attendance system. Three main parts of software development method are used; analysis, design, and literature method. Current system survey, analysis of the survey findings, identify the information, and identifying system requirements are implemented in analysis method. The design method that is used in this research is Unified Modeling Language (UML. The using of attendance recording system that uses Java Card-based application makes students identity card has a new function as the tool to make attendance. Conclusion of the research has shown that it can prevent identity fraud, minimize the time wasted in attendance system, reduce the printing paper, and reduce tagging errors eligibility status exam of students. 

  10. ATM Card Cloning and Ethical Considerations.

    Science.gov (United States)

    Kaur, Paramjit; Krishan, Kewal; Sharma, Suresh K; Kanchan, Tanuj

    2018-05-01

    With the advent of modern technology, the way society handles and performs monetary transactions has changed tremendously. The world is moving swiftly towards the digital arena. The use of Automated Teller Machine (ATM) cards (credit and debit) has led to a "cash-less society" and has fostered digital payments and purchases. In addition to this, the trust and reliance of the society upon these small pieces of plastic, having numbers engraved upon them, has increased immensely over the last two decades. In the past few years, the number of ATM fraud cases has increased exponentially. With the money of the people shifting towards the digital platform, ATM skimming has become a problem that has eventually led to a global outcry. The present review discusses the serious repercussions of ATM card cloning and the associated privacy, ethical and legal concerns. The preventive measures which need to be taken and adopted by the government authorities to mitigate the problem have also been discussed.

  11. Diffusion Maps for Multimodal Registration

    Directory of Open Access Journals (Sweden)

    Gemma Piella

    2014-06-01

    Full Text Available Multimodal image registration is a difficult task, due to the significant intensity variations between the images. A common approach is to use sophisticated similarity measures, such as mutual information, that are robust to those intensity variations. However, these similarity measures are computationally expensive and, moreover, often fail to capture the geometry and the associated dynamics linked with the images. Another approach is the transformation of the images into a common space where modalities can be directly compared. Within this approach, we propose to register multimodal images by using diffusion maps to describe the geometric and spectral properties of the data. Through diffusion maps, the multimodal data is transformed into a new set of canonical coordinates that reflect its geometry uniformly across modalities, so that meaningful correspondences can be established between them. Images in this new representation can then be registered using a simple Euclidean distance as a similarity measure. Registration accuracy was evaluated on both real and simulated brain images with known ground-truth for both rigid and non-rigid registration. Results showed that the proposed approach achieved higher accuracy than the conventional approach using mutual information.

  12. Microprocessor Card for Cuban Series polarimeters Laserpol

    International Nuclear Information System (INIS)

    Arista Romeu, E.; Mora Mazorra, W.

    2012-01-01

    We present the design consists of a card based on a micro-processor 8-bit adds new software components and their basic living, which allow to deliver new services and expand the possibilities for use in other applications of the polarimeter LASERPOL series, as the polarimetric detection. Given the limitations of the original card it was necessary to introduce a series of changes that would allow to address new user requirements, and expand the possible applications of the instruments. This was done the expansion of the capacity of the EPROM and RAM memory, the decoder circuit was implemented memory map using a programmable integrated circuit, and introduced a real time clock with nonvolatile RAM, these features are exploited to the introduction of new features such as the realization of the polarimeter calibration by the user from a sample pattern or a calibration pattern used as a reference, and the incorporation of the time and date to the reports of measurements required industry for quality control processes. Card that is achieved along with the rest of the components is compatible with polarimeters LASERPOL 101M Series, 3M and LP4, pin to pin, which facilitates their incorporation into the polarimeters in operation in the industry 'in situ' replacement cards from previous models, allowing to extend the possibilities of statistical processing, precision and accuracy of the instruments. Improved measurements in the industry, resulting in significant savings by elimination of losses in production and raw materials. The improved response speed of reading the polarimeters LASERPOL Use and polarimetric detectors. (Author)

  13. THE CARD - CURRENCY WITH AND WITHOUT CASH

    Directory of Open Access Journals (Sweden)

    Nicoara Mihaela

    2012-12-01

    Full Text Available Use by individuals and businesses resulting in reduced cash cards in circulation, the corresponding increase in transfer payments and payments accounts also limit exchange risks and make effective use of currency. As a result, we have the effect of reducing cash in circulation. These advantages are also available for businesses and for banks and leads to favorable effects on import-export business. Following this, banks can diversify our products, so to meet customers' new products.

  14. 16 Cards to Get Into Computer Organization

    OpenAIRE

    Tabik, Siham; Romero, Luis F.

    2014-01-01

    This paper presents a novel educative activity for teaching computer architecture fundamentals. This activity is actually a game that uses 16 cards and involves about twenty active participant students. Executing this activity in the fi rst class of the course allows the studentin only 45 minutes to acquire the fundamental concepts of computer organization. The results of the surveys that evaluate the proposed activity together with the grades obtained by the students at the end of course...

  15. Data mining teaching throughout cards game competition

    OpenAIRE

    Antoñanzas-Torres, Javier; Urraca, Ruben; Sodupe-Ortega, Enrique; Martínez-de-Pison, Francisco; Pernía-Espinoza, Alpha

    2015-01-01

    [EN] Data-mining techniques and statistical metrics learning can be complicated because of the complexity and overwhelming nature of this field. In this paper a class competition to improve learning of designing Decision Support Systems (DSS) by playing a classic cards game named "Copo" is proposed. The fact that this game is based on a probabilistic problem and that different solutions can be obtained represents a very typical kind of problem in the field of engineering and compu...

  16. Co-branding of payment cards

    OpenAIRE

    Přikryl, Jiří

    2012-01-01

    The bachelor thesis deals with possibilities and use of co-branding within the financial institutions. It mainly focuses on co-branding payment cards aiming both, the analysis of the current situation on the market for these products in the Czech Republic as well as the outline of their new usage opportunities. The theoretical part defines not only the basic concepts of the branding phenomenon but also more deeply characterizes its part called co-branding. The paper then offers fundamental in...

  17. Repeated extraction of DNA from FTA cards

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Ferrero, Laura; Børsting, Claus

    2011-01-01

    Extraction of DNA using magnetic bead based techniques on automated DNA extraction instruments provides a fast, reliable and reproducible method for DNA extraction from various matrices. However, the yield of extracted DNA from FTA-cards is typically low. Here, we demonstrate that it is possible...... to repeatedly extract DNA from the processed FTA-disk. The method increases the yield from the nanogram range to the microgram range....

  18. Victoria's review of registration for health practitioners.

    Science.gov (United States)

    Scotts, H; Carter, M

    1988-01-01

    This article discusses some of the issues raised in the Interim Report of the current Review of Registration of Health Practitioners being conducted for the Victorian Health Department. The Report attempts to develop the framework in which the registration Boards will operate as part of a cohesive registration system. It proposed a mechanism and criteria for the registration of new groups as well as principles which can be applied to the ongoing review of each existing Board. The Review takes the perspective that registration of health practitioners carries with it both advantages and disadvantages for the general community. Under the proposed new system the controls exercised over health care providers by Registration Boards would be evaluated on the basis of to what extent the benefits to the public outweighed the potential costs. It is in this context that the Report addresses issues such as consumer complaints handling, registration of individual practitioners and controls over professional advertising and other business practices.

  19. The manuscript of Kartoteka (Card Index

    Directory of Open Access Journals (Sweden)

    Zbigniew Władysław Solski

    2009-01-01

    Full Text Available At the beginning of the 70s Tadeusz Różewicz presented the manuscript of Card Index to Professor Józef Kelera. It might have stayed a secret of friendship of the dramatist and the critic, however, Różewicz revealed the initials of his friend when in a commenatry to the play, he posed a question, whether there was a full stop after the last word in the manuscript or not? Posing this question, the author claimed the integrality of his masterpiece which was threatened by the widespread interpretations of Card Index as a play of a loose and dispersed structure. Appreciating the value of this question, I turned to Professor Kelera. This way I have had an access to the autograph of the play. In this manuscript has been preserved the play from before its final editing, which its author must surely have made during typing the text. Handwritten notes contain two unknown versions of the play with fragments which would not have been passed by the censors in the then Polish People’s Republic. In the reading of the manuscript the functions of the word and its graphic shape appeared of equal importance, so this version of Card Index can be recognised as a masterpiece of literature.

  20. NOD1CARD Might Be Using Multiple Interfaces for RIP2-Mediated CARD-CARD Interaction: Insights from Molecular Dynamics Simulation.

    Directory of Open Access Journals (Sweden)

    Jitendra Maharana

    Full Text Available The nucleotide-binding and oligomerization domain (NOD-containing protein 1 (NOD1 plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2 for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2 helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs. The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface, respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes.

  1. Determination of local chromatin composition by CasID.

    Science.gov (United States)

    Schmidtmann, Elisabeth; Anton, Tobias; Rombaut, Pascaline; Herzog, Franz; Leonhardt, Heinrich

    2016-09-02

    Chromatin structure and function are determined by a plethora of proteins whose genome-wide distribution is typically assessed by immunoprecipitation (ChIP). Here, we developed a novel tool to investigate the local chromatin environment at specific DNA sequences. We combined the programmable DNA binding of dCas9 with the promiscuous biotin ligase BirA* (CasID) to biotinylate proteins in the direct vicinity of specific loci. Subsequent streptavidin-mediated precipitation and mass spectrometry identified both known and previously unknown chromatin factors associated with repetitive telomeric, major satellite and minor satellite DNA. With super-resolution microscopy, we confirmed the localization of the putative transcription factor ZNF512 at chromocenters. The versatility of CasID facilitates the systematic elucidation of functional protein complexes and locus-specific chromatin composition.

  2. Zircaloy cladding ID/OD oxidation studies. Final report

    International Nuclear Information System (INIS)

    Westerman, R.E.; Hesson, G.M.

    1977-11-01

    The ID/OD oxide ratio that forms on Zircaloy tubing at temperatures relevant to postulated LOCA conditions was measured as a function of time, temperature, and distance from the rupture. The average ratio at the rupture position was less than unity, and decreased with decreasing test time and increasing distance from the point of rupture. The maximum observed ID/OD oxide ratio was 1.4. Ratios in excess of unity were typically found to be a consequence of the OD oxide being thinner than would have been anticipated from the nominal test conditions. Confirmatory data were also obtained on the isothermal oxidation kinetics of Zircaloy. These data are in good agreement with those obtained by other investigators and confirm the conservative nature of the Baker-Just equation that is required for use in licensing calculations

  3. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  4. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  5. ID based cryptography for secure cloud data storage

    OpenAIRE

    Kaaniche , Nesrine; Boudguiga , Aymen; Laurent , Maryline

    2013-01-01

    International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it offers controlled data access and sharing among users, so that unauthorized us...

  6. Guinea pig ID-like families of SINEs.

    Science.gov (United States)

    Kass, David H; Schaetz, Brian A; Beitler, Lindsey; Bonney, Kevin M; Jamison, Nicole; Wiesner, Cathy

    2009-05-01

    Previous studies have indicated a paucity of SINEs within the genomes of the guinea pig and nutria, representatives of the Hystricognathi suborder of rodents. More recent work has shown that the guinea pig genome contains a large number of B1 elements, expanding to various levels among different rodents. In this work we utilized A-B PCR and screened GenBank with sequences from isolated clones to identify potentially uncharacterized SINEs within the guinea pig genome, and identified numerous sequences with a high degree of similarity (>92%) specific to the guinea pig. The presence of A-tails and flanking direct repeats associated with these sequences supported the identification of a full-length SINE, with a consensus sequence notably distinct from other rodent SINEs. Although most similar to the ID SINE, it clearly was not derived from the known ID master gene (BC1), hence we refer to this element as guinea pig ID-like (GPIDL). Using the consensus to screen the guinea pig genomic database (Assembly CavPor2) with Ensembl BlastView, we estimated at least 100,000 copies, which contrasts markedly to just over 100 copies of ID elements. Additionally we provided evidence of recent integrations of GPIDL as two of seven analyzed conserved GPIDL-containing loci demonstrated presence/absence variants in Cavia porcellus and C. aperea. Using intra-IDL PCR and sequence analyses we also provide evidence that GPIDL is derived from a hystricognath-specific SINE family. These results demonstrate that this SINE family continues to contribute to the dynamics of genomes of hystricognath rodents.

  7. ID'ing innate and innate-like lymphoid cells.

    Science.gov (United States)

    Verykokakis, Mihalis; Zook, Erin C; Kee, Barbara L

    2014-09-01

    The immune system can be divided into innate and adaptive components that differ in their rate and mode of cellular activation, with innate immune cells being the first responders to invading pathogens. Recent advances in the identification and characterization of innate lymphoid cells have revealed reiterative developmental programs that result in cells with effector fates that parallel those of adaptive lymphoid cells and are tailored to effectively eliminate a broad spectrum of pathogenic challenges. However, activation of these cells can also be associated with pathologies such as autoimmune disease. One major distinction between innate and adaptive immune system cells is the constitutive expression of ID proteins in the former and inducible expression in the latter. ID proteins function as antagonists of the E protein transcription factors that play critical roles in lymphoid specification as well as B- and T-lymphocyte development. In this review, we examine the transcriptional mechanisms controlling the development of innate lymphocytes, including natural killer cells and the recently identified innate lymphoid cells (ILC1, ILC2, and ILC3), and innate-like lymphocytes, including natural killer T cells, with an emphasis on the known requirements for the ID proteins. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. On the use of OSL of wire-bond chip card modules for retrospective and accident dosimetry

    Energy Technology Data Exchange (ETDEWEB)

    Woda, Clemens [Helmholtz Zentrum Muenchen - German Research Centre for Environmental Health, Institute of Radiation Protection, Ingolstaedter Landstrasse 1, D-85764 Neuherberg (Germany)], E-mail: clemens.woda@helmholtz-muenchen.de; Spoettl, Thomas [Infineon Technologies AG, Wernerwerkstrasse 1, D-93049 Regensburg (Germany)

    2009-05-15

    The potential of optically stimulated luminescence of wire-bond chip card modules, used in health insurance, ID, cash and credit cards for retrospective and accident dosimetry is investigated. Chip card modules obtained directly from the producer, using a widely spread UV-cured epoxy product for encapsulation, are used as basis for the study. The radiation sensitivity is due to silica grains added to the epoxy for controlling the thixotropic properties. Luminescence properties are complex due to the presumed thermo-optical release of electrons from the epoxy and transfer into the silica. Best results and highest sensitivity are obtained by using no or only low preheat treatments. A high degree of fading of the OSL signal during storage at room temperature is observed, which is tentatively explained by the superposition of thermal decay of shallow OSL traps and athermal (anomalous) decay of deeper OSL traps. The dose response of the OSL signal shows exponentially saturating behaviour, with saturation doses of 77 Gy or 9.6 Gy, depending on pretreatment. Dose recovery tests show that given doses can be recovered within a deviation of {+-}14%, if measured signals are corrected for fading. The minimum detectable dose is estimated at {approx}3 mGy, {approx}10 mGy and {approx}20 mGy for readouts immediately, 1 day and 10 days after exposure, respectively.

  9. On the use of OSL of wire-bond chip card modules for retrospective and accident dosimetry

    International Nuclear Information System (INIS)

    Woda, Clemens; Spoettl, Thomas

    2009-01-01

    The potential of optically stimulated luminescence of wire-bond chip card modules, used in health insurance, ID, cash and credit cards for retrospective and accident dosimetry is investigated. Chip card modules obtained directly from the producer, using a widely spread UV-cured epoxy product for encapsulation, are used as basis for the study. The radiation sensitivity is due to silica grains added to the epoxy for controlling the thixotropic properties. Luminescence properties are complex due to the presumed thermo-optical release of electrons from the epoxy and transfer into the silica. Best results and highest sensitivity are obtained by using no or only low preheat treatments. A high degree of fading of the OSL signal during storage at room temperature is observed, which is tentatively explained by the superposition of thermal decay of shallow OSL traps and athermal (anomalous) decay of deeper OSL traps. The dose response of the OSL signal shows exponentially saturating behaviour, with saturation doses of 77 Gy or 9.6 Gy, depending on pretreatment. Dose recovery tests show that given doses can be recovered within a deviation of ±14%, if measured signals are corrected for fading. The minimum detectable dose is estimated at ∼3 mGy, ∼10 mGy and ∼20 mGy for readouts immediately, 1 day and 10 days after exposure, respectively.

  10. Internal validation of the RapidHIT® ID system.

    Science.gov (United States)

    Wiley, Rachel; Sage, Kelly; LaRue, Bobby; Budowle, Bruce

    2017-11-01

    Traditionally, forensic DNA analysis has required highly skilled forensic geneticists in a dedicated laboratory to generate short tandem repeat (STR) profiles. STR profiles are routinely used either to associate or exclude potential donors of forensic biological evidence. The typing of forensic reference samples has become more demanding, especially with the requirement in some jurisdictions to DNA profile arrestees. The Rapid DNA (RDNA) platform, the RapidHIT ® ID (IntegenX ® , Pleasanton, CA), is a fully automated system capable of processing reference samples in approximately 90min with minimal human intervention. Thus, the RapidHIT ID instrument can be deployed to non-laboratory environments (e.g., booking stations) and run by trained atypical personnel such as law enforcement. In order to implement the RapidHIT ID platform, validation studies are needed to define the performance and limitations of the system. Internal validation studies were undertaken with four early-production RapidHIT ID units. Reliable and concordant STR profiles were obtained from reference buccal swabs. Throughout the study, no contamination was observed. The overall first-pass success rate with an "expert-like system" was 72%, which is comparable to another current RDNA platform commercially available. The system's second-pass success rate (involving manual interpretation on first-pass inconclusive results) increased to 90%. Inhibitors (i.e., coffee, smoking tobacco, and chewing tobacco) did not appear to affect typing by the instrument system; however, substrate (i.e., swab type) did impact typing success. Additionally, one desirable feature not available with other Rapid systems is that in the event of a system failed run, a swab can be recovered and subsequently re-analyzed in a new sample cartridge. Therefore, rarely should additional sampling or swab consumption be necessary. The RapidHIT ID system is a robust and reliable tool capable of generating complete STR profiles within

  11. 75 FR 26754 - Pesticide Products; Registration Applications

    Science.gov (United States)

    2010-05-12

    .../Use: End-use/ Terrestrial Non-food Crops: Landscape ornamentals (including non- bearing fruit trees..., strawberry, and tree nut group. Docket ID Number: EPA-HQ-OPP-2010-0349. New Active Ingredient: Penthiopyrad..., stone fruit group, strawberry, and tree nut group. Docket ID Number: EPA-HQ-OPP-2010-0349. New Active...

  12. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  13. Australian healthcare: a smart card for a clever country.

    Science.gov (United States)

    Morris, S; Cooper, J; Bomba, D; Brankovic, L; Miller, M; Pacheco, F

    1995-10-01

    In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone may contain the cardholders name and address. Access to the different zones depends on the level of security of the zone. The higher the security level the more restrictive the access method. Were smart cards adopted for the storage of medical histories it would change the form of medical information recorded, not merely convert paper files to electronic ones. Storage of an individual's medical history on a smart card raises important privacy issues. These privacy issues are discussed particularly as they relate to the Australian community.

  14. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  15. Credit card spending limit and personal finance: system dynamics approach

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2014-03-01

    Full Text Available Credit cards have become one of the major ways for conducting cashless transactions. However, they have a long term impact on the well being of their owner through the debt generated by credit card usage. Credit card issuers approve high credit limits to credit card owners, thereby influencing their credit burden. A system dynamics model has been used to model behavior of a credit card owner in different scenarios according to the size of a credit limit. Experiments with the model demonstrated that a higher credit limit approved on the credit card decreases the budget available for spending in the long run. This is a contribution toward the evaluation of action for credit limit control based on their consequences.

  16. ID3 contributes to cerebrospinal fluid seeding and poor prognosis in medulloblastoma

    International Nuclear Information System (INIS)

    Phi, Ji Hoon; Choi, Seung Ah; Lim, Sang-Hee; Lee, Joongyub; Wang, Kyu-Chang; Park, Sung-Hye; Kim, Seung-Ki

    2013-01-01

    The inhibitor of differentiation (ID) genes have been implicated as promoters of tumor progression and metastasis in many human cancers. The current study investigated the expression and functional roles of ID genes in seeding and prognosis of medulloblastoma. ID gene expression was screened in human medulloblastoma tissues. Knockdown of ID3 gene was performed in medulloblastoma cells in vitro. The expression of metastasis-related genes after ID3 knockdown was assessed. The effect of ID3 knockdown on tumor seeding was observed in an animal model in vivo. The survival of medulloblastoma patients was plotted according to the ID3 expression levels. Significantly higher ID3 expression was observed in medulloblastoma with cerebrospinal fluid seeding than tumors without seeding. Knockdown of ID3 decreased proliferation, increased apoptosis, and suppressed the migration of D283 medulloblastoma cells in vitro. In a seeding model of medulloblastoma, ID3 knockdown in vivo with shRNA inhibited the growth of primary tumors, prevented the development of leptomeningeal seeding, and prolonged animal survival. High ID3 expression was associated with shorter survival of medulloblastoma patients, especially in Group 4 medulloblastomas. High ID3 expression is associated with medullolbastoma seeding and is a poor prognostic factor, especially in patients with Group 4 tumors. ID3 may represent the metastatic/ aggressive phenotype of a subgroup of medulloblastoma

  17. Registration Day-Camp 2016

    CERN Multimedia

    Nursery School

    2016-01-01

    Reminder Registration for the CERN Staff Association Day-camp are open for children from 4 to 6 years old More information on the website: http://nurseryschool.web.cern.ch/. The day-camp is open to all children. An inscription per week is proposed, cost 480.-CHF/week, lunch included The camp will be open weeks 27, 28, 29 and 30, from 8:30 am to 5:30 pm. For further questions, thanks you for contacting us by email at Summer.Camp@cern.ch.

  18. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  19. Designing minimum data sets of health smart card system

    OpenAIRE

    Mohtaram Nematollahi

    2014-01-01

    Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s ...

  20. The design and development of a multilayer RF circuit card

    OpenAIRE

    Ferro, John Francis

    1991-01-01

    The goal of this project was to design an airborne radio frequency circuit card that was very light weight, occupied a small volume, and operated from 20 Mhz to 1500 Mhz. The circuit card being reported on is called an RF multicoupler, and is one of two cards used in a radio frequency distribution unit (RFD). This unit interfaces a large number of receivers to various antennas. In the past this type of circuitry was done by cascading discrete connectorized RF compo...

  1. Modeling intelligent agent beliefs in a card game scenario

    Science.gov (United States)

    Gołuński, Marcel; Tomanek, Roman; WÄ siewicz, Piotr

    In this paper we explore the problem of intelligent agent beliefs. We model agent beliefs using multimodal logics of belief, KD45(m) system implemented as a directed graph depicting Kripke semantics, precisely. We present a card game engine application which allows multiple agents to connect to a given game session and play the card game. As an example simplified version of popular Saboteur card game is used. Implementation was done in Java language using following libraries and applications: Apache Mina, LWJGL.

  2. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  3. Design and implementation of a smart card based billing system for ...

    African Journals Online (AJOL)

    A smart card based billing system for petroleum dispenser is just one of the many ways in which smart cards can be employed to make commerce efficient. It incorporates the use of smart card as its legal tender and a smart card reader embedded into the filling station dispenser design. The smart card reader processes the ...

  4. Determinants of debit cards acceptance: An empirical investigation

    International Nuclear Information System (INIS)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar; Bakri, Mohamed Hariri; Zulkepli, Jafri

    2014-01-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry

  5. Determinants of debit cards acceptance: An empirical investigation

    Energy Technology Data Exchange (ETDEWEB)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar [Faculty of Business and Management, Universiti Teknologi MARA, Melaka 75300 (Malaysia); Bakri, Mohamed Hariri [Faculty of Technology Management And Technopreneurship, Universiti Teknikal Malaysia, Melaka 76100 (Malaysia); Zulkepli, Jafri [Faculty of Quantitative Science, Universiti Utara Malaysia, Sintok Kedah (Malaysia)

    2014-12-04

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  6. Introduction of card payment system in a merchant company

    OpenAIRE

    Štrukelj, Anja

    2015-01-01

    The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...

  7. Volume of Requests for Internet Medicare Replacement Cards

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2008 onwards for Internet Medicare Replacement Card. The dataset includes only...

  8. Determinants of debit cards acceptance: An empirical investigation

    Science.gov (United States)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  9. Impact of Closed-Loop Gift Card Promotions By Businesses

    Directory of Open Access Journals (Sweden)

    Kathryn W. Ernstberger

    2013-07-01

    Full Text Available At their inception, gift cards were sold by businesses to customers to give as gifts to others. More recently, gift cards are beingused strategically by businesses to manage and transform their relationships with customers. Of particular interest here is the closed-loop gift card that can only be redeemed at the business whose name is on it. This analysis discusses the impact of closed-loop gift card promotions and evaluates the impact of these promotions ontotal spending, lift and redemption rates.

  10. WWW + smart card: towards a mobile health care management system.

    Science.gov (United States)

    Chan, A T

    2000-07-01

    This paper highlights the benefits of combining the World Wide Web and smart card technologies to support a highly mobile health management framework. In particular, we describe an approach using the SmartCard-Web Gateway Interface (SGI) as a common interface to communicate and access the medical records residing in a smart card. Importantly, by employing HTTP as the baseline protocol to access information on the smart card, SGI promotes the use of de facto standard web browsers as the common client user interface. The initial implementation of the framework has demonstrated the feasibility of the concept in facilitating a truly mobile access of patient's medical records based on SGI.

  11. A comparison of death recording by health centres and civil registration in South Africans receiving antiretroviral treatment.

    Science.gov (United States)

    Johnson, Leigh F; Dorrington, Rob E; Laubscher, Ria; Hoffmann, Christopher J; Wood, Robin; Fox, Matthew P; Cornell, Morna; Schomaker, Michael; Prozesky, Hans; Tanser, Frank; Davies, Mary-Ann; Boulle, Andrew

    2015-01-01

    There is uncertainty regarding the completeness of death recording by civil registration and by health centres in South Africa. This paper aims to compare death recording by the two systems, in cohorts of South African patients receiving antiretroviral treatment (ART). Completeness of death recording was estimated using a capture-recapture approach. Six ART programmes linked their patient record systems to the vital registration system using civil identity document (ID) numbers and provided data comparing the outcomes recorded in patient files and in the vital registration. Patients were excluded if they had missing/invalid IDs or had transferred to other ART programmes. After exclusions, 91,548 patient records were included. Of deaths recorded in patients files after 2003, 94.0% (95% CI: 93.3-94.6%) were recorded by civil registration, with completeness being significantly higher in urban areas, older adults and females. Of deaths recorded by civil registration after 2003, only 35.0% (95% CI: 34.2-35.8%) were recorded in patient files, with this proportion dropping from 60% in 2004-2005 to 30% in 2010 and subsequent years. Recording of deaths in patient files was significantly higher in children and in locations within 50 km of the health centre. When the information from the two systems was combined, an estimated 96.2% of all deaths were recorded (93.5% in children and 96.2% in adults). South Africa's civil registration system has achieved a high level of completeness in the recording of mortality. However, the fraction of deaths recorded by health centres is low and information from patient records is insufficient by itself to evaluate levels and predictors of ART patient mortality. Previously documented improvements in ART mortality over time may be biased if based only on data from patient records.

  12. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-05-01

    ...) Global Positioning System (GPS) and the Instrument Landing System (ILS) or Localizer (LOC) standard... the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls Joslin Field-Magic Valley Regional...

  13. 78 FR 40382 - Modification of Class D and E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-07-05

    ... using the Navigation (RNAV) Global Positioning System (GPS) and the Instrument Landing System (ILS) or... or more above the surface of the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls...

  14. 77 FR 68065 - Amendment of Class D and Class E Airspace; Lewiston, ID

    Science.gov (United States)

    2012-11-15

    ... Measuring Equipment (VOR/ DME), and the Lewiston-Nez Perce Instrument Landing System (ILS) Localizer... feet or more above the surface of the earth. * * * * * ANM ID E5 Lewiston, ID [Modified] Lewiston-Nez...

  15. ID.alistic: identificatie met een touch voor de patiënt

    NARCIS (Netherlands)

    M. Wilschut; M. Zijlmans; Dr. L.S.G.L Wauben

    2017-01-01

    ID.alistic is een conceptuele patiëntidentificatie methode (middels een vingerafdrukscanner), ter vervanging van het polsbandjessysteem van het Albert Schweitzer ziekenhuis (ASz) dialysecentrum. Dit onderzoek bepaalt de implementeerbaarheid van ID.alistic binnen het dialysecentrum door

  16. Ekspert : mobiil-ID kasutamine valimistel turvariske ei tekita / Holger Roonemaa

    Index Scriptorium Estoniae

    Roonemaa, Holger

    2008-01-01

    E-valimiste projektijuhi Taavi Martensi väitel pole põhjust kahelda mobiil-ID turvalisuses. Valimiskomisjoni esimehe Heiki Sibula meelest peaks m-ID kaarte välja andma kodakondsus- ja migratsiooniamet

  17. 78 FR 773 - Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS...

    Science.gov (United States)

    2013-01-04

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... Assistance (TAA) applicable to workers and former workers of Hartford Financial Services Group, Inc., Commercial/ Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford...

  18. The cadastral registration of the property right

    Directory of Open Access Journals (Sweden)

    D.-G. IONAȘ

    2017-12-01

    Full Text Available Real rights are subjective patrimonial rights which provide the holder with the right to directly exercise certain prerogatives over a determined good. Real rights over immobile goods, registered in the cadastral register are called tabular rights. Cadastral registration is that certain form of registration by which a real right over an immobile good is acquired, changed or ended, from the time de registration request is filed. At this time, registration in the cadastral register provides the opposability effect, as the constitutive effect is suspended until the cadastral works are finalized and new cadastral registers are created for each administrative unit.

  19. People with ID as interviewers and co-researchers: experiences and reflection.

    NARCIS (Netherlands)

    Lieshout, H. van

    2012-01-01

    Aim: To share the experience of working with people with intellectual disabilities (ID) as interviewers in a qualitative study about community participation of people with ID. We reflect on two perspectives: the interviewers and the researchers. Method: Eighteen people with ID were interviewed by

  20. 78 FR 8596 - Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS...

    Science.gov (United States)

    2013-02-06

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... workers and former workers of Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford, Connecticut (The Hartford-IDS...

  1. Applying risk management strategies to strengthen an IDS's investment policy.

    Science.gov (United States)

    Fine, R P

    1998-11-01

    The increased financial risk that not-for-profit integrated delivery systems have assumed to function under managed care has required them to become increasingly reliant on income and gains from their investment portfolios. This reliance underscores the need for these organizations to take steps to effectively manage their investment risk. Not-for-profit IDSs should establish a systematic approach to investment risk management that is based on maintaining a sound fiduciary infrastructure and having a clear understanding of risk exposures, the most important of which are policy and market risk. Applying reasonable and common-sense risk management strategies to investment policy will enhance an IDS's overall financial and competitive strength.

  2. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  3. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  4. Labelling IDS clusters by means of the silhouette index

    OpenAIRE

    Petrovic, Slovodan; Álvarez, Gonzalo; Orfila, Agustín; Carbó, Javier

    2006-01-01

    Proceeding of: IX Reunión Española sobre Criptología y Seguridad de la Información. Barcelona, 2006 One of the most difficult problems in the design of an anomaly based intrusion detection system (IDS) that uses clustering is that of labelling the ob- tained clusters, i.e. determining which of them correspond to ”good” behaviour on the network/host and which to ”bad” behaviour. In this paper, a new clusters’ labelling strategy, which makes use of the Silhouette clustering quality index is ...

  5. Predicting Students’ Performance using Modified ID3 Algorithm

    OpenAIRE

    Ramanathan L; Saksham Dhanda; Suresh Kumar D

    2013-01-01

    The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain) as well as by giving weights to each attribute at every...

  6. Performance evaluation of 2D image registration algorithms with the numeric image registration and comparison platform

    International Nuclear Information System (INIS)

    Gerganov, G.; Kuvandjiev, V.; Dimitrova, I.; Mitev, K.; Kawrakow, I.

    2012-01-01

    The objective of this work is to present the capabilities of the NUMERICS web platform for evaluation of the performance of image registration algorithms. The NUMERICS platform is a web accessible tool which provides access to dedicated numerical algorithms for registration and comparison of medical images (http://numerics.phys.uni-sofia.bg). The platform allows comparison of noisy medical images by means of different types of image comparison algorithms, which are based on statistical tests for outliers. The platform also allows 2D image registration with different techniques like Elastic Thin-Plate Spline registration, registration based on rigid transformations, affine transformations, as well as non-rigid image registration based on Mobius transformations. In this work we demonstrate how the platform can be used as a tool for evaluation of the quality of the image registration process. We demonstrate performance evaluation of a deformable image registration technique based on Mobius transformations. The transformations are applied with appropriate cost functions like: Mutual information, Correlation coefficient, Sum of Squared Differences. The accent is on the results provided by the platform to the user and their interpretation in the context of the performance evaluation of 2D image registration. The NUMERICS image registration and image comparison platform provides detailed statistical information about submitted image registration jobs and can be used to perform quantitative evaluation of the performance of different image registration techniques. (authors)

  7. 77 FR 66920 - Registration of Claims to Copyright: Group Registration of Serial Issues Filed Electronically

    Science.gov (United States)

    2012-11-08

    ... registered on a single application and for a single fee. The group registration privilege is contingent upon... was limited to basic registrations, i.e., claims in single works, while the capacity to process online... of related serials. Revisions to the electronic registration system will upgrade the capacity of the...

  8. Efficiency at Sorting Cards in Compressed Air

    Science.gov (United States)

    Poulton, E. C.; Catton, M. J.; Carpenter, A.

    1964-01-01

    At a site where compressed air was being used in the construction of a tunnel, 34 men sorted cards twice, once at normal atmospheric pressure and once at 3½, 2½, or 2 atmospheres absolute pressure. An additional six men sorted cards twice at normal atmospheric pressure. When the task was carried out for the first time, all the groups of men performing at raised pressure were found to yield a reliably greater proportion of very slow responses than the group of men performing at normal pressure. There was reliably more variability in timing at 3½ and 2½ atmospheres absolute than at normal pressure. At 3½ atmospheres absolute the average performance was also reliably slower. When the task was carried out for the second time, exposure to 3½ atmospheres absolute pressure had no reliable effect. Thus compressed air affected performance only while the task was being learnt; it had little effect after practice. No reliable differences were found related to age, to length of experience in compressed air, or to the duration of the exposure to compressed air, which was never less than 10 minutes at 3½ atmospheres absolute pressure. PMID:14180485

  9. Central research registration at Technical University of Denmark (DTU)

    DEFF Research Database (Denmark)

    Sand, Ane Ahrenkiel

    Some five years ago, DTU switched from decentralized research registration, where researchers entered their publications into the DTU research repository themselves to centralized research registration, whereby library staff upload academic publications to the repository on behalf...... up the registration team, the configuration of the repository platform (Pure), the registration workflow and last but not least the results since DTU switched to centralized research registration....

  10. Central Research Registration at Technical University of Denmark (DTU)

    DEFF Research Database (Denmark)

    Sand, Ane Ahrenkiel

    Some five years ago, DTU switched from decentralized research registration, where researchers entered their publications into the DTU research repository themselves to centralized research registration, whereby library staff upload academic publications to the repository on behalf...... up the registration team, the configuration of the repository platform (Pure), the registration workflow and last but not least the results since DTU switched to centralized research registration....

  11. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  12. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  13. Semiautomated Multimodal Breast Image Registration

    Directory of Open Access Journals (Sweden)

    Charlotte Curtis

    2012-01-01

    However, due to the highly deformable nature of breast tissues, comparison of 3D and 2D modalities is a challenge. To enable this comparison, a registration technique was developed to map features from 2D mammograms to locations in the 3D image space. This technique was developed and tested using magnetic resonance (MR images as a reference 3D modality, as MR breast imaging is an established technique in clinical practice. The algorithm was validated using a numerical phantom then successfully tested on twenty-four image pairs. Dice's coefficient was used to measure the external goodness of fit, resulting in an excellent overall average of 0.94. Internal agreement was evaluated by examining internal features in consultation with a radiologist, and subjective assessment concludes that reasonable alignment was achieved.

  14. Registration Day-Camp 2016

    CERN Multimedia

    Nursery School

    2016-01-01

    Registration for the CERN SA Day-camp are open for children from 4 to 6 years old From March 14 to 25 for children already enrolled in CERN SA EVE and School From April 4 to 15 for the children of CERN members of the personnel (MP) From April 18 for other children More information on the website: http://nurseryschool.web.cern.ch/. The day-camp is open to all children. An inscription per week is proposed, cost 480.-CHF/week, lunch included The camp will be open weeks 27, 28, 29 and 30, from 8:30 am to 5:30 pm. For further questions, thanks you for contacting us by email at Summer.Camp@cern.ch.

  15. Towards testability in smart card operating system design

    NARCIS (Netherlands)

    Hartel, Pieter H.; Cordonnier, V.; de Jong, Eduard K.; Quisquater, J.J.

    1994-01-01

    The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the

  16. Concretization and animation of Finite Automata with c-cards

    DEFF Research Database (Denmark)

    Valente, Andrea

    2004-01-01

    to classes of 10 to 12 years old, and in general to students with a limited mathematical background. Our approach builds on {\\em computational cards} (or c-cards), a project aiming at scaling-down the learning complexity of computer science core contents, by presenting symbol manipulation via a t...

  17. Predicting credit card behavior: a study in neuroeconomics.

    Science.gov (United States)

    Spinella, Marcello; Lester, David; Yang, Bijou

    2005-06-01

    In a sample of 139 community residents, credit card ownership was associated with age, sex, income, attitudes toward credit cards and toward money, and scores on a verbal measure of prefrontal cortical dysfunction, supporting a neuroeconomic approach to economic decision-making.

  18. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  19. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Science.gov (United States)

    2010-04-01

    ...; adding value. (i) After using the card described in Example 2, P arranges with A by telephone to have 30... EXCISE TAXES FACILITIES AND SERVICES EXCISE TAXES Communications § 49.4251-4 Prepaid telephone cards. (a... section provides rules for the application of the section 4251 tax to PTCs. (b) Definitions. The following...

  20. Developing efficient blinded attribute certificates on smart cards via pairings

    NARCIS (Netherlands)

    Batina, L.; Hoepman, J.H.; Jacobs, B.; Mostowski, W.; Vullers, P.

    2010-01-01

    This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified

  1. Mobile Payment Technology and Competitiveness In the Credit Card Chain

    OpenAIRE

    Martins, Guilherme Silveira; FGV-EAESP; Martins, Michele Esteves; FGV-EAESP; Di Serio, Luiz Carlos; FGV-EAESP; Csillag, João Mário; FGV-EAESP; Santos, Camila Aparecida; Freeddom Tecnologia e Serviços S.A.

    2013-01-01

    This paper discusses the value creation sources of Mobile Payment concept into the Credit Card Chain. A case-study was developed based on the Transaction Cost Theory, Value Chain Analysis, RB V, Schumpeterian Innovation, and Strategic Network Theory. The results illustrate the technology potential to modify the configuration of Credit Card chain.

  2. Medicine and ionizing radiation: help cards for risk analysis

    International Nuclear Information System (INIS)

    Gauron, C.

    2004-01-01

    Following an inquiry in Ile de France on radiation protection, a scientific committee associating several institutions and different experts has elaborated cards for help to risk analysis. A first series of this cards is published in this issue documents for the labour physician and will be next on Internet. the other fields of medical use will be covered in the future. (N.C.)

  3. 78 FR 17183 - Information Collection: Grey Towers Visitor Comment Card

    Science.gov (United States)

    2013-03-20

    ... DEPARTMENT OF AGRICULTURE Forest Service Information Collection: Grey Towers Visitor Comment Card... request: (1) An extension from the Office of Management and Budget; and (2) to merge the currently approved information collection 0596- 0222, ``Grey Towers Visitor Comment Card'' with 0596-0226, ``Forest...

  4. IR Cards: Inquiry-Based Introduction to Infrared Spectroscopy

    Science.gov (United States)

    Bennett, Jacqueline; Forster, Tabetha

    2010-01-01

    As infrared spectroscopy (IR) is frequently used in undergraduate organic chemistry courses, an inductive introduction to IR spectroscopy that uses index cards printed with spectra, structures, and chemical names is described. Groups of students are given an alphabetized deck of these "IR cards" to sort into functional groups. The students then…

  5. Principles for Instructional Stack Development in HyperCard.

    Science.gov (United States)

    McEneaney, John E.

    The purpose of this paper is to provide information about obtaining and using HyperCard stacks that introduce users to principles of stack development. The HyperCard stacks described are available for downloading free of charge from a server at Indiana University South Bend. Specific directions are given for stack use, with advice for beginners. A…

  6. Franchise Plan. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    domain could result in minimal benefits in comparison to the cost). b. Chose a domain analysis method that can take advantage of the well understood...agreement with CARDS that enumer- ates the range and level of services to be provided by CARDS and obtained from the franchisee . 3. shares a model-based

  7. Western North Carolina report card on forest sustainability

    Science.gov (United States)

    Susan Fox; Bill Jackson; Sarah Jackson; Gary Kauffmann; Mary Carol Koester; Robert Mera; Terry Seyden; Charles Van Sickle; Sealy Chipley; Jim Fox; Jeff Hicks; Matt Hutchins; Karin Lichtenstein; Kelsie Nolan; Todd Pierce; Beth Porter

    2011-01-01

    Western North Carolina encompasses 4.8 million acres of highly valued temperate forests. To help address future management and conservation decisions surrounding these resources, the report card evaluates environmental, social, and economic conditions in recent decades across an 18 county area. The report card describes the status of indicators of forest sustainability...

  8. 49 CFR 107.503 - Registration statement.

    Science.gov (United States)

    2010-10-01

    ... tank motor vehicles which the registrant intends to manufacture, assemble, repair, inspect, test or... this section, each person who repairs a cargo tank or cargo tank motor vehicle must submit a copy of... PROGRAM PROCEDURES Registration of Cargo Tank and Cargo Tank Motor Vehicle Manufacturers, Assemblers...

  9. 76 FR 27898 - Registration and Recordation Program

    Science.gov (United States)

    2011-05-13

    ... to reflect a reorganization that has moved the Recordation function from the Visual Arts and... function from the Visual Arts and Recordation Division of the Registration and Recordation Program to the... Visual Arts Division of the Registration and Recordation Program, has been renamed the Recordation...

  10. 27 CFR 25.112 - Dealer registration.

    Science.gov (United States)

    2010-04-01

    .... Every brewer who sells, or offers for sale, any alcohol product (distilled spirits, wines, or beer) fit... registration. Registration covers all sales from the same location, including sales of wine, spirits, or other... for making sales of wine or beer at the customer's place of business. Otherwise, a brewer who conducts...

  11. Deformable image registration using convolutional neural networks

    NARCIS (Netherlands)

    Eppenhof, Koen A.J.; Lafarge, Maxime W.; Moeskops, Pim; Veta, Mitko; Pluim, Josien P.W.

    2018-01-01

    Deformable image registration can be time-consuming and often needs extensive parameterization to perform well on a specific application. We present a step towards a registration framework based on a three-dimensional convolutional neural network. The network directly learns transformations between

  12. Tenure Security Reformand Electronic Registration: Exploring ...

    African Journals Online (AJOL)

    This paper examines the potential significance of updating registration practices in resolving some of the issues about tenure security in a transformative context. It deals with the importance of good governance in the context of land administration and considers its impact on intended reforms. Land registration practice as an ...

  13. 40 CFR 68.160 - Registration.

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.160 Registration. (a) The owner or operator shall... substances handled in covered processes. (b) The registration shall include the following data: (1...

  14. 32 CFR 636.9 - Registration requirement.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Registration requirement. 636.9 Section 636.9 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.9 Registration requirement. In...

  15. 32 CFR 636.8 - Registration policy.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Registration policy. 636.8 Section 636.8 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.8 Registration policy. In addition to th...

  16. Fast fluid registration of medical images

    DEFF Research Database (Denmark)

    Bro-Nielsen, Morten; Gramkow, Claus

    1996-01-01

    This paper offers a new fast algorithm for non-rigid viscous fluid registration of medical images that is at least an order of magnitude faster than the previous method by (Christensen et al., 1994). The core algorithm in the fluid registration method is based on a linear elastic deformation...

  17. 19 CFR 360.102 - Online registration.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Online registration. 360.102 Section 360.102... ANALYSIS SYSTEM § 360.102 Online registration. (a) In general. (1) Any importer, importing company, customs.... boxes will not be accepted. A user identification number will be issued within two business days...

  18. On combining algorithms for deformable image registration

    NARCIS (Netherlands)

    Muenzing, S.E.A.; Ginneken, van B.; Pluim, J.P.W.; Dawant, B.M.

    2012-01-01

    We propose a meta-algorithm for registration improvement by combining deformable image registrations (MetaReg). It is inspired by a well-established method from machine learning, the combination of classifiers. MetaReg consists of two main components: (1) A strategy for composing an improved

  19. THE BASIS OF THE MARKET REGULATION OF PAYMENT CARDS

    Directory of Open Access Journals (Sweden)

    Khetagurov G. V.

    2017-06-01

    Full Text Available The article is devoted to basics and the regulation problems of the modern payment cards market. In particular, it addresses the key participants in a payment system, which include the Central Bank, credit organizations, settlement and clearing centers. The paper explores the basic functions of the participants. The author analyzes approaches of card payment systems to development and implementation monitoring of standards and regulations relative to the technology: hardware and software, communication channels, etc. The article contains analysis of information exchange in the framework of payment cards market and specific features of the design and development of a payment infrastructure. It discusses the economic model of the payment cards market, which is based on commission payments. The paper describes the key fees. At the final stage of the study, the author examines the role of different global regulators in the payment card market, conducts an analysis of the foundations of the Russian legislation regulating this market.

  20. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  1. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  2. Mathematical card magic fifty-two new effects

    CERN Document Server

    Mulcahy, Colm

    2013-01-01

    Mathematical card effects offer both beginning and experienced magicians an opportunity to entertain with a minimum of props. Featuring mostly original creations, Mathematical Card Magic: Fifty-Two New Effects presents an entertaining look at new mathematically based card tricks. Each chapter contains four card effects, generally starting with simple applications of a particular mathematical principle and ending with more complex ones. Practice a handful of the introductory effects and, in no time, you'll establish your reputation as a "mathemagician." Delve a little deeper into each chapter and the mathematics gets more interesting. The author explains the mathematics as needed in an easy-to-follow way. He also provides additional details, background, and suggestions for further explorations.Suitable for recreational math buffs and amateur card lovers or as a text in a first-year seminar, this color book offers a diverse collection of new mathemagic principles and effects.

  3. Introducing Teamwork Challenges in Simulation Using Game Cards.

    Science.gov (United States)

    Chang, Todd P; Kwan, Karen Y; Liberman, Danica; Song, Eric; Dao, Eugene H; Chung, Dayun; Morton, Inge; Festekjian, Ara

    2015-08-01

    Poor teamwork and communication during resuscitations are linked to patient safety problems and poorer outcomes. We present a novel simulation-based educational intervention using game cards to introduce challenges in teamwork. This intervention uses sets of game cards that designate roles, limitations, or communication challenges designed to introduce common communication or teamwork problems. Game cards are designed to be applicable for any simulation-based scenario and are independent from patient physiology. In our example, participants were pediatric emergency medicine fellows undergoing simulation training for orientation. We describe the use of card sets in different scenarios with increasing teamwork challenge and difficulty. Both postscenario and summative debriefings were facilitated to allow participants to reflect on their performance and discover ways to apply their strategies to real resuscitations. In this article, we present our experience with the novel use of game cards to modify simulation scenarios to improve communication and teamwork skills.

  4. A Comparison of Card-sorting Analysis Methods

    DEFF Research Database (Denmark)

    Nawaz, Ather

    2012-01-01

    This study investigates how the choice of analysis method for card sorting studies affects the suggested information structure for websites. In the card sorting technique, a variety of methods are used to analyse the resulting data. The analysis of card sorting data helps user experience (UX......) designers to discover the patterns in how users make classifications and thus to develop an optimal, user-centred website structure. During analysis, the recurrence of patterns of classification between users influences the resulting website structure. However, the algorithm used in the analysis influences...... the recurrent patterns found and thus has consequences for the resulting website design. This paper draws an attention to the choice of card sorting analysis and techniques and shows how it impacts the results. The research focuses on how the same data for card sorting can lead to different website structures...

  5. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  6. Medical Image Registration and Surgery Simulation

    DEFF Research Database (Denmark)

    Bro-Nielsen, Morten

    1996-01-01

    This thesis explores the application of physical models in medical image registration and surgery simulation. The continuum models of elasticity and viscous fluids are described in detail, and this knowledge is used as a basis for most of the methods described here. Real-time deformable models......, and the use of selective matrix vector multiplication. Fluid medical image registration A new and faster algorithm for non-rigid registration using viscous fluid models is presented. This algorithm replaces the core part of the original algorithm with multi-resolution convolution using a new filter, which...... growth is also presented. Using medical knowledge about the growth processes of the mandibular bone, a registration algorithm for time sequence images of the mandible is developed. Since this registration algorithm models the actual development of the mandible, it is possible to simulate the development...

  7. Id1 represses osteoclast-dependent transcription and affects bone formation and hematopoiesis.

    Directory of Open Access Journals (Sweden)

    April S Chan

    2009-11-01

    Full Text Available The bone-bone marrow interface is an area of the bone marrow microenvironment in which both bone remodeling cells, osteoblasts and osteoclasts, and hematopoietic cells are anatomically juxtaposed. The close proximity of these cells naturally suggests that they interact with one another, but these interactions are just beginning to be characterized.An Id1(-/- mouse model was used to assess the role of Id1 in the bone marrow microenvironment. Micro-computed tomography and fracture tests showed that Id1(-/- mice have reduced bone mass and increased bone fragility, consistent with an osteoporotic phenotype. Osteoclastogenesis and pit formation assays revealed that loss of Id1 increased osteoclast differentiation and resorption activity, both in vivo and in vitro, suggesting a cell autonomous role for Id1 as a negative regulator of osteoclast differentiation. Examination by flow cytometry of the hematopoietic compartment of Id1(-/- mice showed an increase in myeloid differentiation. Additionally, we found increased expression of osteoclast genes, TRAP, Oscar, and CTSK in the Id1(-/- bone marrow microenvironment. Lastly, transplantation of wild-type bone marrow into Id1(-/- mice repressed TRAP, Oscar, and CTSK expression and activity and rescued the hematopoietic and bone phenotype in these mice.In conclusion, we demonstrate an osteoporotic phenotype in Id1(-/- mice and a mechanism for Id1 transcriptional control of osteoclast-associated genes. Our results identify Id1 as a principal player responsible for the dynamic cross-talk between bone and bone marrow hematopoietic cells.

  8. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site

    DEFF Research Database (Denmark)

    Babakhanyan, Anna; Leke, Rose G F; Salanti, Ali

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women natura...

  9. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  10. Cobacabana (control of balance by card-based navigation) : A card-based system for job shop control

    NARCIS (Netherlands)

    Land, M.J.

    Existing card-based production control systems such as Kanban are mostly dedicated to repetitive production environments. Cards-based systems for job shop control are lacking, while particularly this industry segment shows a need for simple control systems. This paper aims at filling the gap by

  11. Maxed out: The Relationship between Credit Card Debt, Credit Card Distress and Grade Point Averages for College Students

    Science.gov (United States)

    Smith, Temple Day

    2011-01-01

    Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…

  12. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    Science.gov (United States)

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  13. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    International Nuclear Information System (INIS)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep

    2016-01-01

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  14. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep, E-mail: jchaudhary@cau.edu

    2016-09-09

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  15. Radikal konservativ idédebat og højreautoritær fascination i Danmark, ca. 1928-1940

    DEFF Research Database (Denmark)

    Holm, Adam

    1999-01-01

    Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle......Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle...

  16. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  17. Superstrumps: the Card Game with a Mission

    Directory of Open Access Journals (Sweden)

    Syd Moore

    2016-02-01

    Full Text Available The artist interview in this dossier is an example of collaborative work between an artist and a writer. It is a showcase of how popular culture can be re-appropriated. The interviewees are the co-creators of the card game Superstrumps developed to address the issue of stereotyping of women. In the interview, they recount the process of creating the game involving other women from their local community. This exemplifies how a strategy for resisting and reclaiming identities undermined by negative labelling is developed. Their views are strongly shaped by their feminist principles. The interview acknowledges the complex nature of identities, the challenge of media representation and the symbiotic relationship between media and audiences is revealed.

  18. Improved catalyzed reporter deposition, iCARD.

    Science.gov (United States)

    Lohse, Jesper; Petersen, Kenneth Heesche; Woller, Nina Claire; Pedersen, Hans Christian; Skladtchikova, Galina; Jørgensen, Rikke Malene

    2014-06-18

    Novel reporters have been synthesized with extended hydrophilic linkers that in combination with polymerizing cross-linkers result in very efficient reporter deposition. By utilizing antibodies to stain HER2 proteins in a cell line model it is demonstrated that the method is highly specific and sensitive with virtually no background. The detection of HER2 proteins in tissue was used to visualize individual antigens as small dots visible in a microscope. Image analysis-assisted counting of fluorescent or colored dots allowed assessment of relative protein levels in tissue. Taken together, we have developed novel reporters that improve the CARD method allowing highly sensitive in situ detection of proteins in tissue. Our findings suggest that in situ protein quantification in biological samples can be performed by object recognition and enumeration of dots, rather than intensity-based fluorescent or colorimetric assays.

  19. Deformable Registration for Longitudinal Breast MRI Screening.

    Science.gov (United States)

    Mehrabian, Hatef; Richmond, Lara; Lu, Yingli; Martel, Anne L

    2018-04-13

    MRI screening of high-risk patients for breast cancer provides very high sensitivity, but with a high recall rate and negative biopsies. Comparing the current exam to prior exams reduces the number of follow-up procedures requested by radiologists. Such comparison, however, can be challenging due to the highly deformable nature of breast tissues. Automated co-registration of multiple scans has the potential to aid diagnosis by providing 3D images for side-by-side comparison and also for use in CAD systems. Although many deformable registration techniques exist, they generally have a large number of parameters that need to be optimized and validated for each new application. Here, we propose a framework for such optimization and also identify the optimal input parameter set for registration of 3D T 1 -weighted MRI of breast using Elastix, a widely used and freely available registration tool. A numerical simulation study was first conducted to model the breast tissue and its deformation through finite element (FE) modeling. This model generated the ground truth for evaluating the registration accuracy by providing the deformation of each voxel in the breast volume. An exhaustive search was performed over various values of 7 registration parameters (4050 different combinations of parameters were assessed) and the optimum parameter set was determined. This study showed that there was a large variation in the registration accuracy of different parameter sets ranging from 0.29 mm to 2.50 mm in median registration error and 3.71 mm to 8.90 mm in 95 percentile of the registration error. Mean registration errors of 0.32 mm, 0.29 mm, and 0.30 mm and 95 percentile errors of 3.71 mm, 5.02 mm, and 4.70 mm were obtained by the three best parameter sets. The optimal parameter set was applied to consecutive breast MRI scans of 13 patients. A radiologist identified 113 landmark pairs (~ 11 per patient) which were used to assess registration accuracy. The results demonstrated that

  20. Assessment of Grating Acuity in Infants and Toddlers Using an Electronic Acuity Card: The Dobson Card.

    Science.gov (United States)

    Mohan, Kathleen M; Miller, Joseph M; Harvey, Erin M; Gerhart, Kimberly D; Apple, Howard P; Apple, Deborah; Smith, Jordana M; Davis, Amy L; Leonard-Green, Tina; Campus, Irene; Dennis, Leslie K

    2016-01-01

    To determine if testing binocular visual acuity in infants and toddlers using the Acuity Card Procedure (ACP) with electronic grating stimuli yields clinically useful data. Participants were infants and toddlers ages 5 to 36.7 months referred by pediatricians due to failed automated vision screening. The ACP was used to test binocular grating acuity. Stimuli were presented on the Dobson Card. The Dobson Card consists of a handheld matte-black plexiglass frame with two flush-mounted tablet computers and is similar in size and form to commercially available printed grating acuity testing stimuli (Teller Acuity Cards II [TACII]; Stereo Optical, Inc., Chicago, IL). On each trial, one tablet displayed a square-wave grating and the other displayed a luminance-matched uniform gray patch. Stimuli were roughly equivalent to the stimuli available in the printed TACII stimuli. After acuity testing, each child received a cycloplegic eye examination. Based on cycloplegic retinoscopy, patients were categorized as having high or low refractive error per American Association for Pediatric Ophthalmology and Strabismus vision screening referral criteria. Mean acuities for high and low refractive error groups were compared using analysis of covariance, controlling for age. Mean visual acuity was significantly poorer in children with high refractive error than in those with low refractive error (P = .015). Electronic stimuli presented using the ACP can yield clinically useful measurements of grating acuity in infants and toddlers. Further research is needed to determine the optimal conditions and procedures for obtaining accurate and clinically useful automated measurements of visual acuity in infants and toddlers. Copyright 2016, SLACK Incorporated.

  1. National report card on energy efficiency : 2. annual report card on government activities

    International Nuclear Information System (INIS)

    2000-01-01

    This second annual report card produced by the Canadian Energy Efficiency Alliance is a means by which to monitor the efforts of Canada's federal, provincial and territorial governments in energy efficiency activities. The Alliance works in partnership with manufacturers, utilities, governments, builders, labour, consumer groups and environmental organizations. Energy efficiency is one of the primary tools governments can use to meet the Kyoto climate change commitment. The issue of climate change was examined in greater depth in this second annual report card. Ten specific measures that each government should take in order to be efficiency leaders were identified. These included minimum standards and regulations for buildings and appliances, supporting energy efficiency in the marketplace, and leadership programs to improve energy efficiency and achieve emission reduction targets. Efficiency in transportation was not included in this report card. A brief summary of what the federal government, as well as each provincial and territorial government are doing to promote energy efficiency was included. Each jurisdiction was given a grade. The Yukon received the highest mark of A minus. Saskatchewan received the lowest, and only failed mark. It was emphasized that public and private utilities also play a key role in supporting energy efficiency in Canada. 2 tabs

  2. Forensic validation of the SNPforID 52-plex assay

    DEFF Research Database (Denmark)

    Musgrave-Brown, Esther; Ballard, David; Balogh, Kinga

    2007-01-01

    The advantages of single nucleotide polymorphism (SNP) typing in forensic genetics are well known and include a wider choice of high-throughput typing platforms, lower mutation rates, and improved analysis of degraded samples. However, if SNPs are to become a realistic supplement to current short...... tandem repeat (STR) typing methods, they must be shown to successfully and reliably analyse the challenging samples commonly encountered in casework situations. The European SNPforID consortium, supported by the EU GROWTH programme, has developed a multiplex of 52 SNPs for forensic analysis...... in forensic casework. A total of 40 extracts were used in the study, each of which was sent to two of the five participating laboratories for typing in duplicate or triplicate. Laboratories were instructed to carry out their analyses as if they were dealing with normal casework samples. Results were reported...

  3. Applying Open Researchers and Contributors ID in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jeonghee Im

    2015-02-01

    Full Text Available Open Researchers and Contributors ID (ORCID launched its registry services in October 2012. Consequently, adding personal information to the ORCID registry became routine work for researchers. To add ORCID to an online article, the tag needs to be included in the Journal Article Tag Suite extensible markup language file, if such a file has been produced by the publisher. Subsequently, all co-authors’ ORCID can be easily and conveniently collected and then integrated into the manuscript management system. In the current age of information and the Internet, journals need to keep pace with the surge of new standards and technologies. Editors should be able to accept and apply these new systems rapidly.

  4. International Decommissioning Symposium 2000 (IDS 2000). Final Report

    International Nuclear Information System (INIS)

    Ebadian, M.A.

    2001-01-01

    The purpose of IDS 2000 was to deliver a world-class conference on applicable global environmental issues. The objective of this conference was to publicize environmental progress of individual countries, to provide a forum for technology developer and problem-holder interaction, to facilitate environmental and technology discussions between the commercial and financial communities, and to accommodate information and education exchange between governments, industries, universities, and scientists. The scope of this project included the planning and execution of an international conference on the decommissioning of nuclear facilities, and the providing of a business forum for vendors and participants sufficient to attract service providers, technology developers, and the business and financial communities. These groups, when working together with attendees from regulatory organizations and government decision-maker groups, provide an opportunity to more effectively and efficiently expedite the decommissioning projects

  5. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  6. Underground Storage Tank Integrated Demonstration (UST-ID)

    International Nuclear Information System (INIS)

    1994-02-01

    The DOE complex currently has 332 underground storage tanks (USTs) that have been used to process and store radioactive and chemical mixed waste generated from weapon materials production. Very little of the over 100 million gallons of high-level and low-level radioactive liquid waste has been treated and disposed of in final form. Two waste storage tank design types are prevalent across the DOE complex: single-shell wall and double-shell wall designs. They are made of stainless steel, concrete, and concrete with carbon steel liners, and their capacities vary from 5000 gallons (19 m 3 ) to 10 6 gallons (3785 m 3 ). The tanks have an overburden layer of soil ranging from a few feet to tens of feet. Responding to the need for remediation of tank waste, driven by Federal Facility Compliance Agreements (FFCAs) at all participating sites, the Underground Storage Tank Integrated Demonstration (UST-ID) Program was created by the US DOE Office of Technology Development in February 1991. Its mission is to focus the development, testing, and evaluation of remediation technologies within a system architecture to characterize, retrieve, treat to concentrate, and dispose of radioactive waste stored in USTs at DOE facilities. The ultimate goal is to provide safe and cost-effective solutions that are acceptable to the public and the regulators. The UST-ID has focused on five DOE locations: the Hanford Site, which is the host site, in Richland, Washington; the Fernald Site in Fernald, Ohio; the Idaho National Engineering Laboratory near Idaho Falls, Idaho; the Oak Ridge Reservation in Oak Ridge, Tennessee, and the Savannah River Site in Savannah River, South Carolina

  7. Automatic ID heat load generation in ANSYS code

    International Nuclear Information System (INIS)

    Wang, Zhibi.

    1992-01-01

    Detailed power density profiles are critical in the execution of a thermal analysis using a finite element (FE) code such as ANSYS. Unfortunately, as yet there is no easy way to directly input the precise power profiles into ANSYS. A straight-forward way to do this is to hand-calculate the power of each node or element and then type the data into the code. Every time a change is made to the FE model, the data must be recalculated and reentered. One way to solve this problem is to generate a set of discrete data, using another code such as PHOTON2, and curve-fit the data. Using curve-fitted formulae has several disadvantages. It is time consuming because of the need to run a second code for generation of the data, curve-fitting, and doing the data check, etc. Additionally, because there is no generality for different beamlines or different parameters, the above work must be repeated for each case. And, errors in the power profiles due to curve-fitting result in errors in the analysis. To solve the problem once and for all and with the capability to apply to any insertion device (ID), a program for ED power profile was written in ANSYS Parametric Design Language (APDL). This program is implemented as an ANSYS command with input parameters of peak magnetic field, deflection parameter, length of ID, and distance from the source. Once the command is issued, all the heat load will be automatically generated by the code

  8. Optical registration of spaceborne low light remote sensing camera

    Science.gov (United States)

    Li, Chong-yang; Hao, Yan-hui; Xu, Peng-mei; Wang, Dong-jie; Ma, Li-na; Zhao, Ying-long

    2018-02-01

    For the high precision requirement of spaceborne low light remote sensing camera optical registration, optical registration of dual channel for CCD and EMCCD is achieved by the high magnification optical registration system. System integration optical registration and accuracy of optical registration scheme for spaceborne low light remote sensing camera with short focal depth and wide field of view is proposed in this paper. It also includes analysis of parallel misalignment of CCD and accuracy of optical registration. Actual registration results show that imaging clearly, MTF and accuracy of optical registration meet requirements, it provide important guarantee to get high quality image data in orbit.

  9. Three dimensional image alignment, registration and fusion

    International Nuclear Information System (INIS)

    Treves, S.T.; Mitchell, K.D.; Habboush, I.H.

    1998-01-01

    Combined assessment of three dimensional anatomical and functional images (SPECT, PET, MRI, CT) is useful to determine the nature and extent of lesions in many parts of the body. Physicians principally rely on their spatial sense of mentally re-orient and overlap images obtained with different imaging modalities. Objective methods that enable easy and intuitive image registration can help the physician arrive at more optimal diagnoses and better treatment decisions. This review describes a simple, intuitive and robust image registration approach developed in our laboratory. It differs from most other registration techniques in that it allows the user to incorporate all of the available information within the images in the registration process. This method takes full advantage of the ability of knowledgeable operators to achieve image registration and fusion using an intuitive interactive visual approach. It can register images accurately and quickly without the use of elaborate mathematical modeling or optimization techniques. The method provides the operator with tools to manipulate images in three dimensions, including visual feedback techniques to assess the accuracy of registration (grids, overlays, masks, and fusion of images in different colors). Its application is not limited to brain imaging and can be applied to images from any region in the body. The overall effect is a registration algorithm that is easy to implement and can achieve accuracy on the order of one pixel

  10. Sulcal set optimization for cortical surface registration.

    Science.gov (United States)

    Joshi, Anand A; Pantazis, Dimitrios; Li, Quanzheng; Damasio, Hanna; Shattuck, David W; Toga, Arthur W; Leahy, Richard M

    2010-04-15

    Flat mapping based cortical surface registration constrained by manually traced sulcal curves has been widely used for inter subject comparisons of neuroanatomical data. Even for an experienced neuroanatomist, manual sulcal tracing can be quite time consuming, with the cost increasing with the number of sulcal curves used for registration. We present a method for estimation of an optimal subset of size N(C) from N possible candidate sulcal curves that minimizes a mean squared error metric over all combinations of N(C) curves. The resulting procedure allows us to estimate a subset with a reduced number of curves to be traced as part of the registration procedure leading to optimal use of manual labeling effort for registration. To minimize the error metric we analyze the correlation structure of the errors in the sulcal curves by modeling them as a multivariate Gaussian distribution. For a given subset of sulci used as constraints in surface registration, the proposed model estimates registration error based on the correlation structure of the sulcal errors. The optimal subset of constraint curves consists of the N(C) sulci that jointly minimize the estimated error variance for the subset of unconstrained curves conditioned on the N(C) constraint curves. The optimal subsets of sulci are presented and the estimated and actual registration errors for these subsets are computed. Copyright 2009 Elsevier Inc. All rights reserved.

  11. Credit Card Risk Behavior on College Campuses: Evidence from Brazil

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-da-Silva

    2012-07-01

    Full Text Available College students frequently show they have little skill when it comes to using a credit card in a responsible manner. This article deals with this issue in an emerging market and in a pioneering manner. University students (n = 769 in São Paulo, Brazil’s main financial center, replied to a questionnaire about their credit card use habits. Using Logit models, associations were discovered between personal characteristics and credit card use habits that involve financially risky behavior. The main results were: (a a larger number of credit cards increases the probability of risky behavior; (b students who alleged they knew what interest rates the card administrators were charging were less inclined to engage in risky behavior. The results are of interest to the financial industry, to university managers and to policy makers. This article points to the advisability, indeed necessity, of providing students with information about the use of financial products (notably credit cards bearing in mind the high interest rates which their users are charged. The findings regarding student behavior in the use of credit cards in emerging economies are both significant and relevant. Furthermore, financial literature, while recognizing the importance of the topic, has not significantly examined the phenomenon in emerging economies.

  12. Smart practice: smart card design considerations in health care.

    Science.gov (United States)

    Lindley, R A; Pacheco, F

    1995-01-01

    Recent innovations in microelectronics and advances in cryptography are driving the appearance of a new generation of smart cards with wider applications; this has important repercussions for our society in the coming years. Essentially, these breakthroughs include built-in microprocessors capable of generating cryptographic transactions (e.g.,Jelectronic blinded signatures, digital pseudonyms, and digital credentials), developments toward a single electronic card offering multi-access to services such as transport, telecommunications, health, financial, and entertainment (Universal Access Services), and incorporation of personal identification technologies such as voice, eye, or skin pattern recognition. For example, by using electronic representatives or cryptographic blinded signatures, a smart card can be used for multi transactions across different organizations and under different generated pseudonyms. These pseudonyms are capable of recognizing an individual unambiguously, while none of her records can be linked [1]. Moreover, tamper-proof electronic observers would make smart cards a very attractive technology for high-security based applications, such as those in the health care field. New trends in smart card technology offer excellent privacy and confidentiality safeguards. Therefore, smart cards constitute a promising technology for the health sector in Australia and other countries around the world in their pursuit of technology to support the delivery of quality care services. This paper addresses the main issues and the key design criteria which may be of strategic importance to the success of future smart card technology in the health care sector.

  13. CQL: a database in smart card for health care applications.

    Science.gov (United States)

    Paradinas, P C; Dufresnes, E; Vandewalle, J J

    1995-01-01

    The CQL-Card is the first smart card in the world to use Database Management Systems (DBMS) concepts. The CQL-Card is particularly suited to a portable file in health applications where the information is required by many different partners, such as health insurance organizations, emergency services, and General Practitioners. All the information required by these different partners can be shared with independent security mechanisms. Database engine functions are carried out by the card, which manages tables, views, and dictionaries. Medical Information is stored in tables and views are logical and dynamic subsets of tables. For owner-partners like MIS (Medical Information System), it is possible to grant privileges (select, insert, update, and delete on table or view) to other partners. Furthermore, dictionaries are structures that contain requested descriptions and which allow adaptation to computer environments. Health information held in the CQL-Card is accessed using CQL (Card Query Language), a high level database query language which is a subset of the standard SQL (Structured Query Language). With this language, CQL-Card can be easily integrated into Medical Information Systems.

  14. Investigating customer racial discrimination in the secondary baseball card market.

    Science.gov (United States)

    Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M

    2011-01-01

    A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price.

  15. C??lulas madre en terapia celular card??aca

    OpenAIRE

    Lobo Gonz??lez, Manuel

    2013-01-01

    La enfermedad cardiovascular, y su frecuente resultado final, el fallo card??aco del ventr??culo izquierdo, son la principal causa de morbimortalidad en los pa??ses desarrollados. La investigaci??n con c??lulas madre podr??a regenerar una variedad de c??lulas que incluye a los cardiomiocitos. Se han utilizado diferentes fuentes celulares para la terapia regenerativa card??aca, incluyendo c??lulas madre card??acas, mioblastos de m??sculo esquel??tico, c??lulas madre derivadas de la...

  16. Indian Kisan Credit Card Scheme: An Analytical Study

    Directory of Open Access Journals (Sweden)

    Dharmendra Mehta

    2016-03-01

    Full Text Available Kisan Credit Card (KCC has now been regarded as the only medium of short-term credit for agriculture. The Kisan Credit Card (KCC scheme was introduced by the Finance Minister in his budget speech in the year 1998-99. From the year 1998-99, the scheme was implemented by public sector commercial banks, RRBs (Regional Rural Banks and cooperative banks in the country. It has emerged as an innovative credit distribution system to meet the production credit requirements of the farmers in a timely and easy manner. The present paper is aimed to study role of Kisan Credit Card in the rural credit facilitation in India.

  17. Precautionary Borrowing and the Credit Card Debt Puzzle

    DEFF Research Database (Denmark)

    Druedahl, Jeppe; Jørgensen, Casper Nordal

    2015-01-01

    This paper addresses the credit card debt puzzle using a generalization of the buffer-stock consumption model with long-term revolving debt contracts. Closely resembling actual US credit card law, we assume that card issuers can always deny their cardholders access to new debt, but that they cannot...... to simultaneously hold positive gross debt and positive gross assets even though the interest rate on the debt is much higher than the return rate on the assets. Including a risk of being excluded from new borrowing which is positively correlated with unemployment, we are able to simultaneously explain...

  18. Regulating debit cards: the case of ad valorem fees

    OpenAIRE

    Zhu Wang

    2010-01-01

    Debit cards have become an indispensable part of the U.S. payments system, accounting for more than a third of consumer payments at point of sale. With this development has come controversy: Card networks charge merchants fees that merchants believe are too high. And most of the fees are ad valorem that is, based on transaction value rather than fixed fees per transaction. ; Given that debit cards incur a fixed cost per transaction, why do networks charge ad valorem fees? How do ad valorem fe...

  19. The cost of anchoring on credit-card minimum repayments

    OpenAIRE

    Stewart, Neil

    2009-01-01

    About three quarters of credit card accounts attract interest charges. In the US, credit card debt is $951.7 billion of a total of $2,539.7 billion of consumer credit. In the UK, credit card debt is £55.1 billion of £174.4 billion of consumer credit. The 2005 US Bankruptcy Abuse Prevention and Consumer Protection Act and the 2003 UK Treasury Select Committee's report require lenders to collect a minimum payment of at least the interest accrued each month. Thus people are protected from the ef...

  20. Consumer susceptibility to credit card misuse and indebtedness

    OpenAIRE

    Awanis, Sandra; Cui, Charles Chi

    2014-01-01

    Purpose – Prior research suggests that payment mechanisms are imbued with cues that affect purchase evaluation and future spending behavior. Credit cards are distinguished from other payment mechanisms as they elicit greater willingness to spend, prompt weaker recollections of past credit expenses and overvaluation of available funds – a phenomena the authors call as “credit card effect.� Little is known about the individuals’ differential exposure to the credit card effect. The pur...