Science.gov

Sample records for access card cac

  1. Corporate Card Access Quick Reference Corporate Card Access Online Enrollment to register

    E-print Network

    Harms, Kyle E.

    Corporate Card Access Quick Reference 1 Corporate Card Access Online Enrollment to register: Log on to Corporate Card Access at www.bankofamerica.com/corporatecardaccess Step Action Result 1 Enter your account information in appropriate boxes: · First, Last Name · Name as it appears on card · Expiration Date · Billing

  2. University of Minnesota Video Surveillance (CCTV) and Card Access (CA)

    E-print Network

    University of Minnesota Video Surveillance (CCTV) and Card Access (CA) Monitoring, Recording regarding the use of CCTV/Card Access on the University of Minnesota campuses. CCTV/Card Access is used of Minnesota affiliated campuses and centers state-wide in the use of CCTV/Card Access monitoring and recording

  3. What's Hot--and Not--in Card Access Systems.

    ERIC Educational Resources Information Center

    Sturgeon, Julie

    2002-01-01

    Describes four uses of newer card access systems on college campuses: stored value, entitlement, access control, and vending. Discusses the continued reluctance of schools to move to cards containing computer chips rather than simply magnetic stripes. (EV)

  4. EduCard. Adult Education Access Card. Policy Option Paper on Strategic Recommendation 4. First Edition.

    ERIC Educational Resources Information Center

    Porter, Dennis

    One recommendation of the 1989 California Strategic Plan for Adult Education is the use of EduCard. EduCard, the Adult Education Access Card, is a means of giving learners access to information about educational opportunities and providing administrators with machine-readable information on learners' prior education and traiing. Three models are:…

  5. The UCSB Access ID Card Application for Department Use Door Access will be needed

    E-print Network

    ID Card for a student who doesn't already have an Access or key card, use this application. If the department is not paying for the student's Access Card and the student doesn't already have an Access or key digits, starting with 8) ____________ Post Doctoral Academic Staff Other: Government issued

  6. DNI Building Card-key Access Policies a) Card-key access ("administrative-staff" level, building and conference room only, excluding

    E-print Network

    Biederman, Irving

    DNI Building Card-key Access Policies a) Card-key access ("administrative-staff" level, building of the study. b) All personnel must undergo safety training before card-key access can be granted. c) Temporary (unassigned) access card to the control room will be provided to researchers with Level-II MRO certification

  7. Key & Building Card Access Request Form Revision: Jan. 2014

    E-print Network

    Su, Xiao

    Key & Building Card Access Request Form Revision: Jan. 2014 *Emails will be sent to Key Holder when keys are ready for pick up. Keys will be available for 30 days from time of communication. Section 1: Identification ­ Enter information of the Key Holder requesting key(s) / card access credential(s) Instructions

  8. DEPARTMENT OF CENTRAL SECURITY Centrally Managed Card Access

    E-print Network

    requests are submitted 3 days prior to the event. · Submit a password and budget number to Cassie WilliamsDEPARTMENT OF CENTRAL SECURITY Centrally Managed Card Access System After Hours Lock/Unlock Events and responsibilities include: ­ Order and issue all department keys. ­ Submit all card access requests, clearance

  9. CARDS (COMPUTER ACCESS TO RESEARCH ON DIETARY SUPPLEMENTS)

    EPA Science Inventory

    CARDS stands for Computer Access to Research on Dietary Supplements. It is a database of federally funded research projects pertaining to dietary supplements. Currently, CARDS contains projects funded by the Institutes and Centers (ICs) of the National Institutes of Health (NIH) ...

  10. Standardized Card Access Times for Danforth Campus Academic and Administrative Buildings

    E-print Network

    Subramanian, Venkat

    Standardized Card Access Times for Danforth Campus Academic and Administrative Buildings Effective community with a current University-issued ID card. 10pm-7am Buildings will be locked with access only) with a University- issued ID card, unless other arrangements are made for specific events. 10pm-7am Access will only

  11. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  12. Two worlds, one smart card An integrated solution for physical access and logical security

    E-print Network

    Hoepman, Jaap-Henk

    Two worlds, one smart card An integrated solution for physical access and logical security using PKI on a single smart card Jaap-Henk Hoepman12 , Geert Kleinhuis1 1 TNO Information and Communication using a single (smart) company card. The purpose was to implement a high level of security, within

  13. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-print Network

    Hoepman, Jaap-Henk

    Two worlds, one smart card # An integrated solution for physical access and logical security using PKI on a single smart card Jaap­Henk Hoepman 12 , Geert Kleinhuis 1 1 TNO Information using a single (smart) company card. The purpose was to implement a high level of security, within

  14. CANBUS ( CAC208, CURVV)

    E-print Network

    Kozak, Victor R.

    . . . , - . , . bstract Microprocessor based devices with CANbus interface for physical installation control systems . , , ( ). - (, - ). (flash) CAC208, , , , - - . . #12. MCS-51 Dallas Semiconductors. DS80C320 ( CANDAC16, CANADC40), , , flash

  15. Chase Payroll Card Application The Ohio State University The Payroll Card makes getting paid a lot easier. It lets you access your pay at any one of more than 900,000 ATMs and use your card at millions of

    E-print Network

    Clark, Bunny

    Chase Payroll Card Application The Ohio State University The Payroll Card makes getting paid a lot easier. It lets you access your pay at any one of more than 900,000 ATMs and use your card at millions-of-Sale signature purchase or decline*** Free Free Other Fees Overdraft $10.00 per occurrence Second card issuance

  16. Playing the Smart Card.

    ERIC Educational Resources Information Center

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit cards;…

  17. Credit-Card Bill Seeks to Protect Students but Could Limit Their Access to Credit

    ERIC Educational Resources Information Center

    Field, Kelly

    2009-01-01

    Congress passed legislation last week that would shield students and other consumers from sudden spikes in interest rates and fees, but that could make it harder for young people to access credit to pay for college. The legislation would extend broad new consumer protections to all credit-card holders, offering special protections to college…

  18. Tiger Teams Technical Assistance: Reliable, Universal Open Architecture for Card Access to Dispense Alternative Fuels

    SciTech Connect

    Not Available

    2002-03-01

    Report discusses the dilemma of incorporating consistent, convenient, universal card access (or ''pay-at-the-pump'') systems into alternative fueling stations across the country. The state of California continues to be in the forefront of implementing alternative fuels for transportation applications. Aggressive efforts to deploy alternative fuel vehicles (AFVs) in California have highlighted the need to provide adequate fueling stations and develop appropriate, user-friendly means to purchase fuel at the pump. Since these fuels are not typically provided by petroleum companies at conventional fueling stations, and acceptance of cash is often not an option, a payment method must be developed that is consistent with the way individual AFV operators are accustomed to purchasing automotive fuels--with a credit card. At the same time, large fleets like the California Department of General Services must be able to use a single fuel card that offers comprehensive fleet management services. The Gas Technology Institute's Infrastructure Working Group (IWG) and its stakeholders have identified the lack of a common card reader system as a hurdle to wider deployment of AFVs in California and the United States. In conjunction with the U.S. Department of Energy's (DOE) National Clean Cities Program, the IWG has outlined a multi-phased strategy to systematically address the barriers to develop a more ''open'' architecture that's similar to the way gasoline and diesel are currently dispensed. Under the auspices of the IWG, survey results were gathered (circa 1999) from certain fuel providers, as a means to more carefully study card reader issues and their potential solutions. Pilot programs featuring card reader systems capable of accepting wider payment options have been attempted in several regions of the United States with mixed success. In early 2001, DOE joined the National Renewable Energy Laboratory (NREL), the California Energy Commission (CEC) and the South Coast Air Quality Management District (SCAQMD) in a renewed effort to further develop a universal card reader access program. The immediate focus is on natural gas fueling stations--primarily compressed natural gas (CNG) in California. However, the ultimate intention is to apply the resulting advancements in open architecture card reader systems in stations dispensing other types of alternative transportation fuels across the United States.

  19. OPEN ACCESS COMPUTER LAB INFORMATION All Users must have a valid CCNY ID card and CCNY e-mail account.

    E-print Network

    Sun, Yi

    , PERIPHERALS & POLICIES LOCATION PHONE HOURS LABS FOR STUDENTS / FACULTY & STAFF Current Students * cITy TECHOPEN ACCESS COMPUTER LAB INFORMATION All Users must have a valid CCNY ID card and CCNY e-mail account. Login in for NAC Labs* uses CCNY e-mail to validate. USERS LAB COMPUTERS SOFTWARE PRINTERS

  20. CAC208/CEAC208 1-apr-2008.

    E-print Network

    Kozak, Victor R.

    CAC208/CEAC208 1-apr-2008. Embedded software version 3. 1. Features This device is designed. The base mode is a multi-channel mode. In this mode the device scans predefined channels, measures them, stores measured values in internal memory and sends data in CANbus (if it was required by mode

  1. UNIVERSITY CARD STAFF MEMBER APPLICATION

    E-print Network

    UNIVERSITY CARD STAFF MEMBER APPLICATION I, (Dr/Mr/Mrs/Ms) University ID Photocopying After Hours Access Library Borrowing Request for University Card after hours electronic access to the following a University card for the following reason: Please note Library access is restricted to continuous and fixed

  2. CAC - NUCLEAR THERMAL ROCKET CORE ANALYSIS CODE

    NASA Technical Reports Server (NTRS)

    Clark, J. S.

    1994-01-01

    One of the most important factors in the development of nuclear rocket engine designs is to be able to accurately predict temperatures and pressures throughout a fission nuclear reactor core with axial hydrogen flow through circular coolant passages. CAC is an analytical prediction program to study the heat transfer and fluid flow characteristics of a circular coolant passage. CAC predicts as a function of time axial and radial fluid conditions, passage wall temperatures, flow rates in each coolant passage, and approximate maximum material temperatures. CAC incorporates the hydrogen properties model STATE to provide fluid-state relations, thermodynamic properties, and transport properties of molecular hydrogen in any fixed ortho-para combination. The program requires the general core geometry, the core material properties as a function of temperature, the core power profile, and the core inlet conditions as function of time. Although CAC was originally developed in FORTRAN IV for use on an IBM 7094, this version is written in ANSI standard FORTRAN 77 and is designed to be machine independent. It has been successfully compiled on IBM PC series and compatible computers running MS-DOS with Lahey F77L, a Sun4 series computer running SunOS 4.1.1, and a VAX series computer running VMS 5.4-3. CAC requires 300K of RAM under MS-DOS, 422K of RAM under SunOS, and 220K of RAM under VMS. No sample executable is provided on the distribution medium. Sample input and output data are included. The standard distribution medium for this program is a 5.25 inch 360K MS-DOS format diskette. CAC was developed in 1966, and this machine independent version was released in 1992. IBM-PC and IBM are registered trademarks of International Business Machines. Lahey F77L is a registered trademark of Lahey Computer Systems, Inc. SunOS is a trademark of Sun Microsystems, Inc. VMS is a trademark of Digital Equipment Corporation. MS-DOS is a registered trademark of Microsoft Corporation.

  3. UWE Card: Terms and Conditions Owner: Facilities

    E-print Network

    Aickelin, Uwe

    UWE Card: Terms and Conditions Owner: Facilities Last updated: September 2015 The UWE Card and Conditions apply to the use of a UWE Card by Students and Staff (cardholder). 1. Conditions of Use a. The UWE Card is issued as a means of identification, as an access card for University facilities (subject

  4. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ...Access Electronic Transportation Acquisition (ETA) AGENCY: Department of the Army, DoD. ACTION...1 Soldier Way, Scott AFB, IL 62225 ATTN: ETA Program Manager. FOR FURTHER INFORMATION CONTACT: ETA Program Manager at...

  5. Key / Card Requisition Keys & Cards are available in the Physical Plant Office

    E-print Network

    Martin, Jeff

    Key / Card Requisition Keys & Cards are available in the Physical Plant Office PLEASE COMPLETE ALL REASON FOR REQUESTING KEY(S) REASON FOR REQUESTING KEY(S) / CARD Lost Key/Card re-issue? YES NO (Note: Replacement fees are in effect for lost keys/cards. See reverse.) KEYS REQUESTED KEY REQUESTED / ACCESS

  6. Follow Up: Credit Card Caution

    ERIC Educational Resources Information Center

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students a lesson they will…

  7. Architecture and implementation for a system enabling smartphones to access smart card based healthcare records.

    PubMed

    Karampelas, Vasilios; Pallikarakis, Nicholas; Mantas, John

    2013-01-01

    The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has been the healthcare professional need of quality information, in every healthcare provision incident, whenever and wherever this incident may take place. In order to address this need a truly mobile health care system is required, one that will be able to provide a healthcare provider with accurate patient-related information regardless of the time and place that healthcare is provided. In order to fulfill this role the present study proposes the architecture for a Healthcare Smartcard system, which provides authenticated healthcare professionals with remote mobile access to a Patient's Healthcare Record, through their Smartphone. Furthermore the research proceeds to develop a working prototype system. PMID:23823404

  8. Code Generation for High-Assurance Java Card Applets

    E-print Network

    Coglio, Alessandro

    ://www.kestrel.edu/~coglio coglio@kestrel.edu 1 Introduction 1.1 Smart Cards A smart card [1], also known as integrated circuit card to the continual advancements in semi- conductor technology. A smart card communicates with the external world via and functionality can be accessed exclusively via these commands and responses. So, smart cards are easily portable

  9. 12 CFR 541.8 - Debit card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...TREASURY DEFINITIONS FOR REGULATIONS AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.8 Debit card. The term debit...card that enables an accountholder to obtain access to a savings account for the purpose of making withdrawals or of...

  10. 75 FR 13099 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ...password to protect the system from unauthorized access...PKI) and utilize a Common Access Card (CAC). The system employs a Secure Socket...PKI) and utilize a Common Access Card (CAC). The system employs a Secure...

  11. 75 FR 22562 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ...deployed on accredited systems with access restricted by the use of Common Access Card (CAC) and assigned system roles. The web-based...restricted by the use of Common Access Card (CAC) and assigned system roles. The...

  12. Manish Parashar NSF Cloud and Autonomic Computing Center (CAC)

    E-print Network

    Chen, Shu-Ching

    9/12/14 1 Manish Parashar NSF Cloud and Autonomic Computing Center (CAC) Rutgers Discovery;9/12/14 3 CLOUDS, FEDERATED COMPUTING, SOFTWARE DEFINED SYSTEMS The Lure of Clouds · Cloud services, Cyberinfrastructure Federation, and Software-Defined Environments for Science Pervasive Computation/Data Ecosystems

  13. Corporate Card Program Cardmember Application

    E-print Network

    Thompson, Michael

    statements and any notices regarding my Card account posting them on the Bank's eAccount Manager Website. I is as close as the nearest Automated Teller Machine (ATM). All you need is your Diners Club Corporate Card and your Personal Identification Number (PIN) to access cash at Interac® ATMs in Canada and Cirrus® ATMs

  14. Smart Cards DAL C3 Security Policy

    E-print Network

    Smart Cards DAL C3 Security Policy This document may be reproduced only in its original entirety Policy for DAL C32 Applet Suite on Axalto Cyberflex Access 64Kv1 Smart Card Chip FIPS 140-2 Level 2 Version 1.03 January 31, 2005 #12;Smart Cards DAL C3 Security Policy This document may be reproduced only

  15. Smart Cards DAL C3 Security Policy

    E-print Network

    Smart Cards DAL C3 Security Policy This document may be reproduced only in its original entirety Policy for DAL C3 Applet Suite on Axalto Cyberflex Access 64Kv1 Smart Card Chip FIPS 140-2 Level 3 Version 1.01 November 12, 2004 #12;Smart Cards DAL C3 Security Policy This document may be reproduced only

  16. Coding the Eggen Cards (Poster abstract)

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2014-06-01

    (Abstract only) A look at the Eggen Portal for accessing the Eggen cards. And a call for volunteers to help code the cards: 100,000 cards must be looked at and their star references identified and coded into the database for this to be a valuable resource.

  17. 75 FR 63160 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ...their assigned duties. Computer systems require Common Access Card (CAC) and passwords...need-to-know basis.'' * * * * * System manager(s) and address...their assigned duties. Computer systems require Common Access Card (CAC) and...

  18. Nm trong"Cac Trng ai Hoc ng u V

    E-print Network

    Arnold, Elizabeth A.

    dân cho sinh viên cach thc xem xet cac vn trên c s suy ngh ôc lp sc ben, xây dng cac gii phap va không nhng tích ly c rt nhiu kin thc t ging ng ma còn co c hôi c tri nghim thc t thông qua nghiên cu, thc tp va day kèm gia sinh viên va sinh viên. Ngay sau khi tôt nghip ai hoc la ho a co th sn sang vn

  19. A Mathemagical Card Trick 1 Card Trick

    E-print Network

    Do, Norman

    Norman Do A Mathemagical Card Trick 1 Card Trick Here I have a normal deck of 52 playing cards cards and remove them from the deck. Now, being careful not to show me, pass those five cards to my, the 5 and then the 10 -- but leave the identity of the remaining card known only to you and herself

  20. Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

    E-print Network

    Batina, Lejla

    Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings Lejla Batina1 implementation on smart cards. The protocol uses self-blindable attribute certificates rep- resented as points a bilinear pairing. Java Card smart cards offer only very limited access to the crypto- graphic coprocessor

  1. Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

    E-print Network

    Jacobs, Bart

    Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings Lejla Batina1 implementation on smart cards. The protocol uses self-blindable attribute certificates rep- resented as points a bilinear pairing. Java Card smart cards offer only very limited access to the cryptographic coprocessor

  2. Registration Cards 

    E-print Network

    Unknown

    2011-08-17

    New media are continuously changing the way in which youth communicate. Social media and online production, especially, are rapidly evolving. This research analyzes note card confession videos found on the popular video site, YouTube. It looks...

  3. Pressure-induced superconductivity in CaC2

    PubMed Central

    Li, Yan-Ling; Luo, Wei; Zeng, Zhi; Lin, Hai-Qing; Mao, Ho-kwang; Ahuja, Rajeev

    2013-01-01

    Carbon can exist as isolated dumbbell, 1D chain, 2D plane, and 3D network in carbon solids or carbon-based compounds, which attributes to its rich chemical binding way, including sp-, sp2-, and sp3-hybridized bonds. sp2-hybridizing carbon always captures special attention due to its unique physical and chemical property. Here, using an evolutionary algorithm in conjunction with ab initio method, we found that, under compression, dumbbell carbon in CaC2 can be polymerized first into 1D chain and then into ribbon and further into 2D graphite sheet at higher pressure. The C2/m structure transforms into an orthorhombic Cmcm phase at 0.5 GPa, followed by another orthorhombic Immm phase, which is stabilized in a wide pressure range of 15.2–105.8 GPa and then forced into MgB2-type phase with wide range stability up to at least 1 TPa. Strong electron–phonon coupling ? in compressed CaC2 is found, in particular for Immm phase, which has the highest ? value (0.562–0.564) among them, leading to its high superconducting critical temperature Tc (7.9?9.8 K), which is comparable with the 11.5 K value of CaC6. Our results show that calcium not only can stabilize carbon sp2 hybridization at a larger range of pressure but also can contribute in superconducting behavior, which would further ignite experimental and theoretical interest in alkaline–earth metal carbides to uncover their peculiar physical properties under extreme conditions. PMID:23690580

  4. Corporate Card Program Cardmember Application

    E-print Network

    Johnson, Eric E.

    *SOCIAL SECURITY NUMBER E-MAIL ADDRESS TO DESIGNATE ANOTHER PERSON TO MANAGE YOUR ACCOUNT, INDICATE BELOW these simple steps. Sign-in/sign-up for eAccount Manager (eAM) then access the Statement section to access your is as close as the nearest Automated Teller Machine (ATM). All you need is your Diners Club Corporate Card

  5. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  6. The Ohio State University Purchasing Card, Travel Card and Group/Extended Travel Card

    E-print Network

    Clark, Bunny

    The Ohio State University Purchasing Card, Travel Card and Group/Extended Travel Card Acceptance department's records for each card. Card Type: Purchasing Card Travel Card Group/Extended Travel Card Last 4 Digits: Card Manager / Card Holder Name: Employee ID Number: As a large public institution, The Ohio

  7. Developing JAVA Card Application with RMI API

    NASA Astrophysics Data System (ADS)

    JunWu, Xu; JunLing, Liang

    This paper describes research in the use of the RMI to develop Java Card applications. the Java Card RMI (JCRMI), which is based on the J2SE RMI distributed-object model. In the RMI model a server application creates and makes accessible remote objects, and a client application obtains remote references to the server's remote objects, and then invokes remote methods on them. In JCRMI, the Java Card applet is the server, and the host application is the client.

  8. Hereditary and Histologic Characteristics of the CF1/b cac Mouse Cataract Model

    PubMed Central

    Kondo, Tomohiro; Nagai, Hiroaki; Kawashima, Takamune; Taniguchi, Yusuke; Koyabu, Nozomu; Takeshita, Ai; Kusakabe, Ken-Takeshi; Okada, Toshiya

    2014-01-01

    A substrain of mice originating from the CF1 strain (an outbred colony) reared at Osaka Prefecture University (CF1/b cac mice) develops cataracts beginning at 14 d old. Affected mice were fully viable and fertile and had developed cataracts by 22 d of age. The incidence of cataracts did not differ between male and female mice. Histologically, 14-wk-old CF1/b cac mice showed vacuolated lens epithelial cells, swollen lens fibers, many pyknotic nuclei, and vacuolation of the lens cortex. To elucidate the mode of inheritance, we analyzed heterozygous mutants hybrids generated from CF1/b cac and wildtype BALB/c mice and the offspring of the backcrossed heterozygous mutants. None of the heterozygous mutants was affected, but the ratio of affected to unaffected mice was 1:3 among the offspring of the heterozygous mutants. The initial genomewide screen of 20 affected backcrossed offspring (CF1/b cac × [CF1/b cac × BALB/c]) indicated that the mutant gene resides on chromosome 16. For further mapping, we used affected progeny of CF1/b cac × (CF1/b cac × MSM/Ms) mice. We concluded that the cataracts in CF1/b cac mice are inherited through an autosomal recessive mutation and that the mutant gene is located on mouse chromosome 16 between D16Mit5 and D16Mit92 and between D16Mit92 and D16Mit201. The mapping of the mutant gene of the CF1/b cac mice to mouse chromosome 16 provides the positional information necessary to identify the candidate gene responsible for the CF1/b cac phenotype. PMID:25402176

  9. Toward Automatic Generation of Provably Correct Java Card Applets

    E-print Network

    and simpler applet checker to be also developed in this project. 1 Introduction A smart card [10] consists is very small, it has rela- tively limited storage and processing capabilities. A smart card communicates. The card's memory and functionality can be accessed exclusively via these commands and responses. Smart

  10. Age of Majority Cards and Drinking among Young People.

    ERIC Educational Resources Information Center

    Smart, Reginald G.; Adlaf, Edward M.

    1987-01-01

    Examined use of age of majority cards (identification indicating legal drinking age status in Ontario) among 3,395 secondary school students. Found card status to be significantly related to frequency of alcohol use, problems, and place of drinking. Found little evidence that age of majority cards are an effective device for limiting access of…

  11. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  12. From Card Catalog to Website

    USGS Multimedia Gallery

    Organization and inventorying of the collection is an ongoing project. The Denver Library is converting card catalog records and inventory documents into a web accessible database in which inventories may be searched by keyword or browsed by scientist. The new website went live for USGS and public u...

  13. Quality Counts Exhibitor Card 

    E-print Network

    Chilek, Kevin; Gregory, Elizabeth

    2004-01-27

    This exhibitor card identifies young livestock exhibitors as participants in the Quality Counts! program. The card is printed with a leather-style background on heavy card stock. It features the 4-H clover and the FFA logo, ...

  14. Breastfeeding Report Card 2014

    MedlinePLUS

    ... Address What's this? Submit What's this? Submit Button Breastfeeding Report Cards Recommend on Facebook Tweet Share Compartir ... National Immunization Survey data from 2013 and 2014. Breastfeeding Report Card, 2014 Older Breastfeeding Report Cards Breastfeeding ...

  15. Campus Card Tricks.

    ERIC Educational Resources Information Center

    Fickes, Michael

    1999-01-01

    Examines the development of an innovative student identification card system that includes off-campus banking and credit card functions. Finding solutions to bank objections, credit card company rule problems, and software difficulties are discussed. (GR)

  16. Purchasing Card Application

    E-print Network

    Pavlov, Ronnie

    Purchasing Card Application Cardholder Information: First Name: ____________________________MI Number: ______________________________ I have obtained a copy of the University of Denver Purchasing Card may result in loss of P-Card privileges

  17. An Approach to the Generation of High-Assurance Java Card Applets

    E-print Network

    ://www.kestrel.edu/~coglio coglio@kestrel.edu 1 Introduction 1.1 Smart Cards A smart card [11], also known as integrated circuit to the continual advancements in semi- conductor technology. A smart card communicates with the external world via and functionality can be only accessed via these commands and responses. So, smart cards are easily portable, cost

  18. Cougar Card Campus Connection

    E-print Network

    Kunkle, Tom

    ! Replacement cards for students are $10. Lost cards may not be reactivated. Public Safety requests students in database to SSN, replace lost cards 24/7 Convenient - no need to renew card each semester, process locations: ­ Fresh Food Company ­ City Bistro · 7 Maroon Meals Each Week ­ Einstein Bros. Bagels · Includes

  19. Procurement Card Program Guide

    E-print Network

    Doering, Tamara

    Procurement Card Program Guide Updated 5/11/10, Effective 6/1/10 #12;Procurement Card Program Guide with the Procurement Card Program: Cardholder, Reviewer, and Approver. Program participants may perform more than one role; however, adequate separation of duties must be maintained. Cardholder Role Procurement card usage

  20. Anamorelin hydrochloride for the treatment of cancer-anorexia-cachexia (CACS) in nonsmall cell lung cancer

    PubMed Central

    Zhang, Hongjie; Garcia, Jose M

    2015-01-01

    Introduction Cancer anorexia-cachexia syndrome (CACS) is associated with increased morbidity and mortality. Anamorelin is a novel, orally active ghrelin receptor agonist in clinical development for the treatment of CACS in non-small cell lung cancer (NSCLC). The aim of this review is to summarize preclinical and clinical studies evaluating anamorelin as a potential promising treatment for CACS in NSCLC. Area covered Pharmacodynamics, pharmacokinetics and metabolism, clinical efficacy, safety, and tolerability of anamorelin for the treatment of CACS in NSCLC were reviewed. Anamorelin administration may lead to increases in food intake, body weight and lean body mass, and a stimulatory effect on GH secretion in NSCLC patients. Anamorelin is well tolerated with no dose-limiting toxicities identified to date. Expert opinion Targeting ghrelin receptors presents the advantage of potentially addressing multiple mechanisms of CACS simultaneously including appetite, muscle protein balance, adipose tissue metabolism, energy expenditure and inflammation. Clinical data suggest that anamorelin is well tolerated and it effectively increases appetite, body weight and lean mass in patients with advanced NSCLC. Long-term safety remains unknown at this time. The potential synergistic effects of anamorelin with nutritional support or exercise as well as its efficacy/safety in other tumor types are also unknown. PMID:25945893

  1. Policy on Husky Card Use Policy on Husky Cards

    E-print Network

    Policy on Husky Card Use 11/5/2013 Policy on Husky Cards I. Purpose and Scope To clarify eligibility for and use of Northeastern University issued Husky Cards. The Northeastern Husky Card is the official identification card of Northeastern University. II. Definitions III. Policy The Husky Card may

  2. Policy on Husky Cards Policy on Husky Cards

    E-print Network

    Sridhar, Srinivas

    Policy on Husky Cards 11/5/2013 Policy on Husky Cards I. Purpose and Scope This policy outlines eligibility for and permissible use of Northeastern University issued Husky Cards. II. Definitions The Husky Card is the official identification card of Northeastern University. III. Policy A Husky Card may

  3. 75 FR 32915 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-10

    ...and random patrols. Common Access Cards and personal...scanned monthly to assess system vulnerabilities. Systems...deployed on accredited systems with access restricted by the use of Common Access Card (CAC) and assigned system roles. The...

  4. Smart card technology

    SciTech Connect

    Nelson, R.A.

    1992-09-01

    This report describes smart card techonology and applications, including the use of smart cards as smart badges. The paper illustrates that smart cards are designed with security features, which makes them suitable for security applications. But smart cards also provide multiple functions, so they can support additional applications. The goal of this paper is to inform about the technology, and to inspire thought about possible applications that would benefit if a smart badge were implemented.

  5. Unraveling a Card Trick

    NASA Astrophysics Data System (ADS)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  6. Reading the Cards.

    ERIC Educational Resources Information Center

    Grills, Caroline M.

    2001-01-01

    Describes trends in the technology and use of "smart cards," cards embedded with computer chips to store information and thereby speed and simplify various business and administrative transactions. Addresses future applications for colleges and universities, American Express'"Blue" card, military and medical applications, the role of bandwidth,…

  7. A Smart XML Access Right Controller for Mobile Applications

    E-print Network

    embedded in a cellular phone SIM card. 1 Introduction Chip-Secured XML Access (C-SXA) is a versatile XML Access (C-SXA) is a versatile XML-based Access Right Controller embedded in a smart card. C-SXA can- based Access Right Controller embedded in a smart card. C-SXA evaluates the user's privileges on on

  8. Formation of Nanofoam carbon and re-emergence of Superconductivity in compressed CaC6

    NASA Astrophysics Data System (ADS)

    Li, Yan-Ling; Luo, Wei; Chen, Xiao-Jia; Zeng, Zhi; Lin, Hai-Qing; Ahuja, Rajeev

    2013-11-01

    Pressure can tune material's electronic properties and control its quantum state, making some systems present disconnected superconducting region as observed in iron chalcogenides and heavy fermion CeCu2Si2. For CaC6 superconductor (Tc of 11.5 K), applying pressure first Tc increases and then suppresses and the superconductivity of this compound is eventually disappeared at about 18 GPa. Here, we report a theoretical finding of the re-emergence of superconductivity in heavily compressed CaC6. The predicted phase III (space group Pmmn) with formation of carbon nanofoam is found to be stable at wide pressure range with a Tc up to 14.7 K at 78 GPa. Diamond-like carbon structure is adhered to the phase IV (Cmcm) for compressed CaC6 after 126 GPa, which has bad metallic behavior, indicating again departure from superconductivity. Re-emerged superconductivity in compressed CaC6 paves a new way to design new-type superconductor by inserting metal into nanoporous host lattice.

  9. JOHANNES KEPLER UNIVERSITT LINZ KeplerCardKeplerCard

    E-print Network

    Hochreiter, Sepp

    Page 1 JKU KeplerCard JOHANNES KEPLER UNIVERSITÄT LINZ KeplerCardKeplerCard Eine Johannes Kepler Universität Linz Altenberger Strasse 69, A - 4040 Linz wolfgang.franke@jku.at www.jku.at #12;Page 2 JKU KeplerCard - Alle Studienanfänger erhalten die KeplerCard - 1999/2000 alle Studierenden

  10. Reasoning about Card Tears and Transactions in Java Card

    E-print Network

    Hubbers, Engelbert

    Reasoning about Card Tears and Transactions in Java Card Engelbert Hubbers and Erik Poll SoS Group dialect Java Card for programming smartcards contains some features which do not exist in Java. Java Card power to a smartcard can suddenly be in- terrupted by a so-called card tear, by someone removing

  11. Distance Education UTA ID Card Request Mav Express Card Office

    E-print Network

    Huang, Haiying

    Distance Education UTA ID Card Request Mav Express Card Office Box 19070 300 W. First Street, Suite include the mailing address of where you would like your UTA ID card mailed. Note that your card Commission Expiry Date: ____________ If you have any questions, please call the Mav Express Card Office

  12. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-print Network

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints, but no proof is o#ered. Here we show how a passive eavesdropper, without access to any smart card, password a smart­card). It is of interest to devise a scheme that uses all three methods for maximum security In [1

  13. An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

    E-print Network

    International Association for Cryptologic Research (IACR)

    An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri their password by their own choices without the help of a remote server. Keywords: Authentication; Smart Card with smart cards are the important parts of security for accessing remote servers. Password

  14. Algebraic Attacks on the Crypto1 Stream Cipher in MiFare Classic and Oyster Cards

    E-print Network

    International Association for Cryptologic Research (IACR)

    Algebraic Attacks on the Crypto­1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T in progress. Abstract. MiFare Crypto 1 is a lightweight stream cipher used in Lon­ don's Oyster card, Netherland's OV­Chipcard, US Boston's CharlieCard, and in numerous wireless access control and ticketing

  15. Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards

    E-print Network

    International Association for Cryptologic Research (IACR)

    Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Abstract. MiFare Crypto 1 is a lightweight stream cipher used in Lon- don's Oyster card, Netherland's OV-Chipcard, US Boston's CharlieCard, and in numerous wireless access control and ticketing systems worldwide

  16. Holo-Chidi video concentrator card

    NASA Astrophysics Data System (ADS)

    Nwodoh, Thomas A.; Prabhakar, Aditya; Benton, Stephen A.

    2001-12-01

    The Holo-Chidi Video Concentrator Card is a frame buffer for the Holo-Chidi holographic video processing system. Holo- Chidi is designed at the MIT Media Laboratory for real-time computation of computer generated holograms and the subsequent display of the holograms at video frame rates. The Holo-Chidi system is made of two sets of cards - the set of Processor cards and the set of Video Concentrator Cards (VCCs). The Processor cards are used for hologram computation, data archival/retrieval from a host system, and for higher-level control of the VCCs. The VCC formats computed holographic data from multiple hologram computing Processor cards, converting the digital data to analog form to feed the acousto-optic-modulators of the Media lab's Mark-II holographic display system. The Video Concentrator card is made of: a High-Speed I/O (HSIO) interface whence data is transferred from the hologram computing Processor cards, a set of FIFOs and video RAM used as buffer for data for the hololines being displayed, a one-chip integrated microprocessor and peripheral combination that handles communication with other VCCs and furnishes the card with a USB port, a co-processor which controls display data formatting, and D-to-A converters that convert digital fringes to analog form. The co-processor is implemented with an SRAM-based FPGA with over 500,000 gates and controls all the signals needed to format the data from the multiple Processor cards into the format required by Mark-II. A VCC has three HSIO ports through which up to 500 Megabytes of computed holographic data can flow from the Processor Cards to the VCC per second. A Holo-Chidi system with three VCCs has enough frame buffering capacity to hold up to thirty two 36Megabyte hologram frames at a time. Pre-computed holograms may also be loaded into the VCC from a host computer through the low- speed USB port. Both the microprocessor and the co- processor in the VCC can access the main system memory used to store control programs and data for the VCC. The Card also generates the control signals used by the scanning mirrors of Mark-II. In this paper we discuss the design of the VCC and its implementation in the Holo-Chidi system.

  17. Quantum key distribution using card, base station and trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  18. to the Arts is now on your TigerCard!

    E-print Network

    Singh, Jaswinder Pal

    Passport to the Arts is now on your TigerCard! Now you can access and redeem your Passport with a University Ticketing representative when purchasing your tickets. * The Passport to the Arts Program enables

  19. Accessibility

    Cancer.gov

    The National Institutes of Health, NIH is making every effort to ensure that the information available on our website is accessible to all. If you use special adaptive equipment to access the Web and encounter problems when using our site, please let

  20. 2010 Resource Cards on California Schools

    ERIC Educational Resources Information Center

    EdSource, 2010

    2010-01-01

    With an index, and separate sections that cover related topics, this booklet provides fingertip access to the latest information about California's public education system. The 2010 Resource Cards also include a robust section on community colleges. This booklet contains the following sections: (1) School Finance/Related Laws, which includes…

  1. What's Inside: OSU ID Cards With

    E-print Network

    ; · Access to a variety of campus events and services; · As anATM card with optional banking services through RRRRRESOURESOURESOURESOURESOURCESCESCESCESCES Timely Information For Managers, Supervisors, Directors and Support Staff October 2006 www Stillwater National Bank, BancFirst, The Bank N.A., and the University and Community Federal Credit Union

  2. The Eggen Card Project (Poster abstract)

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2015-06-01

    (Abstract only) At the 2013 meeting we kicked off the Eggen Card project. This project was to make the huge collection of photometric observations made by Olin Eggen accessible to researchers. My poster this year is to report progress and encourage more members to participate.

  3. The Future of Smart Cards.

    ERIC Educational Resources Information Center

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  4. MCNP6 Fission Multiplicity with FMULT Card

    SciTech Connect

    Wilcox, Trevor; Fensin, Michael Lorne; Hendricks, John S.; James, Michael R.; McKinney, Gregg W.

    2012-06-18

    With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

  5. Corrosion of aluminium metal in OPC- and CAC-based cement matrices

    SciTech Connect

    Kinoshita, Hajime; Swift, Paul; Utton, Claire; Carro-Mateo, Beatriz; Collier, Nick; Milestone, Neil

    2013-08-15

    Corrosion of aluminium metal in ordinary Portland cement (OPC) based pastes produces hydrogen gas and expansive reaction products causing problems for the encapsulation of aluminium containing nuclear wastes. Although corrosion of aluminium in cements has been long known, the extent of aluminium corrosion in the cement matrices and effects of such reaction on the cement phases are not well established. The present study investigates the corrosion reaction of aluminium in OPC, OPC-blast furnace slag (BFS) and calcium aluminate cement (CAC) based systems. The total amount of aluminium able to corrode in an OPC and 4:1 BFS:OPC system was determined, and the correlation between the amount of calcium hydroxide in the system and the reaction of aluminium obtained. It was also shown that a CAC-based system could offer a potential matrix to incorporate aluminium metal with a further reduction of pH by introduction of phosphate, producing a calcium phosphate cement.

  6. [Hemothorax complicated with celiac artery compression syndrome (CACS); report of a case].

    PubMed

    Uga, Naoko; Adachi, Katsutoshi; Tarukawa, Tomohito; Okuda, Yasuyuki; Tanigawa, Kanji; Nakaya, Hitoshi; Sato, Tomoaki; Hioki, Iwao

    2014-05-01

    We report a case of hemothorax complicated with celiac artery compression syndrome (CACS). A 43-year-old man presented with a sudden onset left back pain. Computed tomography (CT) showed its hemothorax, esophageal artery aneurysm and severe stenosis of the celiac truncus with its anterior compression by median accurate ligament, and a diagnosis of CACS associated with rupture of the aneurysm was made. Emergent transcatheter arterial embolization of the aneurysm resulted in a technical failure, although the patient's condition was stable and performed esophageal artery ligation through video-assisted thoracoscopic surgery on day 5 after onset. After surgery, the patient recovered without significant incidents. A cause of this aneurysmal development was supposed to be a significantly increased esophageal arterial blood flow with its luminal dilation to compensate a decreased celiac blood flow. Segmental arterial mediolysis could not be excluded as another cause. PMID:24917294

  7. Bird Migration Card - 1922

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  8. Bird Migration Card - 1933

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  9. Historical Bird Migration Card

    USGS Multimedia Gallery

    Image scan of a historical bird migration card (1904). This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-ch...

  10. Monumental Court Cards

    ERIC Educational Resources Information Center

    Long, Caroline

    2010-01-01

    Card playing is a popular pastime in many cultures, including games like bridge, gin rummy, and 52-pickup. In this article, the author describes an art project inspired by the unique designs on the face cards and the intricate art of the overall design. (Contains 1 online resource.)

  11. Bird Migration Card - 1937

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  12. FIREFIGHTER POCKET CARDS

    E-print Network

    TEXAS FIREFIGHTER POCKET CARDS UPDATED: FEBRUARY 2014 #12;#12;i Table of Contents Guide.............................................................................. Predictive Service Area Map................................................... Firefighter Pocket Cards 13 17 21 25 29 33 37 41 45 49 53 57 61 62 68 69 #12;1 Firefighter's Guide to Percentiles

  13. An original Social Security card A replacement Social Security card

    E-print Network

    Post, David M.

    . PROTECT YOUR SOCIAL SECURITY NUMBER AND CARD Protect your SSN card and number from loss and identity theft THIS APPLICATION LIMITS ON REPLACEMENT SOCIAL SECURITY NUMBER (SSN) CARDS 16. If you are age 18 or older, you must, you may need to visit the Social Security Card Center in person for all SSN related business. We

  14. UNIVERSITY TRAVEL CARD PROCEDURES Receiving a Travel Card

    E-print Network

    Lin, King-Ip "David"

    UNIVERSITY TRAVEL CARD PROCEDURES Receiving a Travel Card Department chairs/heads will designate eligibility for new cardholders. Applicants will need to complete a Travel Card Enrollment Application. The applicant will be required to read and sign the Travel Card User Agreement indicating that he

  15. CARD CANCELLATION TELEPHONE LISTING CREDIT CARDS TELEPHONE NUMBERS

    E-print Network

    Shoubridge, Eric

    CARD CANCELLATION TELEPHONE LISTING CREDIT CARDS TELEPHONE NUMBERS AMERICAN EXPRESS 1-800 668-2639 VISA Desjardins (customer service) 514-522-2373 Desjardins (lost card) 514 397-4415 Laurentian Bank (customer service) 514 252-1846 or 1 800 252-1846 Laurentian Bank (lost cards) 514 284-7570 or 1 800 263

  16. COMMERCIAL FUEL CARDS RULES & RESPONSIBILITIES: Vehicle Specific Cards

    E-print Network

    Pillow, Jonathan

    COMMERCIAL FUEL CARDS ­ RULES & RESPONSIBILITIES: Vehicle Specific Cards A card issued rented by that department. Restrictions · Commercial fuel cards can only be used for fuel and vehicle Services (number of transactions/day, dollars/month, fuel only, etc.) Departmental Responsibilities

  17. Report Cards and Nursing Homes

    ERIC Educational Resources Information Center

    Castle, Nicholas G.; Lowe, Timothy J.

    2005-01-01

    Purpose: We first describe which states have produced nursing home report cards; second, we compare what information is provided in these report cards; third, we identify data sources used to produce the report cards; and, finally, we examine seven factors previously shown to be associated with the usefulness of report-card information and provide…

  18. ATLAS Tile Calorimeter Interface Card

    E-print Network

    -1- ATLAS Tile Calorimeter Interface Card K. Anderson, A. Gupta, J. Pilcher, H. Sanders, F. Tang, R Digitizer-to-Rod Interface card design, performance and radiation hardness tests and production processes. I1 cards, control motherboards, digitizer boards, and interface card. A block diagram is shown

  19. CARD No. 27 Peer Review

    E-print Network

    CARD No. 27 Peer Review 27.A.1 BACKGROUND The Compliance Criteria require DOE to conduct peer to the promulgation of the final compliance criteria." This CARD does not address the technical aspects of the various manner. These issues are addressed in the CARDs for the relevant subject areas. See CARD 22--Quality

  20. Travel in Gothenburg Period cards

    E-print Network

    Travel in Gothenburg Period cards For frequent travellers. The period card is valid for 30, 90 For infrequent travellers. Setting up a pay-as-you-go card (kontoladdning) requires a 50SEK deposit that will be returned to you if you hand in the card at the end of your stay. The minimum amount of money that you can

  1. A gigabit ethernet link source card.

    SciTech Connect

    Blair, R. E.; Dawson, J. W.; Drake, G.; Haberichter, W. N.; Schlereth, J. L.

    2002-09-18

    A Link Source Card (LSC) has been developed which employs Gigabit Ethernet as the physical medium. The LSC is implemented as a mezzanine card compliant with the S-Link specifications, and is intended for use in development of the Region of Interest Building (ROIB) in the Level 2 Trigger of ATLAS. The LSC will be used to bring Region of Internet Fragments from Level 1 Trigger elements to the ROIB, and to transfer compiled Region of Interest Records to Supervisor Processors. The card uses the LSI 8101/8104 Media Access Controller (MAC) [1] and the Agilent HDMP-1636 Transceiver. An Altera 10K50A FPGA [2] is configured to provide several state machines which perform all the tasks on the card, such as formulating the Ethernet header, read/write registers in the MAC, etc. An on-card static RAM provides storage for 512K S-Link words, and a FIFO provides 4K buffering of input S-Link words. The LSC has been tested in a setup where it transfers data to a NIC in the PCI bus of a PC.

  2. Biometrics and smart cards combine to offer high security

    SciTech Connect

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued.

  3. Credit Card Quiz.

    ERIC Educational Resources Information Center

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  4. Targeted deletion of Kif18a protects from colitis-associated colorectal (CAC) tumors in mice through impairing Akt phosphorylation

    SciTech Connect

    Zhu, Houbao; Xu, Wangyang; Zhang, Hongxin; Liu, Jianbing; Shanghai Research Center for Model Organisms, Shanghai 201203 ; Xu, Haimin; Lu, Shunyuan; Dang, Suying; Kuang, Ying; Jin, Xiaolong; Wang, Zhugang; Shanghai Research Center for Model Organisms, Shanghai 201203

    2013-08-16

    Highlights: •Kif18A is up-regulated in CAC of mouse model. •Kif18a{sup ?/?} mice are protected from CAC. •Tumor cells from Kif18a{sup ?/?} mice undergo more apoptosis. •Kif18A deficiency induces poor Atk phosphorylation. -- Abstract: Kinesins are a superfamily of molecular motors involved in cell division or intracellular transport. They are becoming important targets for chemotherapeutic intervention of cancer due to their crucial role in mitosis. Here, we demonstrate that the kinesin-8 Kif18a is overexpressed in murine CAC and is a crucial promoter during early CAC carcinogenesis. Kif18a-deficient mice are evidently protected from AOM–DSS-induced colon carcinogenesis. Kif18A is responsible for proliferation of colonic tumor cells, while Kif18a ablation in mice promotes cell apoptosis. Mechanistically, Kif18a is responsible for induction of Akt phosphorylation, which is known to be associated with cell survival regulation. In conclusion, Kif18a is critical for colorectal carcinogenesis in the setting of inflammation by mechanisms of increased PI3K-AKT signaling. Inhibition of Kif18A activity may be useful in the prevention or chemotherapeutic intervention of CAC.

  5. Role of alkalis of aggregate origin in the deterioration of CAC concrete

    SciTech Connect

    Blanco-Varela, M.T.

    2005-09-01

    Both hexagonal and cubic calcium aluminate cement (CAC) hydrates react with atmospheric CO{sub 2}, bringing about mineralogical changes in concrete, which may, on occasion, lead to loss of mechanical strength. Alkaline hydrolysis or carbonation in the presence of alkalis is a highly destructive process. The purpose of the study was to determine what caused CAC concrete deterioration in a prestressed beam that had suffered intense external damage and showed signs of alkaline hydrolysis or a reaction between the aggregate and the cement. Samples of the internal (sound) and external (damaged) parts of the concrete were studied using XRF, XRD, FTIR, OM, SEM/EDX, and BSE techniques, and mechanical strength was measured on microspecimens extracted from both zones. The conclusion drawn from these analyses was that alkaline hydrolysis took place on or near the surface of the concrete. The white deposits observed around the alkali-containing aggregate were found to consist primarily of bayerite whose very loose consistency undermined the aggregate-matrix bond, greatly weakening the material.

  6. 20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+), OPPOSITE END - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  7. 19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+). - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  8. Time card entry system

    SciTech Connect

    Montierth, B.S.

    1996-05-01

    The Time Card Entry System was developed to interface with the DOE Headquarters Electronic Time and Attendance (ETA) system. It features pop-up window pick lists for Work Breakdown Structure Numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills US Government/OMB requirements before Timekeepers process the data at the end of the two week payroll cycle using ETA. Tours of Duty (e.g. ten hour day, four day week with Friday through Sunday off), established in the ETA system, are imported into the Time Card Entry System by the Timekeepers. An individual`s Tour of Duty establishes the basis for validation of time of day and number of hours worked per day. At the end of the two week cycle, data is exported by the Timekeepers from the Time Card Entry System into ETA data files.

  9. Shotcrete -- Understanding of the hydration process of mixes containing CAC and Portland cement and proposal for a simple rheological characterization

    SciTech Connect

    Bayoux, J.P.; Testud, M.; Guinot, D.; Willocq, J.; Capmas, A.

    1995-12-31

    In order to better understand the performances of CAC-slag cement and CAC--PC cement the hydration study of these mixes was undertaken. The hydrates which are responsible for the early stiffening/strengthening are identical in both mixes; it is only the time of appearance and amount which varies. Ettringite always forms first followed by the precipitation of C{sub 4}AH{sub 13}. They will both form faster then the temperature rises. As a complement, a simple laboratory equipment is proposed to characterize the stiffening behavior of the mixes straight after gauging.

  10. ID CARDS POLICY Table of Contents

    E-print Network

    ID CARDS POLICY Table of Contents 1. Introduction 2. Location and Staff 3. Objective 4. Card Care 5. Lost/Stolen ID Cards 6. Damaged ID Cards 7. Found ID Cards 8. Terms of Usage Back to Top (To download of the Office of Auxiliary Services. An AUB ID card identifies an individual as a member of the university

  11. Gift Card Request Form Date: Department

    E-print Network

    Paulsen, Vern

    Gift Card Request Form Date: Department: Purpose and benefit of purchasing gift cards/certificates: ______________________________________________________________________________ Dollar amount of each gift card to be purchased: $ Number of gift cards to be purchased: Total dollar amount of gift cards to be purchased: $ Vendor from which gift cards will be purchased: Purchase by

  12. NISTIR 7206 Smart Cards and

    E-print Network

    NISTIR 7206 Smart Cards and Mobile Device Authentication: AnOverviewandImplementation WayneJansen SerbanGavrila ClémentSéveillac VladKorolev #12;NISTIR 7206 Smart Cards and Mobile Handheld Devices, or stolen handheld device. Smart cards have long been the choice of authentication mechanism for many

  13. PURCHASING CARD (PCARD) FINANCIAL POLICY

    E-print Network

    PURCHASING CARD (PCARD) FINANCIAL POLICY Updated November 25, 2013 Issued by: Procurement Services Approved by: Director of Finance Purpose The St. Francis Xavier University Purchasing Card (PCard) program goods and services. Policy It is University Policy to use Purchasing Cards to facilitate the purchase

  14. Baseball Cards in the Classroom.

    ERIC Educational Resources Information Center

    Nelson, Murry R.

    1981-01-01

    Explains how elementary school social studies classroom teachers can use baseball cards as vehicles to teach children various skills and concepts from a variety of subject fields. Card-related activities include analyzing statistical data on the back of cards, finding cities where teams are located on maps and globes, and measuring distances…

  15. Weyl card diagrams

    SciTech Connect

    Jones, Gregory; Wang, John E.

    2005-06-15

    To capture important physical properties of a spacetime we construct a new diagram, the card diagram, which accurately draws generalized Weyl spacetimes in arbitrary dimensions by encoding their global spacetime structure, singularities, horizons, and some aspects of causal structure including null infinity. Card diagrams draw only nontrivial directions providing a clearer picture of the geometric features of spacetimes as compared to Penrose diagrams, and can change continuously as a function of the geometric parameters. One of our main results is to describe how Weyl rods are traversable horizons and the entirety of the spacetime can be mapped out. We review Weyl techniques and as examples we systematically discuss properties of a variety of solutions including Kerr-Newman black holes, black rings, expanding bubbles, and recent spacelike-brane solutions. Families of solutions will share qualitatively similar cards. In addition we show how card diagrams not only capture information about a geometry but also its analytic continuations by providing a geometric picture of analytic continuation. Weyl techniques are generalized to higher dimensional charged solutions and applied to generate perturbations of bubble and S-brane solutions by Israel-Khan rods.

  16. Smart Icon Cards

    ERIC Educational Resources Information Center

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  17. Chesapeake Bay Report Card

    E-print Network

    Boynton, Walter R.

    -lying habitats Shallow-water habitats Storms Natural vulnerabilityHuman-caused vulnerability Marsh migration Change Resilience Index addresses both human-caused and natural vulnerabilities of Chesapeake BayChesapeake Bay Report Card 2013 C #12;We are creating the Climate Change Resilience Index using a 5

  18. Mills Creek Report Card

    E-print Network

    Hilderbrand, Robert H.

    Mills Creek Report Card 2013 #12;§¨¦80 Huron River Watershed Old Woman Creek Watershed Chappel BAY VIEW Lake Erie Sandusky Bay Sandusky Bay Drainage Mills Creek Watershed Pipe Creek Watershed primarily of small creek systems: Cold Creek, Mills Creek, Pipe Creek, Sawmill Creek, Old Woman Creek

  19. Sassafras River Report Card

    E-print Network

    Hilderbrand, Robert H.

    Sassafras River Report Card 2011 Sassafras River Association P.O. Box 333 · Georgetown, MD 21930, and ensuring they have minimal impact on the Sassafras River, and ultimately the Bay. Sassafras River Between WK04 and WK03 Sassfras River and Tributaries Sassafras Watershed 0 2.5 51.25 Miles ³ 42 46 43 4852

  20. The Alumni Credit Card.

    ERIC Educational Resources Information Center

    Clotfelter, Susan C.

    1987-01-01

    One of the hottest movements in banking right now is affinity credit cards. For banks, they mean a new source of credit customers. For institutions and alumni organizations, they can mean an easy, inexpensive way to keep the institutional name in front of alumni. (MLW)

  1. The Eggen Card Project

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2014-06-01

    (Abstract only) Olin Eggen, noted astronomer (1919-1998), left to us all his raw observation records recorded on 3x5 cards. This project is to make all this data available as an online resource. History and progress of the project will be presented. Project details available at: https://sites.google.com/site/eggencards/home.

  2. A Ration Card 

    E-print Network

    Ben [writer of accompanying material; Lizzie [writer of accompanying material

    2012-03-05

    TRANSCRIPTION; MESSAGE: Waterloo; Oct. 31st/ 1918; Dear Willy; How do you like this for a ration card, we have had fine weather all the time, hope you are better. Lizzie [and] Ben; SENT TO: J. W. Caraluther/"The grange"/Gawthorpe green/Kirkheaton/Huddersfield...

  3. Report Card Huron River

    E-print Network

    Boynton, Walter R.

    -driven system When it rains, it drains; and these storm events move pollutants through the watershed. When PipeReport Card Pipe Creek 2013 #12;§¨¦80 Huron River Watershed Old Woman Creek Watershed Chappel Creek BAY VIEW Lake Erie Sandusky Bay Sandusky Bay Drainage Mills Creek Watershed Pipe Creek Watershed

  4. Educational Card Games

    ERIC Educational Resources Information Center

    Smith, D. R.; Munro, E.

    2009-01-01

    A number of years have passed since the development of the "Voyager: Satellites" educational card game reported in "Physics Education" in 2003. Since then, a large number of copies of the game have been produced and distributed across the UK, to a warm reception from both pupils and teachers. This article reports on some of the feedback received…

  5. Smart card multiple function badge

    SciTech Connect

    Nelson, R.A.

    1993-06-01

    Smart cards are credit card-sized computers with integrated data storage, an operating system to manage the data, and built-in security features that protect the data. They are used to distribute information to remote sites, providing the same or greater reliability, data integrity, and information security than a network system. However, smart cards may provide greater functionality at a lower cost than network systems. The US Department of Energy Hanford Site is developing the smart card to be used as a multiple function identification badge that will service various data management requirements on the Site. This paper discusses smart card technology and the proposed Hanford Site applications.

  6. Port Card Moduel

    SciTech Connect

    Utes, M.; /Fermilab

    1994-05-02

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition & Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards, 66 to 100 SARs, and four to eight SARCs.

  7. Credit Card Solicitation Policies in Higher Education: Does "Protecting" Our Students Make a Difference?

    ERIC Educational Resources Information Center

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd S.

    2001-01-01

    Reports on a study that investigated the effect of a university's solicitation policy on students' acquisition and usage of credit cards. Attempts by universities to limit access to and use of credit cards appear to be ineffective. Suggests alternative policies be constructed around teaching students sound money management skills. (Author/JDM)

  8. Web Card - Clean Cities Plug-In Electric Vehicle Handbook for Public Charging Station Hosts

    SciTech Connect

    2012-07-01

    A 2" x 3-1/4" web card which has a quick response code for accessing the PEV Handbook for Public Charging Station Hosts via a smart phone. The cards are intended to be handed out instead of the handbook.

  9. CREDIT CARD BILLING AUTHORIZATION FORM GROUP GUEST INFORMATION

    E-print Network

    Chen, Shu-Ching

    CREDIT CARD BILLING AUTHORIZATION FORM GROUP GUEST INFORMATION COMPANY NAME: IEEE / The Institute): _________________________________________________________________________________________ CARD HOLDER INFORMATION CARD NUMBER: __________________________________________________________ EXPIRATION DATE: _________________________ NAME AS IT APPEARS ON CARD

  10. Time Card Entry System

    Energy Science and Technology Software Center (ESTSC)

    1996-05-07

    The Time Card Entry System was developed for the Department of Enegy, Idaho Operations Office (DOE-ID) to interface with the DOE headquarters (DOE-HQ) Electronic Time and Attendance (ETA) system for payroll. It features pop-up window pick lists for Work Breakdown Structure numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills U.S. Government/OMB requirements before Timekeepers process the data at the end of the two weekmore »payroll cycle using ETA. A tour of duty profile (e.g., ten hour day, four day week with Sunday, friday and Saturday off), previously established in the ETA system, is imported into the Time Card Entry System by the timekeepers. An individual''s profile establishes the basis for validation of time of day and number of hours worked per day. At the end of the two cycle, data is exported by the timekeepers from the Time Card Entry System into ETA files.« less

  11. PAYMENT CARD SECURITY ETHICS CERTIFICATION I confirm that acting as an employee of the University of Florida, I will keep in strictest confidence all credit

    E-print Network

    Sin, Peter

    PAYMENT CARD SECURITY ­ ETHICS CERTIFICATION I confirm that acting as an employee of the University of Florida, I will keep in strictest confidence all credit and/or debit card information to which I have access in a manner pursuant to the enterprise wide UF Payment Card Policy and respective directives. I

  12. ACADEMIC AFFAIRS ACCESS AND ADMINISTRATION

    E-print Network

    Arnold, Elizabeth A.

    Payable Bookstore Budget Management Card Services Controller, Accounting & Reporting ControllerACADEMIC AFFAIRS ACCESS AND ENROLLMENT MANAGEMENT ADMINISTRATION AND FINANCE STUDENT AFFAIRS, Accounting Operations & Disbursements Copy Centers Dining Services Facilities Management Finance Human

  13. ACADEMIC AFFAIRS ACCESS AND ADMINISTRATION

    E-print Network

    Arnold, Elizabeth A.

    of Visitors University Events Valley Scholars Accounts Payable Bookstore Budget Management Card ServicesACADEMIC AFFAIRS ACCESS AND ENROLLMENT MANAGEMENT ADMINISTRATION AND FINANCE STUDENT AFFAIRS Services Facilities Management Finance Human Resources, Training & Performance Information Technology

  14. 1 REVISED October 2013 Purchasing Card

    E-print Network

    Calgary, University of

    1 REVISED October 2013 Purchasing Card Cardholder Handbook Purchasing Card Program 2500 University number is conveniently located on the back of your card) #12;2 REVISED October 2013 Lost or Stolen Card If your card is lost or stolen, it is important to report it lost or stolen immediately to prevent misuse

  15. Jefferson Lab's Trim Card II

    SciTech Connect

    Trent Allison; Sarin Philip; C. Higgins; Edward Martin; William Merz

    2005-05-01

    Jefferson Lab's Continuous Electron Beam Accelerator Facility (CEBAF) uses Trim Card I power supplies to drive approximately 1900 correction magnets. These trim cards have had a long and illustrious service record. However, some of the employed technology is now obsolete, making it difficult to maintain the system and retain adequate spares. The Trim Card II is being developed to act as a transparent replacement for its aging predecessor. A modular approach has been taken in its development to facilitate the substitution of sections for future improvements and maintenance. The resulting design has been divided into a motherboard and 7 daughter cards which has also allowed for parallel development. The Trim Card II utilizes modern technologies such as a Field Programmable Gate Array (FPGA) and a microprocessor to embed trim card controls and diagnostics. These reprogrammable devices also provide the versatility to incorporate future requirements.

  16. 3.30 Travel Card Page 1 of 3 Travel Card

    E-print Network

    Hung, I-Kuai

    3.30 Travel Card Page 1 of 3 Travel Card Original Implementation: October 27, 2014 Last Revision: None The university travel card (t-card) is designed as a payment method for travel and travel related expenses. Approved university employees may use the t-card in accordance with the T-Card Program Guide

  17. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  18. HyperCLIPS: A HyperCard interface to CLIPS

    NASA Technical Reports Server (NTRS)

    Pickering, Brad; Hill, Randall W., Jr.

    1990-01-01

    HyperCLIPS combines the intuitive, interactive user interface of the Apple Macintosh(TM) with the powerful symbolic computation of an expert system interpreter. HyperCard(TM) is an excellent environment for quickly developing the front end of an application with buttons, dialogs, and pictures, while the CLIPS interpreter provides a powerful inference engine for complex problem solving and analysis. By integrating HyperCard and CLIPS the advantages and uses of both packages are made available for a wide range of uses: rapid prototyping of knowledge-based expert systems, interactive simulations of physical systems, and intelligent control of hypertext processes, to name a few. Interfacing HyperCard and CLIPS is natural. HyperCard was designed to be extended through the use of external commands (XCMDs), and CLIPS was designed to be embedded through the use of the I/O router facilities and callable interface routines. With the exception of some technical difficulties which will be discussed later, HyperCLIPS implements this interface in a straight forward manner, using the facilities provided. An XCMD called 'ClipsX' was added to HyperCard to give access to the CLIPS routines: clear, load, reset, and run. And an I/O router was added to CLIPS to handle the communication of data between CLIPS and HyperCard.

  19. CARD No. 53 Consideration of Underground Sources of Drinking Water

    E-print Network

    exposure of individuals and the possible levels of radioactive contamination of ground water dueCARD No. 53 Consideration of Underground Sources of Drinking Water 53.A.1 BACKGROUND The Compliance repository area from the accessible environment. That is, they restrict to very low levels the amounts

  20. EagleCard Agreement Form Date Eagle ID Number

    E-print Network

    Hutcheon, James M.

    . Eaglexpress is accepted both on and off campus. You can go to the EagleCard website (http activity are also available through our website at: https://eaglecard.georgiasouthern.edu Eagle Dining to a cashier, in order to verify user identification before accessing and/or usage of an Eagle Unlimited

  1. ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment

    NASA Astrophysics Data System (ADS)

    Hoyer, Philip

    This paper will describe the highlights of the ActivIdentity sponsored Datamonitor study into Return On Investment (ROI) when implementing smart cards in the enterprise in the following areas: physical and logical access convergence, remote access when replacing OTP tokens and Enterprise Single Sign-On. It also provides additional information about the pitfalls to avoid when implementing smart cards and describes best practices for deployment.

  2. CACUL1/CAC1 Regulates the Antioxidant Response by Stabilizing Nrf2

    PubMed Central

    Kigoshi, Yu; Fukuda, Tomomi; Endo, Tomoyuki; Hayasaka, Nami; Iemura, Shun-ichiro; Natsume, Toru; Tsuruta, Fuminori; Chiba, Tomoki

    2015-01-01

    Nrf2 is the pre-dominant transcription activator responsible for coordinated up-regulation of ARE-driven antioxidant and detoxification genes. The activity of Nrf2 is tightly regulated at basal levels through its ubiquitination by Cul3-Keap1 and consequential degradation. Upon exposure to stress, the Cul3-Keap1 ligase is inhibited, leading to Nrf2 stabilization and activation. Here we describe CACUL1/CAC1 as a positive regulator of the Nrf2 pathway. We found that CACUL1 is up-regulated by Nrf2-activating oxidative stresses in cells and in mice. The association of CACUL1 with the Cul3-Keap1 complex led to a decrease in Nrf2 ubiquitination levels at non-stressed as well as stressed conditions, and sensitized cells for higher Nrf2 activation. Furthermore, CACUL1 knock-down led to a decrease in Nrf2 activity and cell viability under stress. Our results show that CACUL1 is a regulator of Nrf2 ubiquitination, adding another regulatory layer to the Nrf2 antioxidant stress response. PMID:26238671

  3. PayFlex Card PayFlex Card

    E-print Network

    Hub.com. View your available balance on My Dashboard. Solve card troubles quickly online Quick tip: If your card online. Log in to HealthHub.com. On left side of My Dashboard, click on Shop Online. There you can use

  4. CardS4: Modal Theorem Proving on Java Smartcards

    E-print Network

    Goré, Rajeev

    as the basis of an on-board security manager for restricting the flow of "secrets" between multiple the card and the terminal (a PC, an ATM machine, a public telephone, or even a mobile telephone). Java are preprogrammed to contain applets by the man- ufacturer for the card vendor, typically a bank (for credit

  5. 75 FR 48655 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-11

    ...AND DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records may be stored...records are deployed on accredited systems with access restricted by the use of Common Access Card (CAC) and assigned system roles. The Web-based files...

  6. PREL Pacific Region Language Cards.

    ERIC Educational Resources Information Center

    Pacific Region Educational Lab., Honolulu, HI.

    This collection of 10 cue cards presents English translations of common English words and expressions into 10 Pacific Region languages: Palauan, Samoan, Chamorro, Hawaiian, Carolinian, Chuukese, Pohnpeian, Marshallese, Yapese, and Kosraean. The cards translate the following: hello, good morning, good afternoon, good night, thank you, you're…

  7. Applying a Metrics Report Card

    ERIC Educational Resources Information Center

    Klubeck, Martin; Langthorne, Michael

    2008-01-01

    In this article, the authors suggest that providing a report card enables an IT department to check its progress and overall performance; communicate the department's effectiveness to university leadership, IT membership, and customers; and make any necessary adjustments. A report card will not show how efficiently the IT department functions, but…

  8. Authentication techniques for smart cards

    SciTech Connect

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  9. To use the cards: The file, mushroom cards.pdf, is full set of the current cards used at the Joint University

    E-print Network

    To use the cards: The file, mushroom cards.pdf, is full set of the current cards used at the Joint University Mendocino Foray. The file, mushroom_cards (no lichens).pdf, is the same set minus about 30 cards: If you would like to help correct and improve these download the excel file Mushroom_cards.xls. Each card

  10. Menaquinone-7 Supplementation to Reduce Vascular Calcification in Patients with Coronary Artery Disease: Rationale and Study Protocol (VitaK-CAC Trial)

    PubMed Central

    Vossen, Liv M.; Schurgers, Leon J.; van Varik, Bernard J.; Kietselaer, Bas L. J. H.; Vermeer, Cees; Meeder, Johannes G.; Rahel, Braim M.; van Cauteren, Yvonne J. M.; Hoffland, Ge A.; Rennenberg, Roger J. M. W.; Reesink, Koen D.; de Leeuw, Peter W.; Kroon, Abraham A.

    2015-01-01

    Coronary artery calcification (CAC) develops early in the pathogenesis of atherosclerosis and is a strong and independent predictor of cardiovascular disease (CVD). Arterial calcification is caused by an imbalance in calcification regulatory mechanisms. An important inhibitor of calcification is vitamin K-dependent matrix Gla protein (MGP). Both preclinical and clinical studies have shown that inhibition of the vitamin K-cycle by vitamin K antagonists (VKA) results in elevated uncarboxylated MGP (ucMGP) and subsequently in extensive arterial calcification. This led us to hypothesize that vitamin K supplementation may slow down the progression of calcification. To test this, we designed the VitaK-CAC trial which analyses effects of menaquinone-7 (MK-7) supplementation on progression of CAC. The trial is a double-blind, randomized, placebo-controlled trial including patients with coronary artery disease (CAD). Patients with a baseline Agatston CAC-score between 50 and 400 will be randomized to an intervention-group (360 microgram MK-7) or a placebo group. Treatment duration will be 24 months. The primary endpoint is the difference in CAC-score progression between both groups. Secondary endpoints include changes in arterial structure and function, and associations with biomarkers. We hypothesize that treatment with MK-7 will slow down or arrest the progression of CAC and that this trial may lead to a treatment option for vascular calcification and subsequent CVD. PMID:26516910

  11. Photocatalytic degradation of an azo dye Sunset Yellow under UV-A light using TiO2/CAC composite catalysts.

    PubMed

    Rajamanickam, D; Shanthi, M

    2014-07-15

    The photocatalytic activity and the promoting effect of titania (TiO2) by commercial activated carbon (CAC) for removing the pollutant in wastewater were investigated. The TiO2/CAC composite photocatalysts with various ratios of CAC to TiO2 were prepared by sol-gel method. The catalyst was characterized by X-ray diffraction (XRD), high resolution scanning electron microscope (HR-SEM), energy dispersive spectra (EDS), diffuse reflectance spectra (DRS), photoluminescence spectra (PL), X-ray photoelectron spectroscopy (XPS) and Brunauer-Emmett-Teller (BET) surface area measurement methods. The photocatalytic activity of TiO2/CAC was investigated for the degradation of Sunset Yellow (SY) in aqueous solution using UV-A light. The TiO2/CAC is found to be more efficient than prepared TiO2 and TiO2-P25 at pH 7 for the mineralization of SY. The synergism between TiO2 and CAC may increase the catalytic activity. The effects of operational parameters such as the amount of photocatalyst, dye concentration and initial pH on photo mineralization of SY have been analyzed. The mineralization of SY has been confirmed by COD measurements. The catalyst is found to be reusable. PMID:24662758

  12. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  13. Logging in with a card Scan your LU card using the card reader to the left of the display.

    E-print Network

    Logging in with a card Scan your LU card using the card reader to the left of the display. Logging in without a card Log in by pressing the Log in button on the display and entering your StiL identity

  14. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  15. Punch Card Programmable Microfluidics

    PubMed Central

    Korir, George; Prakash, Manu

    2015-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series of holes in punched paper tapes, we demonstrate independent control of 15 on-chip pumps with enhanced mixing, normally-closed valves and a novel on-demand impact-based droplet generator. We demonstrate robustness of operation by encoding a string of characters representing the word “PUNCHCARD MICROFLUIDICS” using the droplet generator. Multiplexing is demonstrated by implementing an example colorimetric water quality assays for pH, ammonia, nitrite and nitrate content in different water samples. With its portable and robust design, low cost and ease-of-use, we envision punch card programmable microfluidics will bring complex control of microfluidic chips into field-based applications in low-resource settings and in the hands of children around the world. PMID:25738834

  16. Punch card programmable microfluidics.

    PubMed

    Korir, George; Prakash, Manu

    2015-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series of holes in punched paper tapes, we demonstrate independent control of 15 on-chip pumps with enhanced mixing, normally-closed valves and a novel on-demand impact-based droplet generator. We demonstrate robustness of operation by encoding a string of characters representing the word "PUNCHCARD MICROFLUIDICS" using the droplet generator. Multiplexing is demonstrated by implementing an example colorimetric water quality assays for pH, ammonia, nitrite and nitrate content in different water samples. With its portable and robust design, low cost and ease-of-use, we envision punch card programmable microfluidics will bring complex control of microfluidic chips into field-based applications in low-resource settings and in the hands of children around the world. PMID:25738834

  17. Smart Playing Cards A Ubiquitous Computing Game

    E-print Network

    Smart Playing Cards A Ubiquitous Computing Game Kay R¨omer Department of Computer Science ETH the "Smart Playing Cards" application, a ubiquitous computing game that augments a classical card game of ubiquitous computing, designing and im- plementing the Smart Playing Cards application gave us some insight

  18. Dealing Cards in Poker Games Philippe Golle

    E-print Network

    Golle, Philippe

    1 Dealing Cards in Poker Games Philippe Golle Palo Alto Research Center pgolle@parc.com Abstract-- This paper proposes a new protocol for shuffling and dealing cards, that is designed specifically for games card-shuffling protocols: 1) cards in poker games are dealt in rounds, with betting in-between, rather

  19. Purchasing Card (PCard) Program and User Guide

    E-print Network

    Purchasing Card (PCard) Program and User Guide Updated November 25, 2013 St. Francis Xavier University Visa® Purchasing Card #12;Purchasing Card (PCard) Program Guide November 25, 2013 Page 1 of 18 ........................................................................................17 #12;Purchasing Card (PCard) Program Guide November 25, 2013 Page 2 of 18 Purpose of Program

  20. Interface card specification (Version 0.99)

    E-print Network

    Interface card specification (Version 0.99) Interface card (version 0.99) has passed the test beam run. This note describes the basic aspects of the current version of the card, The data format has LSC card, working at 20 bits, 40MHz mode, data rate 640Mbit/s. 3. Dual channel readout redundancy. 4

  1. 2006 Chesapeake Bay health report card

    E-print Network

    Hilderbrand, Robert H.

    2006 Chesapeake Bay health report card Ben Longstaff1, Michael Williams2 and Bill Dennison2 1 Eco of producing a Chesapeake Bay Report Card · Why and how we produce the Chesapeake Bay Report Card · Health of Chesapeake bay in 2006 #12;Why produce a report card · Provide a performance derived letter or numeric grade

  2. ONE CARD OFFICE MEAL PLAN ADJUSTMENT FORM

    E-print Network

    Olszewski Jr., Edward A.

    ONE CARD OFFICE MEAL PLAN ADJUSTMENT FORM http://uncw.edu/onecard/studentmealplans.html (910) 962 or send this completed form to the One Card Office in Warwick Center. Paying by Cash, Check, or Credit Card - please bring the completed form to the One Card Office in Warwick Center. , , Digital Signature

  3. FUEL CARD POLICY Table of Contents

    E-print Network

    FUEL CARD POLICY Table of Contents 1. Policy 2. Procedures 3. Appendix I ­ Litres Plus Card to strengthen controls over vehicle operating costs, the University has adopted a policy of using "fuel cards for implementing the Fuel Card Policy and procedures is entrusted to the director of auxiliary services who may

  4. Credit Card Security Florida Atlantic University

    E-print Network

    Fernandez, Eduardo

    Credit Card Security Florida Atlantic University Accepting Credit Cards: Self Assessment Questionnaire The authority to accept credit cards (in person, by mail, phone or online) must be specifically granted by the Controller's Office. Our department accepts credit cards (check all that apply

  5. Credit Cards. Bulletin No. 721. (Revised.)

    ERIC Educational Resources Information Center

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  6. Patron ID Cards Made Easy and Cheap

    ERIC Educational Resources Information Center

    Peischl, Tom

    1978-01-01

    Four major problems of academic library identification cards are expense, distribution, timeliness, and validation. By moving from a commercially produced plastic library card to a locally produced paper IBM-type card, this library solved these four library card problems. (Author)

  7. The University of Arizona Purchasing Card Individual Credit Card Application

    E-print Network

    Ziurys, Lucy M.

    : _______________________________ City: _____________ State: _____ Zip Code: _______-_______ Cardholder Home Address (Cannot use P.O. Box): ____________________________________________________ City: _____________ State: _____ Zip Code: _______-_______ Cardholder Country of Citizenship "Restriction/Non-Allowable Purchases" are prohibited. If the card is lost or stolen, the cardholder

  8. An Introduction toAn Introduction to Smart Cards and RFIDsSmart Cards and RFIDs

    E-print Network

    Mitchell, Chris

    Communication Mobile Communication Every GSM phone contains a Smart Card called a SIM The SIM started life1 An Introduction toAn Introduction to Smart Cards and RFIDsSmart Cards and RFIDs An Introduction toAn Introduction to Smart Cards and RFIDsSmart Cards and RFIDs Prof. Keith E. Mayes Keith

  9. 17.11 Procurement Card Page 1 of 5 Procurement Card

    E-print Network

    Hung, I-Kuai

    17.11 Procurement Card Page 1 of 5 Procurement Card Original Implementation: July 26, 1999 Last Revision: January 29, 2013 Approved university employees may use the university procurement card (p-card) in accordance with the P-Card Program Guide to order supplies and small items in amounts not exceeding

  10. 10.7 Student ID Cards Page 1 of 2 Student ID Cards

    E-print Network

    Hung, I-Kuai

    10.7 Student ID Cards Page 1 of 2 Student ID Cards Original Implementation: Unpublished Last Revision: July 29, 2014 University student identification cards (IDs) are produced by the card services require the deposit of the ID card to use some resources. 8. Identification at the business office

  11. UAF INDIVIDUAL TRAVEL CARD ACCOUNT FORM Please review the Individual Travel Card Guide

    E-print Network

    UAF INDIVIDUAL TRAVEL CARD ACCOUNT FORM Please review the Individual Travel Card Guide http://www.uaf.edu/procurement/staff-faculty/info/card-info/travel-card-information/INDV-Guide.pdf New Individual Travel Cardholder Change Existing Individual Travel Card (enter information in the fields

  12. Card-based Cryptographic Protocols Using a Minimal Number of Cards

    E-print Network

    International Association for Cryptologic Research (IACR)

    Card-based Cryptographic Protocols Using a Minimal Number of Cards Alexander Koch, Stefan Walzer of playing cards. For example, den Boer (EUROCRYPT '89) devised his famous "five-card trick", which is a secure two-party AND protocol using five cards. However, the output of the protocol is revealed

  13. Wallet CardMy Asthma Carry This Card To Help

    E-print Network

    Shen, Jun

    Wallet CardMy Asthma Carry This Card To Help Control Your Asthma www.nhlbi.nih.gov s Your asthma and how to take them s How to use your inhaler and a peak flow meter, if you have one s Your asthma triggers and how to avoid them s Warning signs of an asthma attack and what you should do if your symptoms

  14. Stream processing health card application.

    PubMed

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data. PMID:22127523

  15. PROCUREMENT CARD GUIDELINES Background 3

    E-print Network

    Sun, Yi

    · Information 5 · Citibank Web Tools 1. CitiDirect 6 2. Citibank Electronic Reporting System (CERS) 6 3 Prior Approval 7 · Cardholder Review 7 · Disputed Items 8 · Lost or Stolen Credit Cards 9 · State

  16. Mississippi River Watershed Report Card

    E-print Network

    Hilderbrand, Robert H.

    Mississippi River Watershed Report Card CB Economy Floodcontrol&riskreduction Transportation N #12;We are America's Watershed Initiative America's Watershed Initiative is a collaboration for America's Watershed, for our future, and for our children's future. America's Watershed provides benefits

  17. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  18. Purchasing Card Policies and Procedure Revised February 10, 2015

    E-print Network

    Purchasing Card Policies and Procedure Manual Revised February 10, 2015 #12;Table of Contents 1.0 PURCHASING CARD OVERVIEW ..............................................................................................................................1 2.0 CARD FINANCIAL POLICY

  19. Targeting the poor in times of crisis: the Indonesian health card.

    PubMed

    Sparrow, Robert

    2008-05-01

    This paper looks at targeting performance of the Indonesian health card programme that was implemented in August 1998 to protect access to health care for the poor during the Indonesian economic crisis. By February 1999, 22 million people had received a health card. The health card provided a user fee waiver for public health care. Targeting of the health card was pro-poor, but with considerable leakage to the non-poor. Utilization of the health card for outpatient care was also pro-poor, but conditional on ownership, the middle quintiles were more likely to use the card. Targeting of the health card followed a decentralized design combining geographic targeting with community-based targeting instruments. This design facilitated the rapid implementation of the programme, but targeting performance suffered from a lack of information on the regional impact of the crisis, while at local level not all barriers to accessing health care services were overcome by the health card. Indirect and direct costs of seeking health care seem to be the main deterrent to using the health card, and are higher in more remote areas. Micro-simulations show that geographic targeting can contribute considerably to improving targeting performance, but most of the targeting gains are to be made at the local level, with district programme management and public health care providers. This study highlights the need for adequate and up-to-date social welfare indicators. In addition, further research would need to focus on how local knowledge can be utilized for signalling poverty dynamics and local barriers to access. PMID:18334517

  20. Passive microfluidic array card and reader

    DOEpatents

    Dugan, Lawrence Christopher (Modesto, CA); Coleman, Matthew A. (Oakland, CA)

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  1. 76 FR 67155 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ...and disposing of records in the system: Storage: Paper file folders and...is authorized to view. The HQWeb system is Common Access Card (CAC) enabled with...disposal: Destroy when 2 years old. System manager(s) and address:...

  2. Using the Sound Card as a Timer

    NASA Astrophysics Data System (ADS)

    Aguiar, C. E.; Pereira, M. M.

    2011-01-01

    Experiments in mechanics often involve measuring time intervals much smaller than one second, a task that is hard to perform with handheld stopwatches. This is one of the reasons why photogate timers are so popular in school labs. There is an interesting alternative to stopwatches and photogates, easily available if one has access to a personal computer with sound-recording capability. The idea is simple: a computer sound card can record audio frequencies up to several kilohertz, which means it has a time resolution of a fraction of a millisecond, comparable to that of photogate timers. Many experiments in mechanics can be timed by the sound they produce, and in these situations a direct audio recording may provide accurate measurements of the time intervals of interest. This idea has already been explored in a few cases,1-5 and here we apply it to an experiment that our students found very enjoyable: measuring the speed of soccer balls they kicked.

  3. Training Guide PeopleSoft Procurement Card 9.0

    E-print Network

    Training Guide PeopleSoft Procurement Card 9.0 Contents Using the Procurement Card Module...................................................... 1 KU Reconcile Procurement Card transactions ........................................................................ 2 KU department approval of p-card transactions

  4. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ...Docket NARA-09-004] RIN 3095-AB59 Researcher Identification Card AGENCY: National...amending its regulations to require researchers using original records, NARA microfilm...Building in Washington, DC, to obtain a researcher identification card. Under the...

  5. 75 FR 55392 - Employment Network Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... Employment Network Report Card AGENCY: Social Security Administration (SSA). ACTION: Notice of Webinar and... comments on Employment Network quality assurance, including a ticket consumer Employment Network Report Card. SUMMARY: We are soliciting the views of the public, beneficiaries, advocates, Employment...

  6. Card Lab: A Population Genetics Simulation Exercise.

    ERIC Educational Resources Information Center

    Easton, Christopher M.

    1997-01-01

    Explains the use of a card lab to demonstrate how a population bottleneck impacts genetic diversity and the survival of a population. Uses a standard deck of playing cards to show how age structure can magnify bottleneck effects. (DDR)

  7. Book Catalogs versus Card Catalogs *

    PubMed Central

    Pizer, Irwin H.

    1965-01-01

    The development of the library catalog in book form and its abandonment in favor of the card catalog are briefly traced. The advantages and disadvantages of both types of catalogs are enumerated, and several solutions which tried to combine the best features of both are discussed. The present trend back to the book catalog, made possible by recent advances in computer technology, is analyzed, advantages and disadvantages are compared, current examples are illustrated, and finally the computerized catalog is weighed against both the book and card catalog as to main features and practicality. PMID:14271116

  8. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-print Network

    International Association for Cryptologic Research (IACR)

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang-factor authentication mechanism, smart card based password authentication has been a subject of intensive research severely flawed, especially prone to the smart card security breach problem, shortly after they were first

  9. System Description: cardTAP : The First Theorem Prover on a Smart Card

    E-print Network

    Slater, Andrew

    System Description: cardTAP : The First Theorem Prover on a Smart Card Rajeev Gor´e1 , Joachim present the first implementation of a theorem prover run- ning on a smart card. The prover is written cards, the prover is restricted to propositional classical logic. It can be easily extended to full

  10. UD Credit Card Information Noncompliance with University or Departmental Policy may result in UD Credit Card

    E-print Network

    Firestone, Jeremy

    UD Credit Card Information Noncompliance with University or Departmental Policy may result in UD Credit Card cancelation or credit limit reduction. 1. Review the credit card tutorials at: http forgotten your username, contact Procurement Services at 302-831-2161. 3. UD Credit Card Activation When

  11. Library Card Application How did you hear about our resident patron card? _______________________________

    E-print Network

    Tullos, Desiree

    Library Card Application How did you hear about our resident patron card responsibility for the use of this card and payment of fines and fees charged to it Give immediate notice to the library of loss of card or change of address Applicant Signature _________________________ Date

  12. System Description: cardT A P : The First Theorem

    E-print Network

    Goré, Rajeev

    System Description: cardT A P : The First Theorem Prover on a Smart Card Rajeev Gor'e 1 , Joachim present the first implementation of a theorem prover run­ ning on a smart card. The prover is written functions based on trusted devices such as smart cards. 1 Smart Cards: the Secure PC of Tomorrow Smart cards

  13. A Program Logic for Handling JAVA CARD's Transaction Mechanism

    E-print Network

    Mostowski, Wojciech

    smart cards. This choice is motivated by the following reasons. First of all JAVA CARD applications with additional rules and concepts: the persistency of the objects stored on a smart card in combination with JAVA of a card "rip out" (unexpected termination of a JAVA CARD program by taking the smart card out

  14. Card-cyclic-to-random shuffling with Johan Jonasson

    E-print Network

    Jonasson, Johan

    Card-cyclic-to-random shuffling with relabeling Johan Jonasson March 11, 2014 Abstract The card-cyclic-to-random shuffle is the card shuffle where the n cards are labeled 1, . . . , n according to their starting positions. Then the cards are mixed by first picking card 1 from the deck and reinserting it at a uniformly

  15. Cards in the Classroom: Mathematics and Methods.

    ERIC Educational Resources Information Center

    Baker, Robert N.

    This report researches the use of a standard deck of playing cards in entry-level college mathematics classrooms. The study looks at published research on the use of cards, and reviews pedagogic concerns directly related to the implementation of playing cards in the classroom--including the appropriateness of manipulatives, the link to cooperative…

  16. Gulf of Mexico Report Card Initiative

    E-print Network

    Hilderbrand, Robert H.

    with prospectus Gulf of Mexico Report Card Initiative with Harte Research Institute for Gulf McKinney Wes Tunnell #12;2 #12;3 for a Gulf of Mexico Report Card that is unequaled in the world of the scale and comprehensiveness of the proposed Gulf of Mexico Report Card, we believe it has the potential

  17. MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS

    E-print Network

    Boyd, Colin

    MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS Jason Reid, Mark Looi Information Security Manufacturers and producers of smart card systems are all beginning to climb on the certification bandwagon. In this paper, we analyse the current state of smart card certifications and present arguments as to why smart

  18. SMART TOOLS FOR JAVA CARDS Isabelle Attali

    E-print Network

    Nilsson, Henrik

    SMART TOOLS FOR JAVA CARDS Isabelle Attali Denis Caromel Carine Courbis Ludovic Henrio and Henrik in applications involving smart cards. However, this article focuses on the basic aspects of our programming Nilsson INRIA ­ CNRS ­ I3S ­ UNSA First.Last@sophia.inria.fr Abstract This article describes a Java Card

  19. Smart Card Embedded Information Systems: a

    E-print Network

    Schreiber, Fabio A.

    Smart Card Embedded Information Systems: a Methodology for Privacy Oriented Architectural Design C. Bolchini, F. A. Schreiber Data and Knowledge Engineering Vol. 41, n. 2­3, pp. 159­182 #12; 2 Smart Card for smart cards and for portable embedded systems is deeply constrained by the peculiar features

  20. RESEARCH ARTICLE Iridovirus CARD Protein Inhibits Apoptosis

    E-print Network

    Gray, Matthew

    inhibited in cells expressing GIV-CARD. HeLa cells irradiated with UV or treated with anti-Fas antibody-expression of re- combinant GIV-CARD protein in HeLa cells inhibited apoptosis induced by mitochondrial and death receptor signaling. Finally, we report that expression of GIV-CARD in HeLa cells significantly reduced

  1. Fully Verified JAVA CARD API Reference Implementation

    E-print Network

    Mostowski, Wojciech

    environment. Sim- ilarly to a simulator, the KeY verifier also needs to handle low-level JAVA CARD specificFully Verified JAVA CARD API Reference Implementation Wojciech Mostowski Computing Science verified reference implementation of the JAVA CARD API. This case study has been developed with the Ke

  2. 550 100 130 -00 Rosetta Smart Card

    E-print Network

    550 100 130 - 00 Rosetta Smart Card Model Number: SC410-G Security Policy, Level 3 Version 1.4 Date other notices provided herein. SPYRUS, the SPYRUS logos, Lynks Privacy Card, Security In A Box, and SPEX/ are registered trademarks of SPYRUS. Algorithm Agile, CRYPTOCALCULATOR, Hydra Privacy Card, Lynks Metering Device

  3. NISTIR 7284 Personal Identity Verification Card

    E-print Network

    NISTIR 7284 Personal Identity Verification Card Management Report Jim Dray David Corcoran #12;Personal Identity Verification Card Management Report NISTIR 7284 Jim Dray David Corcoran C O M P U T E R William A. Jeffrey, Director #12;Personal Identity Verification Card Management Report REPORTS ON COMPUTER

  4. A Card Trick Gabriela R. Sanchis

    E-print Network

    Sanchis, Gabriela

    A Card Trick Gabriela R. Sanchis Department of Mathematical Sciences Elizabethtown College Elizabethtown, PA 17022 July 3, 2003 1 Introduction Suppose we have a deck of 21 cards that have been arranged in an array of seven rows and three columns. We ask a friend to choose a card and to tell you only which

  5. COMMERCIAL CARD CLAIMS STATEMENT OF DISPUTED ITEM

    E-print Network

    COMMERCIAL CARD CLAIMS STATEMENT OF DISPUTED ITEM Instructions: Your company should first make good the billing close date to: Bank of America ­ Commercial Card Services Operations P. O. Box 53142 Phoenix, AZ of America card was in my possession at the time of the transaction. 2._____ Charge Amount Does Not Agree

  6. Express Card Department Administrator Authorization Form

    E-print Network

    California at San Diego, University of

    Express Card Department Administrator Authorization Form Proposed Department Administrator: NAME required signatures, and submit via BFSupport; Buying Goods and Services; Express Card Our central business office has a commitment to the Express Card program and approves participation We are ready to design

  7. Purchasing Card Program J.P. Morgan

    E-print Network

    1 HANDBOOK ©June 2013 #12;2 Purchasing Card Program J.P. Morgan Customer Service Line: 1-800-316-6056 When contacting the bank you should be ready with: 1. Your 16 digit card number 2. Your Pin (last 4://fbs.admin.utah.edu/pcard/ Resources Other Resources Name Title E-mail Address Phone Jane Scott Purchasing Card Manager jscott

  8. UNIVERSITY OF NORTHERN BRITISH COLUMBIA PROCUREMENT CARD

    E-print Network

    Northern British Columbia, University of

    UNIVERSITY OF NORTHERN BRITISH COLUMBIA PROCUREMENT CARD APPLICATION FORM From: Name/or Budget Holder) Will TRAVEL be allowed on this card? YES NO Will food and entertainment expenses be allowed? YES NO A University Procurement card is requested for the following staff/faculty member

  9. Card Templates These card templates accompany the article "A magic trick based on the Hamming code,"by Todd

    E-print Network

    Card Templates These card templates accompany the article "A magic trick based on the Hamming code in this directory: one for each of the seven colored cards, and one for the base card. Instructions: 1. Print and cut out each card. 2. Carefully glue the front and back of the colored cards together, so the color

  10. Christophe Giraud Oberthur Card Systems,

    E-print Network

    International Association for Cryptologic Research (IACR)

    DFA on AES Christophe Giraud Oberthur Card Systems, 25, rue Auguste Blanche, 92800 Puteaux, France in breaking an RSA CRT with both a correct and a faulty signature of the same message. Lenstra then improved of a known message. In October 1996, Biham and Shamir published an attack on secret key cryptosystems [6

  11. "Voyager": An Educational Card Game

    ERIC Educational Resources Information Center

    Smith, David Ryan

    2003-01-01

    "Voyager" is an educational card game involving scientific satellites, developed for use in schools with children aged 9 to 13 years. The idea of the game is to improve pupils' knowledge about the large number of scientific satellites there are in space in a fun way, while also practising numeracy skills. Several copies of the game were produced…

  12. Long Island Sound Report Card

    E-print Network

    Boynton, Walter R.

    Long Island Sound Report Card Grading the water quality and ecosystem health of the Urban Sea #12 EasternCentralEastern Narrows The east-west gradient of people and pollution Long Island Sound (100 meters). Both development and density of people increase from east to west along the Sound

  13. Review of Sound Card Photogates

    ERIC Educational Resources Information Center

    Gingl, Zoltan; Mingesz, Robert; Makra, Peter; Mellar, Janos

    2011-01-01

    Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card--an interface for analogue…

  14. Accidental mobile phone card ingestion.

    PubMed

    Dixit, Sudesh; Mekwan, Jayanand; Brayley, Nigel F

    2009-01-01

    Accidental overdose, poisoning and foreign-body ingestion are common presentations to the emergency department. Usually, the ingested material is a common drug or household product. We present an unusual case of accidental ingestion where the foreign body was a mobile phone simulation (SIM) card. PMID:21686554

  15. Bus-Programmable Slave Card

    NASA Technical Reports Server (NTRS)

    Hall, William A.

    1990-01-01

    Slave microprocessors in multimicroprocessor computing system contains modified circuit cards programmed via bus connecting master processor with slave microprocessors. Enables interactive, microprocessor-based, single-loop control. Confers ability to load and run program from master/slave bus, without need for microprocessor development station. Tristate buffers latch all data and information on status. Slave central processing unit never connected directly to bus.

  16. CARD No. 22 Quality Assurance

    E-print Network

    CARD No. 22 Quality Assurance 22.A.1 BACKGROUND Quality assurance (QA) is a process for enhancing). Section 194.22, Quality Assurance, sets requirements that apply to data and information collected quality assurance (NQA) are referenced in 40 CFR 194.22(a)(1). The NQA standards contain numerous QA

  17. Comparing Candidate Hospital Report Cards

    SciTech Connect

    Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

    1997-12-31

    We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

  18. Anisotropic Electron-Phonon Coupling and Dynamical Nesting on the Graphene Sheets in Superconducting CaC6 using Angle-Resolved Photoemission Spectroscopy

    E-print Network

    Johnson, Peter D.

    of electronic structure in CaC6, a super- conducting graphite intercalation compound with Tc ¼ 11:6 K. We find (Madagascan) in a lithium/calcium alloy for 10 days, as described in detail by Pruvost et al. [16]. X-ray dif

  19. Co-Co2C and Co-Co2C/AC Catalysts for Hydroformylation of 1Hexene under Low Pressure: Experimental and Theoretical Studies

    E-print Network

    Li, Weixue

    : Unsupported Co-Co2C catalyst and active carbon supported Co-Co2C (Co-Co2C/AC) catalysts were prepared and have-based catalysts (supported by activated carbon, Co/AC), especially Rh-promoted Co/AC catalysts, were active of Catalysis, Dalian Institute of Chemical Physics, Chinese Academy of Sciences, Dalian, 116023, China

  20. Retention of data in heat-damaged SIM cards and potential recovery methods.

    PubMed

    Jones, B J; Kenyon, A J

    2008-05-01

    Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable. PMID:18054828

  1. Reporting lost or stolen cards If the SU I.D. card is lost or stolen, report it immediately

    E-print Network

    McConnell, Terry

    an interdepartmental order form. SYRACUSE UNIVERSITY I.D. Card SERVICES #12;The card SU I.D. cards are "smart" cardsReporting lost or stolen cards If the SU I.D. card is lost or stolen, report it immediately to Housing, Meal Plan, and I.D. Card Services weekdays during the hours of 8:30 a.m. to 4:30 p.m. at 315

  2. CARD No. 26 Expert Judgment

    E-print Network

    -I-17), April 17, 1997 (Docket A-93-02, Item II-I-25), and April 25, 1997 (Docket A-93-02, Item II-I-27CARD No. 26 Expert Judgment 26.A.1 BACKGROUND The requirements of Section 194.26 apply to expert, physical constants, etc.). EPA requested in letters to DOE dated March 19, 1997 (Docket A-93-02, Item II

  3. A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.

    PubMed

    Huang, Jyh-Win; Hou, Ting-Wei

    2007-06-01

    Besides the overall budget for building the infrastructure of a healthcare-service-based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 plus medical institutions. One was who was to pay for the network (ADSL or modem) connection fee; the other was who was to pay for the firewall/anti-virus software. This paper addresses the second issue by proposing an efficient freeware firewall, named card-assisted firewall (CAF), for NHI VPN edge-hosts, which is also an add-on-value application of the National Healthcare IC card that every insurant and medical professional has. The innovative concept is that any NHI VPN site (edge-host) can establish diversified secure-authenticated connections with other sites only by an authentication mechanism, which requires a NHI Java card state machine and the Access Control List of the host. It is different from two-factor authentication cards in four ways: (1) a PIN code is not a must; (2) it requires authentication with the remote IC card Data Centre; (3) the NHI cards are already available, no modification is needed, and there is no further cost for the deployment of the cards; (4) although the cards are in the reader, the communication cannot start unless the cards are in the corresponding states; i.e. the states allow communication. An implementation, on a Microsoft Windows XP platform, demonstrated the system's feasibility over an emulation of the NHI VPN framework. It maintained a high line speed, the driver took up 39 KB of disk space, installation was simple, not requiring any extra hardware or software, and the average packet processing time of the CAF driver measured was 0.3084 ms. The average overhead in comparing the Access Control List predefined routing in card, in an FTP testing experiment, was 5.7 micros (receiving) and 8 micros (sending). PMID:17541860

  4. Discount medical cards: innovation or illusion?

    PubMed

    Kofman, Mila; Libster, Jennifer; Bangit, Eliza

    2005-03-01

    Discount medical cards have come under increasing scrutiny by regulators and law enforcement officials as a result of mounting consumer-reported problems. For their study, the authors tested five cards available in the Washington, D.C., metro area; interviewed card company representatives, state attorneys general insurance regulators, and insurance agents; and reviewed court and administrative actions. While some cards provide a measure of value, other cards were found to have serious drawbacks, including: high-pressure sales tactics; misleading or inaccurate promotion; exaggerated claims of savings; difficulty finding participating doctors; and providers who failed to give cardholders promised discounts. Some discount card companies are seeking to reform the market through a trade association and voluntary code of conduct. Still, legislative and regulatory interventions will be needed to protect consumers in an unregulated and growing market. PMID:15765567

  5. [Validity of hypotheses about the father/mother interpretation of Rorschach cards: tested by using a card selecting method].

    PubMed

    Fukui, Yoshikazu; Miyake, Yoshiaki; Okazaki, Tsuyoshi; Moritsu, Makoto; Tohyama, Bin; Yamashita, Keiko; Okada, Shingo

    2011-08-01

    This study tests the validity of hypotheses about the interpretations of Rorschach father/mother cards by having subjects select the cards. The results showed that regardless of the subject's gender, Card IV is far more often selected as the father card. However Card VII is not more often chosen as the mother card, if anything, the Color Cards are usually selected. The result of a correspondence analysis suggest that a certain combination of father and mother cards is more often selected. When the frequency of card selection is applied to the cluster of cards obtained in the study of Fukui et al (2008), the mother card is predominantly selected from the feminine/maternity-cards cluster. However, the father card was selected equally often from three clusters, indicating variation of the father figure. The results indicate the predominance of Card IV as the father card, and also confirm the lack of individuality with Card VII. Therefore, Card IV fulfills prerequisites for the father card hypothesis, while Card VII does not meet the criteria. The results do not support the validity of the hypothesis about the mother card interpretation. PMID:21919302

  6. 11.13 Faculty/Staff ID Cards Page 1 of 1 Faculty/Staff ID Cards

    E-print Network

    Hung, I-Kuai

    11.13 Faculty/Staff ID Cards Page 1 of 1 Faculty/Staff ID Cards Original Implementation/staff identification card. Employees wishing to use certain university facilities may be required to show a current faculty/staff identification card. Employees wishing to obtain an ID card should follow this procedure: 1

  7. Guidelines for Beverage and UAS Gift Card Donations Submitting a beverage and/or gift card request

    E-print Network

    Alexandrova, Ivana

    Guidelines for Beverage and UAS Gift Card Donations Submitting a beverage and/or gift card request a beverage donation and/or gift card(s): · UAS and our partners must be recognized in all advertising to be in violation of the UAS Beverage and Gift Card Donations, the UAS By-Laws, the UAS Contract with the University

  8. CARD SHUFFLING Abstract. We examine the most common model of card shuffling, the GSR-

    E-print Network

    May, J. Peter

    CARD SHUFFLING JUSTIN GUO Abstract. We examine the most common model of card shuffling, the GSR. The GSR-Shuffle 1 3. Exploring Different Notions of Randomness 7 4. Decks with Repeated Cards 9 Acknowledgments 10 References 10 1. Introduction The GSR-shuffle is a model of riffle shuffling developed

  9. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    ERIC Educational Resources Information Center

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year 1 New…

  10. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such…

  11. CARD No. 51/52 Consideration of Protected Individual/Exposure Pathways

    E-print Network

    CARD No. 51/52 Consideration of Protected Individual/Exposure Pathways 51.A.1 BACKGROUND that separates the WIPP repository area from the accessible environment. That is, they restrict to very low making use of that water. Sections 194.51 and 194.52 provide 51-1 #12;specific directives for how those

  12. ot long ago, hackers stole about 40 million debit-and credit-card

    E-print Network

    #12;N ot long ago, hackers stole about 40 million debit- and credit-card records from Target sensitive data, hackers often manage to steal it anyway. It's a prob- lemthat also protects you from the possibility of a hacker obtaining com- plete access to the cloud provider

  13. Size dependence of the thermal decomposition kinetics of nano- CaC2O4: A theoretical and experimental study

    NASA Astrophysics Data System (ADS)

    Fu, Qingshan; Cui, Zixiang; Xue, Yongqiang

    2015-10-01

    In the processes of preparation and application of nanomaterials, the thermal decomposition of nanoparticles is often involved. An improved general theory of thermal decomposition kinetics of nanoparticles, developed over the past 10 years, was presented in this paper where the relations between reaction kinetic parameters and particle size were derived. Experimentally, the thermal decomposition kinetics of nano-sized calcium oxalate (nano- CaC2O4 with different sizes was studied by means of Thermogravimetry Analysis (TGA) at different heating rates. The values of the apparent activation energy and the logarithm of pre-exponential factor were calculated using the equation of Iterative Kissinger-Akahira-Sunose (IKAS) and its deformations. The influence regularities of particle size on the apparent activation energy and the pre-exponential factor were summarized, which are consistent with the thermal decomposition kinetics theory of nanoparticles. Based on the theory, the method of obtaining the surface thermodynamic properties by the determination of kinetic parameters was presented. Theoretical and experimental results show that the particle size, through the effect on the surface thermodynamic properties, has notable effect on the thermal decomposition kinetics. With the particle size decreasing, the partial molar surface enthalpy and the partial molar surface entropy increases, leading to the decrease of the apparent activation energy and the pre-exponential factor, respectively. Furthermore, the apparent activation energy, the pre-exponential factor, the partial molar surface enthalpy and the partial molar surface entropy are linearly related to the reciprocal of particle diameter, respectively.

  14. Smart Cards 101: Everything a Beginner Needs To Get Started.

    ERIC Educational Resources Information Center

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  15. 48 CFR 413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... purchase card. 413.301 Section 413.301 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE....301 Governmentwide commercial purchase card. USDA policy and procedures on use of the Governmentwide commercial purchase card are established in Departmental Regulation Series 5000....

  16. 48 CFR 413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 413.301 Section 413.301 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE....301 Governmentwide commercial purchase card. USDA policy and procedures on use of the Governmentwide commercial purchase card are established in Departmental Regulation Series 5000....

  17. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 2013-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  18. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 2014-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  19. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 2011-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  20. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 2012-07-01 false Tabulating machine cards. 101-26.509 Section 101-26...Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance...

  1. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 2012-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  2. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 2010-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  3. Student ID Card Request Form Office Use Only

    E-print Network

    Fleming, Andrew J.

    or statement from landlord or real estate agent Marriage certificate Divorce decree Name and address institution Pension or Government Health Care Card Government issued licence Medicare card Credit card

  4. Interagency Report 6887 -2003 Edition Government Smart Card

    E-print Network

    Interagency Report 6887 - 2003 Edition Government Smart Card Interoperability Specification Version Interagency Report 6887 - 2003 Edition Government Smart Card Interoperability Specification The National) The Government Smart Card Initiative The Presidential Budget for Fiscal Year 1998 stated: "The Administration

  5. First-principles and Monte Carlo studies on the magnetic stability of half-metallic zinc-blende CaC and similar compounds

    NASA Astrophysics Data System (ADS)

    Dong, Shengjie; Ding, Hang-Chen; Zhou, Baozeng; Duan, Chun-Gang; Wu, Ping; Zhao, Hui

    2015-03-01

    Using the first-principles calculation based on density functional theory and Monte Carlo simulation within the Heisenberg Hamiltonian, we have investigated the magnetic stability at finite pressure and temperature of CaC and some other selected hypothetical IIA-IVA compounds with the zinc-blende crystal structure. The results from simulated external pressure and temperature test indicate that the magnetic stability is dependent on the variation in atomic number of anion or cation element. Additionally, the origin of sp magnetism is mentioned briefly in this work and the dependence of Curie temperature on the volume is also discussed. First-principles computational charge-injection test show that the magnetization of these sp compounds originates in the spin polarization of the p shell of anions. For CaC, the exchange parameter J1 of the Heisenberg Hamiltonian depends strongly on the lattice constant, while the J2 and J3 are weakly dependent on the lattice constant. Moreover, discussion of volume-conserving deformations for CaC further demonstrates the stability of ferromagnetism and half metallicity for the compounds.

  6. Flexible Peripheral Component Interconnect Input/Output Card

    NASA Technical Reports Server (NTRS)

    Bigelow, Kirk K.; Jerry, Albert L.; Baricio, Alisha G.; Cummings, Jon K.

    2010-01-01

    The Flexible Peripheral Component Interconnect (PCI) Input/Output (I/O) Card is an innovative circuit board that provides functionality to interface between a variety of devices. It supports user-defined interrupts for interface synchronization, tracks system faults and failures, and includes checksum and parity evaluation of interface data. The card supports up to 16 channels of high-speed, half-duplex, low-voltage digital signaling (LVDS) serial data, and can interface combinations of serial and parallel devices. Placement of a processor within the field programmable gate array (FPGA) controls an embedded application with links to host memory over its PCI bus. The FPGA also provides protocol stacking and quick digital signal processor (DSP) functions to improve host performance. Hardware timers, counters, state machines, and other glue logic support interface communications. The Flexible PCI I/O Card provides an interface for a variety of dissimilar computer systems, featuring direct memory access functionality. The card has the following attributes: 8/16/32-bit, 33-MHz PCI r2.2 compliance, Configurable for universal 3.3V/5V interface slots, PCI interface based on PLX Technology's PCI9056 ASIC, General-use 512K 16 SDRAM memory, General-use 1M 16 Flash memory, FPGA with 3K to 56K logical cells with embedded 27K to 198K bits RAM, I/O interface: 32-channel LVDS differential transceivers configured in eight, 4-bit banks; signaling rates to 200 MHz per channel, Common SCSI-3, 68-pin interface connector.

  7. Residences Diner Card Terms and Conditions 2012/13 Your Swansea University residences Diner Card ("Diners Card") provides you with an opportunity to make the most of the

    E-print Network

    Martin, Ralph R.

    Residences Diner Card Terms and Conditions 2012/13 Your Swansea University residences Diner Card ("Diners Card") provides you with an opportunity to make the most of the part-catered accommodation option. Your Card will be credited at the commencement of each term for you to purchase food and drink in any

  8. BOA Individual Liability Travel Card Online Application Instructions If you have any questions with the travel card program, please contact your Travel Card

    E-print Network

    Zallen, Richard

    BOA Individual Liability Travel Card Online Application Instructions If you have any questions with the travel card program, please contact your Travel Card Program Administrator. If you encounter technical VT email address.) Upon logging into Works, to request a Travel card account, complete the following

  9. NSHE Flex Spending ASI DEBIT CARD EXPLAINED

    E-print Network

    of the benefits offered through NSHE's Flexible Spending Account program. IRS guidelines require the submission checks Credit card statements or credit card receipts Balance forward statements In the event you need Submission of Claims. To be eligible for reimbursement, the claim must be incurred during NSHE's plan year

  10. Designing More Effective Accountability Report Cards

    ERIC Educational Resources Information Center

    Sabbah, Faris M.

    2011-01-01

    The purpose of this study was to identify and design standards and procedures for creating easily interpreted accountability reports cards, consistent with the requirements spelled out in the No Child Left Behind Act of 2001 (NCLB). The use of public report cards was first raised during the debate that took place immediately prior to the passage…

  11. Establishing a Successful Smart Card Program.

    ERIC Educational Resources Information Center

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  12. The Ornery American: Orson Scott Card

    ERIC Educational Resources Information Center

    Oatman, Eric

    2008-01-01

    This article profiles Orson Scott Card, the winner of this year's Margaret A. Edwards Award for his outstanding contributions to teen literature, specifically for Ender's Game and Ender's Shadow (1999, both Tor), a companion tale. Card, the magician behind both of these best sellers, is one of the nation's most prolific--and contentious--authors.…

  13. Re-Designing Business Card Advertisements.

    ERIC Educational Resources Information Center

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  14. CHICAGO ONE CARD MOVING EXPENSE REPORTING FORM

    E-print Network

    He, Chuan

    CHICAGO ONE CARD MOVING EXPENSE REPORTING FORM SECTION A - DISTANCE TEST (Complete this section #: ________________________ Purpose: To record moving expenses that were charged to a Chicago One Card. Use this form to record moving expenses of benefit-eligible, permanent employees relocating to the University of Chicago to accept

  15. Enhancing Students' Learning: Instant Feedback Cards

    ERIC Educational Resources Information Center

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  16. High speed synchronizer card utilizing VLSI technology

    NASA Technical Reports Server (NTRS)

    Speciale, Nicholas; Wunderlich, Kristin

    1988-01-01

    A generic synchronizer card capable of providing standard NASA communication block telemetry frame synchronization and quality control was fabricated using VLSI technology. Four VLSI chip sets are utilized to shrink all the required functions into a single synchronizer card. The application of VLSI technology to telemetry systems resulted in an increase in performance and a decrease in cost and size.

  17. Helping Consumers Choose a Credit Card.

    ERIC Educational Resources Information Center

    d'Astous, Alain; Miquelon, Diane

    1991-01-01

    A sample of 204 Canadians were presented information in 3 formats--matrix table, summary, and combination--with which to choose an appropriate credit card. Summary ratings of credit cards combined with a table of fees, interest rates, and grace periods reduced information processing efforts and led to better consumer decisions. (SK)

  18. An Excel-lent Card Trick

    ERIC Educational Resources Information Center

    Zullo, Holly S.

    2011-01-01

    Card tricks based on mathematical principles can be a great way to get students interested in exploring some important mathematical ideas. In this article, the author discusses a simple spreadsheet implementation that shows students why the card trick works and allows them to explore several variations. As an added bonus, students are introduced…

  19. Cognitive Credit Cards: Acquiring Learning Strategies.

    ERIC Educational Resources Information Center

    Edmunds, Alan L.

    1999-01-01

    Describes the Cognitive Credit Card, an individualized approach to helping students with learning disabilities select and apply appropriate learning strategies. The CCC is a credit card-sized laminated set of cognitive or metacognitive cues for a specific topic. Feedback from students, teachers, and parents has been highly positive. (DB)

  20. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ...NARA is amending its regulations to require researchers using original records, NARA microfilm, and public use computers at the National Archives Building in Washington, DC, to obtain a researcher identification card. Under the new requirements, researchers at regional archives are also required to obtain a researcher identification card when there is no separate research room for the use of......

  1. College Student Performance and Credit Card Usage.

    ERIC Educational Resources Information Center

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  2. Climate.gov 2013 Arctic Report Card

    E-print Network

    Climate.gov 2013 Arctic Report Card Climate.gov Visual Highlights larger versions and detailed captions available @ http://www.climate.gov/news-features/understanding- climate/2013-arctic-report-card-visual-highlights #12;Climate.gov Spring temperature patterns divided the Arctic into warm and cool extremes. #12

  3. In Brief: Arctic Report Card

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    The 2009 annual update of the Arctic Report Card, issued on 22 October, indicates that “warming of the Arctic continues to be widespread, and in some cases dramatic. Linkages between air, land, sea, and biology are evident.” The report, a collaborative effort of 71 national and international scientists initiated in 2006 by the Climate Program Office of the U.S. National Oceanic and Atmospheric Administration (NOAA), highlights several concerns, including a change in large-scale wind patterns affected by the loss of summer sea ice; the replacement of multiyear sea ice by first-year sea ice; warmer and fresher water in the upper ocean linked to new ice-free areas; and the effects of the loss of sea ice on Arctic plant, animal, and fish species. “Climate change is happening faster in the Arctic than any other place on Earth-and with wide-ranging consequences,” said NOAA administrator Jane Lubchenco. “This year“s Arctic Report Card underscores the urgency of reducing greenhouse gas pollution and adapting to climate changes already under way.”

  4. ACECARD. Acquire CoOmmodities Easily Card

    SciTech Connect

    Soler, E.E.

    1996-09-01

    Acquire Commodities Easily Card (AceCard) provides an automated end-user method to distribute company credit card charges to internal charge numbers. AceCard will allow cardholders to record card purchases in an on-line order log, enter multiple account distributions per order that can be posted to the General Ledger, track orders, and receipt information, and provide a variety of cardholder and administrative reports. Please note: Customers must contact Ed Soler (423)-576-6151, Lockheed Martin Energy Systems, for help with the installation of the package. The fee for this installation help will be coordinated by the customer and Lockheed Martin and is in addition to cost of the package from ESTSC. Customers should contact Sandy Presley (423)-576-4708 for user help.

  5. Health Card: a new reform plan.

    PubMed

    Seidman, L S

    1995-01-01

    Health Card is a new reform plan. Every household, regardless of employment of health status, would receive a government-issued health credit card to use at the doctor's office or hospital like MasterCard. Later, it would be billed a percentage of the provider's charge--a percentage scaled to its last income tax return; its annual burden would never exceed a designated percentage of its income. Health Card would simply and directly achieve universal coverage and equitable patient cost-sharing. Like MasterCard, government would pay bills, not regulate providers. Each household would choose its medical provider (fee-for-service or HMO), bearing a percentage of the charge. Provider competition for cost-sharing consumers would help contain health care costs. PMID:10144242

  6. The Arctic Report Card: Communicating the State of the Rapidly Changing Arctic to a Diverse Audience via the Worldwide Web

    NASA Astrophysics Data System (ADS)

    Jeffries, M. O.; Richter-Menge, J.; Overland, J. E.; Soreide, N. N.

    2013-12-01

    Rapid change is occurring throughout the Arctic environmental system. The goal of the Arctic Report Card is to communicate the nature of the many changes to a diverse audience via the Worldwide Web. First published in 2006, the Arctic Report Card is a peer-reviewed publication containing clear, reliable and concise scientific information on the current state of the Arctic environment relative to observational records. Available only online, it is intended to be an authoritative source for scientists, teachers, students, decision-makers, policy-makers and the general public interested in the Arctic environment and science. The Arctic Report Card is organized into five sections: Atmosphere; Sea Ice & Ocean; Marine Ecosystem; Terrestrial Ecosystem; Terrestrial Cryosphere. Arctic Report Card 2012, the sixth annual update, comprised 20 essays on physical and biological topics prepared by an international team of 141 scientists from 15 different countries. For those who want a quick summary, the Arctic Report Card home page provides highlights of key events and findings, and a short video that is also available on YouTube. The release of the Report Card each autumn is preceded by a NOAA press release followed by a press conference, when the Web site is made public. The release of Arctic Report Card 2012 at an AGU Fall Meeting press conference on 5 December 2012 was subsequently reported by leading media organizations. The NOAA Arctic Web site, of which the Report Card is a part, is consistently at the top of Google search results for the keyword 'arctic', and the Arctic Report Card Web site tops search results for keyword "arctic report" - pragmatic indications of a Web site's importance and popularity. As another indication of the Web site's impact, in December 2012, the month when the 2012 update was released, the Arctic Report Card Web site was accessed by 19,851 unique sites in 105 countries, and 4765 Web site URLs referred to the Arctic Report Card. The 2012 Arctic Report Card YouTube video has been viewed 36,074 times by viewers in 152 countries and has been embedded in over two dozen Web sites. We are confident that the Arctic Report Card is succeeding in communicating the state of the rapidly changing Arctic to many people, but we need to learn more about its broader impact. Consequently, we are considering a study of how diverse an audience is being reached, and the extent to which, outside of the scientific community, the content of the Arctic Report Card is understood, is perceived as a credible, unbiased and non-threatening resource, and is overcoming prior beliefs.

  7. Relativistic Hydrodynamics on Graphic Cards

    E-print Network

    Jochen Gerhard; Volker Lindenstruth; Marcus Bleicher

    2012-09-09

    We show how to accelerate relativistic hydrodynamics simulations using graphic cards (graphic processing units, GPUs). These improvements are of highest relevance e.g. to the field of high-energetic nucleus-nucleus collisions at RHIC and LHC where (ideal and dissipative) relativistic hydrodynamics is used to calculate the evolution of hot and dense QCD matter. The results reported here are based on the Sharp And Smooth Transport Algorithm (SHASTA), which is employed in many hydrodynamical models and hybrid simulation packages, e.g. the Ultrarelativistic Quantum Molecular Dynamics model (UrQMD). We have redesigned the SHASTA using the OpenCL computing framework to work on accelerators like graphic processing units (GPUs) as well as on multi-core processors. With the redesign of the algorithm the hydrodynamic calculations have been accelerated by a factor 160 allowing for event-by-event calculations and better statistics in hybrid calculations.

  8. FPGA mezzanine card DSP module

    NASA Astrophysics Data System (ADS)

    Janicki, Tom; Cieszewski, Rados?aw; Kasprowicz, Grzegorz; Po?niak, Krzystof T.

    2011-10-01

    Today's most sophisticated real-time control systems, such as the LHC or alike, are facing similar problem of processing terabits per second of raw data generated by the diagnostic systems - where in addition most of the data is useless and only generates an empty burden for computing modules. Many approaches have already been adopted to make the realtime control possible under such circumstances including: parallel computing, modularity and data mining. Furthermore many factors determine the real efficiency of the whole system including: transfer rates between components and modules, "slow" memories or architecture and frequency of computing units. This paper presents a concept of realization, architecture, and hardware implementation of a digital signal processing module utilizing modern technologies, standards and approaches in one single card.

  9. Insider protection: a report card

    SciTech Connect

    Al-Ayat, R.A.; Judd, B.R.

    1986-01-01

    Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is not focussing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. We discuss the general trends in insider protection and the limitations of protection measures currently in use. We also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel.

  10. UNBC LIBRARY CARD AND BORROWER ACCESS APPLICATION FORM

    E-print Network

    Northern British Columbia, University of

    MEMBER'S NAME: (First/Last) ___________________________________________ UNBC Faculty Member's Barcode print off this form and bring this completed form with 1 piece of photo ID to the Circulation Desk

  11. Providing longitudinal health care information with the new German Health Card--a pilot system to track patient pathways.

    PubMed

    Marschollek, Michael; Demirbilek, Edip

    2006-03-01

    The paper describes an application system that employs the new German Health Card to provide a technical solution for tracking patient pathways. The aim is to improve the flow and availability of health care information. We used standard software components and technologies in order to facilitate interoperability with multiple system platforms and allow for customizing as the specification process for the German Health Card is not yet completed. Every health care provider contact is recorded on the card and associated medical documents are stored in a central database and can be retrieved via Web Services running on a central application server. The patient pathway can thus be chronologically tracked by the clinician and relevant longitudinal information is made accessible quickly. Our system for tracking patient pathways with the new German Health Card can be regarded as a first example of its great future potential. PMID:16458996

  12. Converting Mosquito Surveillance to Arbovirus Surveillance with Honey-Baited Nucleic Acid Preservation Cards.

    PubMed

    Flies, Emily J; Toi, Cheryl; Weinstein, Philip; Doggett, Stephen L; Williams, Craig R

    2015-07-01

    Spatially and temporally accurate information about infectious mosquito distribution allows for pre-emptive public health interventions that can reduce the burden of mosquito-borne infections on human populations. However, the labile nature of arboviruses, the low prevalence of infection in mosquitoes, the expensive labor costs for mosquito identification and sorting, and the specialized equipment required for arbovirus testing can obstruct arbovirus surveillance efforts. The recently developed techniques of testing mosquito expectorate using honey-baited nucleic acid preservation cards or sugar bait stations allows a sensitive method of testing for infectious, rather than infected, mosquito vectors. Here we report the results from the first large-scale incorporation of honey-baited cards into an existing mosquito surveillance program. During 4 months of the peak virus season (January-April, 2014) for a total of 577 trap nights, we set CO2-baited encephalitis vector survey (EVS) light traps at 88 locations in South Australia. The collection container for the EVS trap was modified to allow for the placement of a honey-baited nucleic acid preservation card (FTA™ card) inside. After collection, mosquitoes were maintained in a humid environment and allowed access to the cards for 1 week. Cards were then analyzed for common endemic Australian arboviruses using a nested RT-PCR. Eighteen virus detections, including 11 Ross River virus, four Barmah Forest virus, and three Stratford virus (not previously reported from South Australia) were obtained. Our findings suggest that adding FTA cards to an existing mosquito surveillance program is a rapid and efficient way of detecting infectious mosquitoes with high spatial resolution. PMID:26186511

  13. Inductive Verification of Smart Card Protocols Giampaolo Bella

    E-print Network

    Paulson, Lawrence C.

    Inductive Verification of Smart Card Protocols Giampaolo Bella Computer Laboratory, University of security protocols that make use of smart cards. Smart cards are modelled operationally, hence only up to protocols that assume secure or insecure means between agents and smart cards, as well

  14. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR... commercial purchase card. (a) The Government purchase card has far fewer requirements for documentation than other methods of purchasing. However, the same legal restrictions apply to credit card purchases...

  15. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR... commercial purchase card. (a) The Government purchase card has far fewer requirements for documentation than other methods of purchasing. However, the same legal restrictions apply to credit card purchases...

  16. Bytecode verification on Java smart cards Xavier Leroy

    E-print Network

    Leroy, Xavier

    of applications: credit cards, GSM mobile phones, medical file management, . . . Traditionally, smart cards run of Web applets, and more generally mobile code for distributed systems [30, 15]. The solution put forward. This article describes the on-card verification algorithm and the off-card code transformations, and evaluates

  17. Healthy Heart, Healthy Family Picture Cards for Community Health Workers

    E-print Network

    Shen, Jun

    Healthy Heart, Healthy Family Picture Cards for Community Health Workers Puso Mo, Buhay Mo Mga this packet of picture cards. The picture cards can be used with the "Healthy Heart, Healthy Family" manual to illustrate the topic you are teaching. The "Healthy Heart, Healthy Family" manual and picture cards are part

  18. On Digital Money and Card Technologies Edwin M. Knorr \\Lambda

    E-print Network

    Knorr, Edwin M.

    On Digital Money and Card Technologies Edwin M. Knorr \\Lambda Department of Computer Science fields: digital money and card technologies (especially smart cards), for possible PhD research topics. We believe that digital money and card technologies will revolutionize life in the 21st century

  19. A SIMPLE CARD GUESSING GAME REVISITED Arnold Knopfmacher

    E-print Network

    Prodinger, Helmut

    A SIMPLE CARD GUESSING GAME REVISITED Arnold Knopfmacher://www.wits.ac.za/helmut/index.htm Submitted: January 4, 2000; Accepted: March 3, 2000. Abstract. A deck of cards consisting of m red and n black cards is given.* * A guess is made as to the colour of the top card, after which

  20. Domain-Specific Pseudonymous Signatures for the German Identity Card

    E-print Network

    International Association for Cryptologic Research (IACR)

    Domain-Specific Pseudonymous Signatures for the German Identity Card Jens Bender1 ¨Ozg¨ur Dagdelen2 German identity card basically provides a method to use pseudonyms such that they can be linked for the new German identity card [8] secure the communication between the card and the reader resp

  1. October 19, 2011 POLICY FOR PURCHASING BUSINESS CARDS

    E-print Network

    Kurapov, Alexander

    October 19, 2011 POLICY FOR PURCHASING BUSINESS CARDS Business cards are an administrative expense business cards without prior approval. Research associates, postdocs, faculty research assistants and classified staff must receive approval from the dean in order to purchase business cards. To request approval

  2. CREDIT CARD PAYMENT REQUEST FORM Conference Name SLAC Summer Institute

    E-print Network

    Wechsler, Risa H.

    CREDIT CARD PAYMENT REQUEST FORM Conference Name SLAC Summer Institute Date July 30-August 10, 2007 Print Name Email address* Credit Card Number Card Security Code** Expiration Date Registration Fee fee is paid. Long Description **The Card Security Code (CSC) is a 3- or 4-digit number printed

  3. Security Analysis of an Authentication Scheme Using Smart Cards

    E-print Network

    International Association for Cryptologic Research (IACR)

    Security Analysis of an Authentication Scheme Using Smart Cards Gaurav Tiwari, Amit K. Awasthi authentication scheme using smart cards. They claimed that their scheme is secure against various attacks, Smart cards major drawbacks of its dependency on verification table. Smart cards implementation solved

  4. Gator 1 Card Staff and Faculty Authorization Form

    E-print Network

    Sin, Peter

    Gator 1 Card Staff and Faculty Authorization Form This form must be completed for new and replacement Gator 1 UF ID Cards E & G Departments Payment Information: The first card issued to new full&G departments only. Replacement cards are not paid for through the E&G account. E&G payment does not include OPS

  5. Thermal transfer structures coupling electronics card(s) to coolant-cooled structure(s)

    DOEpatents

    David, Milnes P; Graybill, David P; Iyengar, Madhusudan K; Kamath, Vinod; Kochuparambil, Bejoy J; Parida, Pritish R; Schmidt, Roger R

    2014-12-16

    Cooling apparatuses and coolant-cooled electronic systems are provided which include thermal transfer structures configured to engage with a spring force one or more electronics cards with docking of the electronics card(s) within a respective socket(s) of the electronic system. A thermal transfer structure of the cooling apparatus includes a thermal spreader having a first thermal conduction surface, and a thermally conductive spring assembly coupled to the conduction surface of the thermal spreader and positioned and configured to reside between and physically couple a first surface of an electronics card to the first surface of the thermal spreader with docking of the electronics card within a socket of the electronic system. The thermal transfer structure is, in one embodiment, metallurgically bonded to a coolant-cooled structure and facilitates transfer of heat from the electronics card to coolant flowing through the coolant-cooled structure.

  6. Payment Card Acceptance and Security 14.8 Page 1 of 4 Payment Card Acceptance and Security

    E-print Network

    Hung, I-Kuai

    Industry (PCI) Data Security Standards (DSS). This policy is supplemental to any other information security identification number and card validation code). Payment Card Industry (PCI) Data Security Standards (DSSPayment Card Acceptance and Security 14.8 Page 1 of 4 Payment Card Acceptance and Security Original

  7. Special Cards The CMLAF uses several special cards to help both the LAF and Investigative staff to identify animals that

    E-print Network

    Krovi, Venkat

    Special Cards The CMLAF uses several special cards to help both the LAF and Investigative staff need to be quickly and easily located for purposes of transfer or to correct some problem. The cards currently used along with a description of their use are illustrated below. The "Special Diet/Water Card

  8. Nest Record Card Scheme 1 Welcome to the Nest Record Card Scheme, NERCS for short. The project aims to

    E-print Network

    de Villiers, Marienne

    Nest Record Card Scheme 1 Welcome to the Nest Record Card Scheme, NERCS for short. The project aims completely replaces the old. The cards from the old scheme are curated within the ADU and will continue to be a valuable source of information. As and when resources permit, subsets of that col- lection of cards

  9. Credit: Educational Loans, Money Management, Credit Cards

    ERIC Educational Resources Information Center

    Nation's Schools and Colleges, 1974

    1974-01-01

    Brief notes discuss current developments such as a bank loan program for parents with university-age children; a high school student-run credit union; and charging education fees with credit cards. (JF)

  10. 75 FR 55392 - Employment Network Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ...Docket No. SSA-2010-0046] Employment Network Report Card AGENCY: Social Security Administration...to hear public comments on Employment Network quality assurance, including a ticket consumer Employment Network Report...

  11. TEX Reference Card (for Plain TEX)

    E-print Network

    Russo, Bernard

    TEX Reference Card (for Plain TEX) Greek Letters \\alpha \\iota \\varrho \\beta \\kappa \\sigma \\voffset= dimen move page vertically Relations \\leq or \\le \\geq or \\ge \\equiv \\prec \\succ \\sim \\preceq

  12. Prefrontal system dysfunction and credit card debt.

    PubMed

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction. PMID:15370189

  13. College Student Credit Card Usage and Debt.

    ERIC Educational Resources Information Center

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  14. 75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... Network. (6) Provide funding for CAC cardstock, printer consumables, and electromagnetically opaque..., electromagnetically opaque sleeves, and printer supplies, commensurate with funding received from the DoD...

  15. Structure of the CAC1 gene and in situ characterization of its expression. The Arabidopsis thaliana gene coding for the biotin-containing subunit of the plastidic acetyl-coenzyme A carboxylase.

    PubMed Central

    Ke, J; Choi, J K; Smith, M; Horner, H T; Nikolau, B J; Wurtele, E S

    1997-01-01

    The CAC1 gene of Arabidopsis thaliana that codes for the biotin carboxyl-carrier subunit of the heteromeric acetyl-coenzyme A carboxylase was isolated and sequenced. CAC1 is a single-copy gene interrupted by six introns. Subcellular immunogold labeling indicates that the biotin carboxyl-carrier subunit is localized in the stroma of the plastids and chloroplasts. The CAC1 mRNA accumulates throughout developing embryos and ovules of siliques at a time of rapid growth and oil accumulation (7 d after flowering), but is present at much lower levels in wall cells and central septal cells of the silique. Immunolocalization studies show that the pattern of accumulation of the biotin carboxyl-carrier subunit within the siliques and leaves is similar to that of the CAC1 mRNA. These observations indicate that the cellular pattern of biotin carboxyl-carrier protein accumulation in the developing silique may be determined by the transcriptional activity of the CAC1 gene. PMID:9046589

  16. What Policymakers Can Learn from School Report Cards: Analysis of Tennessee's Report Cards on Schools.

    ERIC Educational Resources Information Center

    Bobbett, Gordon C.; And Others

    The relationships among factors reported on report cards developed for local school districts in Tennessee were studied, offering information about how the selected factors relate to student outcomes. Each year Tennessee's State Board of Education produces a report card on each school district using data provided by the district and the State…

  17. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  18. The Use of University Debit Cards for Purchasing Cigarettes: An Opportunity for Tobacco Use Prevention on University Campuses

    ERIC Educational Resources Information Center

    Lazev, Amy B.; Norton, Tina R.; Collins, Bradley; Ma, Grace; Miller, Suzanne

    2012-01-01

    Aims: Young adults have the highest smoking rate of any age group in the United States. However, little is known about how young adults, including college students, access and pay for cigarettes--important information for guiding policies and prevention and intervention efforts. This study examined students' use of university debit cards, which…

  19. Identity cards help patients identify their doctors

    PubMed Central

    Zucco, Liana; Desmond, Gabrielle; Carpenter, Bernadette

    2014-01-01

    Patients admitted to hospital are immediately overloaded with information from staff in A&E, to subsequent acute medical and inpatient wards. Essential details are conveyed to patients at each step, including diagnosis, management and identification of various team members involved in their care. An initial audit within our South London hospital revealed only one third of patients admitted onto a single medical ward could recall the name of a single member of their treating team, and less than 10% retained that information over 5 days. Identification (ID) cards were devised to facilitate clear transfer of information detailing the patient's treating team. These ID cards were piloted through a series of PDSA cycles on one inpatient medical ward following a consultant led ward round. Post intervention, 67% managed to recall a single member of the treating team, with 67% retaining this information 5 days later, a dramatic improvement. ID cards were then trialed on one surgical ward, demonstrating equally impressive results with over 87% of patients recalling their named consultant following ID card implementation, up from 54% initially. Similar trends were demonstrated for recalling other treating team members. This simple measure improved patients ability to recall and retain names of a least a single member of their treating team, encouraged communication between patients and medical team and ultimately improved patient satisfaction and quality of care. ID cards were quick and easy to implement and have been approved by the hospital patient safety committee to implement throughout the Trust.

  20. Invisible Divide: Farm Workers and Telephone Accessibility.

    ERIC Educational Resources Information Center

    Grieshop, James I.; Delgadillo, Viviana; Flores, Nicolas; Ramirez, Debora

    2003-01-01

    A survey of California farm workers (n=34), former farm workers (n=7), vendors of telephone technology (n=13), and farm camp managers (n=5) revealed a pattern of low access to and availability of telephones and problems in the use of prepaid telephone cards. Results show that farm worker communities are largely forgotten in discussions of the…

  1. Access to the Arts through Assistive Technology.

    ERIC Educational Resources Information Center

    Frame, Charles

    Personnel in the rehabilitation field have come to recognize the possibilities and implications of computers as assistive technology for disabled persons. This manual provides information on how to adapt the Unicorn Board, Touch Talker/Light Talker overlays, the Adaptive Firmware Card setup disk, and Trace-Transparent Access Module (T-TAM) to…

  2. 76 FR 76475 - Employment Network (EN) Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ...Docket No. SSA-2011-0096] Employment Network (EN) Report Card AGENCY: Social Security...Revised Ticket to Work Consumer Employment Network Report Card...recipients, advocates, employment networks (ENs), other professionals, and...

  3. 76 FR 76475 - Employment Network (EN) Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ... Employment Network (EN) Report Card AGENCY: Social Security Administration. ACTION: Notice of Webinar and... Comments on Draft Revised Ticket to Work Consumer Employment Network Report Card. SUMMARY: We are soliciting the input of beneficiaries, recipients, advocates, employment networks (ENs), other...

  4. 1. Post card view of the bridge, c. 1910. Post ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Post card view of the bridge, c. 1910. Post card courtesy Carol Poh Miller. Photocopy by Berni Rich, Score Photographers Cleveland, OH - B & O Railroad Bridge Number 464, Spanning Old Ship Canal & Cuyahoga River, Cleveland, Cuyahoga County, OH

  5. Inexpensive Data Acquisition with a Sound Card

    NASA Astrophysics Data System (ADS)

    Hassan, Umer; Pervaiz, Saad; Anwar, Muhammad Sabieh

    2011-12-01

    Signal generators, oscilloscopes, and data acquisition (DAQ) systems are standard components of the modern experimental physics laboratory. The sound card, a built-in component in the ubiquitous personal computer, can be utilized for all three of these tasks1,2 and offers an attractive option for labs in developing countries such as ours—Pakistan—where affordability is always of prime concern. In this paper, we describe in a recipe fashion how the sound card is used for DAQ and signal generation.

  6. High density electrical card connector system

    DOEpatents

    Haggard, J. Eric (Elgin, IL); Trotter, Garrett R. (Aurora, IL)

    2000-01-01

    An electrical circuit board card connection system is disclosed which comprises a wedge-operated locking mechanism disposed along an edge portion of the printed circuit board. An extrusion along the edge of the circuit board mates with an extrusion fixed to the card cage having a plurality of electrical connectors. The connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned and the wedge inserted. The disclosed connection system is a simple solution to the need for a greater number of electrical signal connections.

  7. Step-by-Step Guide for Travel Card

    E-print Network

    Olszewski Jr., Edward A.

    Step-by-Step Guide for Travel Card Laura Gore 7/23/2012 #12;1 Index I. How do I get into the Travel Card System? a. Log into U-Business b. Click E-Travel II. How do I request a Travel Card? a. Registration iv. Car Rental state contracted only d. After using Travel Card for trip- instructions III. How do

  8. State-Issued Identification Cards Reveal Patterns in Adult Weight Status

    PubMed Central

    Morris, Daniel S.; Main, Eric C.; Harris, Jenine K.; Moland, Abraham; Cude, Curtis

    2015-01-01

    Background: State-issued identification cards are a promising data source for neighborhood-level obesity estimates. Methods: We used information from three million Oregon state-issued identification cards to compute age-adjusted estimates of average adult body mass index (BMI) for each census tract in the state. We used multivariate linear regression to identify associations between weight status and population characteristics, food access, commuting behavior, and geography. Results: Together, home values, education, race, ethnicity, car commuting, and rural-urban commuting area (RUCA) explained 86% of the variation in BMI among tracts. BMI was lower in areas with higher home values and greater educational attainment, and higher in areas with more workers commuting by car. Discussion: Our findings are consistent with other research on socioeconomic disparities in obesity. This demonstrates state-issued identification cards are a promising data source for BMI surveillance and may offer new insight into the association between weight status and economic and environmental factors. Public health agencies should explore options for developing their own obesity estimates from identification card data. PMID:26062036

  9. Transition to smart card technology : how transit operators can encourage the take-up of smart card technology

    E-print Network

    Hong, Yi, S.M. Massachusetts Institute of Technology

    2006-01-01

    This thesis explores and evaluates the essential strategies needed for transit agencies to switch from traditional fare collection systems to smart cards. More transit agencies today are investing in smart card technology ...

  10. Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin

    E-print Network

    Shoup, Victor

    Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St smart cards can be used to enhance the security of session key distribution in the third­party setting the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we

  11. Balanced Self-Checking Asynchronous Logic for Smart Card Applications

    E-print Network

    Moore, Simon

    Balanced Self-Checking Asynchronous Logic for Smart Card Applications Simon Moore, Ross Anderson these characteristics may be exploited to construct smart card functions that are resistant to both side are presented for a smart card test chip containing multiple implementations of a 16-bit micro

  12. Smart Playing Cards Enhancing the Gaming Experience with RFID

    E-print Network

    Smart Playing Cards ­ Enhancing the Gaming Experience with RFID Christian Floerkemeier. In such a smart card game, the embedded information technology can provide a number of useful services work builds on earlier work by R¨omer et al. [10], who initially proposed the idea of a smart card game

  13. AES implementation on Smart Card Pongnukit Juthamas, Tingthanathikul Witit

    E-print Network

    1 AES implementation on Smart Card Pongnukit Juthamas, Tingthanathikul Witit Abstract-- This paper focus on the cryptographic algo- rithm on smart card. Many algorithms are used to imple- ment on smart. Then AES requires a very cautious approach to evaluate smart-card suitability. In this paper we will also

  14. Veri ed Formal Security Models for Multiapplicative Smart Cards ?

    E-print Network

    Reif, Wolfgang

    Veri#12;ed Formal Security Models for Multiapplicative Smart Cards ? Gerhard Schellhorn 1 smart cards. The models formalize the main security aspects of secrecy, integrity, secure communication policy has been formally proven to be correct for both models. 1 Introduction Smart cards are becoming

  15. Verification of a Formal Security Model for Multiapplicative Smart Cards

    E-print Network

    Reif, Wolfgang

    Verification of a Formal Security Model for Multiapplicative Smart Cards Gerhard Schellhorn1 Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards formally proven with the VSE II system. 1 Introduction Smart cards are becoming more and more popular

  16. Verification of a Formal Security Model for Multiapplicative Smart Cards #

    E-print Network

    Reif, Wolfgang

    Verification of a Formal Security Model for Multiapplicative Smart Cards # Gerhard Schellhorn 1 smart cards. The model formalizes the main security aspects of secrecy, integrity, secure communication of the security policy has been formally proven with the VSE II system. 1 Introduction Smart cards are becoming

  17. Verified Formal Security Models for Multiapplicative Smart Cards

    E-print Network

    Reif, Wolfgang

    Verified Formal Security Models for Multiapplicative Smart Cards Gerhard Schellhorn1 , Wolfgang policy has been formally proven to be correct for both models. 1 Introduction Smart cards are becoming programs. Therefore, anything that can be done with an ordinary computer can be done with a smart card

  18. Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin

    E-print Network

    Rubin, Avi

    Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St smart cards can be used to enhance the security of session key distribution in the third-party setting the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we

  19. Efficient Signature Generation by Smart Cards* C.P. Schnorr

    E-print Network

    Efficient Signature Generation by Smart Cards* C.P. Schnorr the smart card has to perform to generate a signature. This is important since the computational power of current processors for smart cards is rather limited. Previous signature schemes require many modular

  20. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 16 2010-04-01 2010-04-01 true Prepaid telephone cards. 49.4251-4 Section 49... EXCISE TAXES FACILITIES AND SERVICES EXCISE TAXES Communications § 49.4251-4 Prepaid telephone cards. (a) In general. In the case of communications services acquired by means of a prepaid telephone card...

  1. 32 CFR 1615.9 - Registration card or form.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Registration card or form. 1615.9 Section 1615.9 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM ADMINISTRATION OF REGISTRATION § 1615.9 Registration card or form. For the purposes of these regulations, the terms Registration Card and Registration Form...

  2. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use of the government-wide commercial purchase card are contained in its Handbook on the...

  3. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use of the government-wide commercial purchase card are contained in its Handbook on the...

  4. 48 CFR 213.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 213.301 Section 213.301 Federal Acquisition Regulations System DEFENSE ACQUISITION... PROCEDURES Simplified Acquisition Methods 213.301 Governmentwide commercial purchase card. (1) “United States... accordance with 201.603-3(b) also may use the Governmentwide commercial purchase card to make a purchase...

  5. 48 CFR 213.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... purchase card. 213.301 Section 213.301 Federal Acquisition Regulations System DEFENSE ACQUISITION... PROCEDURES Simplified Acquisition Methods 213.301 Governmentwide commercial purchase card. (1) “United States... accordance with 201.603-3(b) also may use the Governmentwide commercial purchase card to make a purchase...

  6. 48 CFR 13.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 13.301 Section 13.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION... Governmentwide commercial purchase card. (a) Except as provided in 32.1108(b)(2), the Governmentwide commercial purchase card is authorized for use in making and/or paying for purchases of supplies, services,...

  7. 48 CFR 1313.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 1313.301 Section 1313.301 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE....301 Governmentwide commercial purchase card. The Department's procedures for the use and control of the Governmentwide commercial purchase card are set forth in CAM 1313.301....

  8. 48 CFR 1313.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... purchase card. 1313.301 Section 1313.301 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE....301 Governmentwide commercial purchase card. The Department's procedures for the use and control of the Governmentwide commercial purchase card are set forth in CAM 1313.301....

  9. 48 CFR 13.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... purchase card. 13.301 Section 13.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION... Governmentwide commercial purchase card. (a) Except as provided in 32.1108(b)(2), the Governmentwide commercial purchase card is authorized for use in making and/or paying for purchases of supplies, services,...

  10. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...2014-07-01 2012-07-01 true Tabulating machine cards. 101-26.509 Section 101-26...Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance...

  11. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...2011-07-01 2007-07-01 true Tabulating machine cards. 101-26.509 Section 101-26...Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance...

  12. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 2010-07-01 true Tabulating machine cards. 101-26.509 Section 101-26...Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance...

  13. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...2013-07-01 2012-07-01 true Tabulating machine cards. 101-26.509 Section 101-26...Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance...

  14. 77 FR 75410 - Request for Information Regarding Credit Card Market

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-20

    ... PROTECTION Request for Information Regarding Credit Card Market AGENCY: Bureau of Consumer Financial... Financial Protection (Bureau) to conduct a review (Review) of the consumer credit card market, within the... the public about a number of aspects of the consumer credit card market, which are described...

  15. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509....

  16. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY...

  17. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY...

  18. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509....

  19. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509....

  20. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY...

  1. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509....

  2. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY...

  3. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY...

  4. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509....

  5. An Integrated Development Environment for Java Card 1

    E-print Network

    Nilsson, Henrik

    An Integrated Development Environment for Java Card 1 Isabelle Attali, Denis Caromel, Carine a programming environment for Java Card 3 [8,19] ap- plications which is being developed within the OASIS Java Card environment is developed within Centaur [5], a generic, in- teractive programming environment

  6. Formalisation and Verification of the GlobalPlatform Card Specification

    E-print Network

    Zanella Béguelin, Santiago

    Module (SIM) cards used in mobile phones to hold subscriber's personal information and settings. EarlyFormalisation and Verification of the GlobalPlatform Card Specification Using the B Method Santiago of the GlobalPlatform Card Specifi- cation. Although there exists a semi-formal specification and some ef- fort

  7. Reverse Engineering Java Card Applets Using Power Analysis

    E-print Network

    . We propose sim- ilar methodology for Java Card applets reverse engineering. Because power analysisReverse Engineering Java Card Applets Using Power Analysis Dennis Vermoen1,2 , Marc Witteman2 analysis on smart cards is widely used to obtain infor- mation about implemented cryptographic algorithms

  8. Logical and Physical Design Issues for Smart Card Databases

    E-print Network

    Schreiber, Fabio A.

    modern portable devices such as palm computers, cell phones, and smart cards. While smart cards have been structures, flash memory, personal information systems, smart card 1. INTRODUCTION The Information Management; DataQuest 1998; Bobineau et al. 2000], almost no attention has been devoted to the most appropriate

  9. Cool Moves: Teaching Geography and History with HyperCard.

    ERIC Educational Resources Information Center

    Adams, Richard C.

    1995-01-01

    Discusses a project developed using HyperCard to teach geography and history. Describes research of weather patterns and corresponding historical accounts; HyperCard's capabilities for producing animated maps to display information; and the effectiveness of HyperCard as a teaching tool, including its flexible use as a lecture display tool or in a…

  10. Using a Card Trick to Illustrate Fixed Points and Stability

    ERIC Educational Resources Information Center

    Champanerkar, Jyoti; Jani, Mahendra

    2015-01-01

    Mathematical ideas from number theory, group theory, dynamical systems, and computer science have often been used to explain card tricks. Conversely, playing cards have been often used to illustrate the mathematical concepts of probability distributions and group theory. In this paper, we describe how the 21-card trick may be used to illustrate…

  11. Meeting Mathematics Standards with a Deck of Playing Cards

    ERIC Educational Resources Information Center

    McAllister, Deborah A.; McDonald, Shirley A.; Bothman, Susan M.

    2010-01-01

    The activities contained in this document have been presented at several conference sessions. Participants engaged in hands-on activities for Grades 3 through 8 that utilized a deck of playing cards to meet mathematics content and process standards. Activities included variations of card games, but with a mathematical twist, and other card-based…

  12. Exam Card Procedure Guide Duke University Graduate School

    E-print Network

    Exam Card Procedure Guide Duke University Graduate School 2127 Campus Drive, Box 90068 Durham after their initial submission. Students will receive their exam card during this appointment along the Graduate School website for Graduation deadline dates. 4. Prior to the exam card appointment, defense

  13. Payment Card Processor Registration Form Page 1 of 2

    E-print Network

    Hung, I-Kuai

    Payment Card Processor Registration Form Page 1 of 2 Date with Payment Card Acceptance and Security Policy C61 Describe event or reason that requires your department/organization to offer credit or debit (payment) cards as a method of payment: List all staff members who

  14. 8. Photograph of post card, 'Cicotte Street Bridge, Logansport, Ind.' ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. Photograph of post card, 'Cicotte Street Bridge, Logansport, Ind.' Logansport News Agency, Logansport, Ind., Curteich-Chicago 'C.T. American Art' post card {Reg. U.S. Pat. Off.}, postmarked October 17, 1949. Card in the Cass County photograph file at the Indiana State Library, Indianapolis. - Cicott Street Bridge, Spanning Wabash River at State Road 25, Logansport, Cass County, IN

  15. Commonwealth of Virginia Bank of America Purchasing Card

    E-print Network

    Commonwealth of Virginia Bank of America Purchasing Card Employee Agreement I, _______________________________ (Enter employee name here), acknowledge receipt of a Bank of America Visa Purchasing Card. As a Cardholder, I agree to comply with the following terms and conditions regarding my use of the Card: 1. I

  16. CARD No. 14 Content of Compliance Certification Application

    E-print Network

    CARD No. 14 Content of Compliance Certification Application 14.A.1 BACKGROUND The compliance that DOE must discuss in the CCA. This CARD addresses all elements of Section 194.14, with detailed climatological and meteorological conditions. In addition to the above, this CARD introduces requirements

  17. Financial Policy Manual 2303 USE OF A PURCHASING CARD

    E-print Network

    George, Edward I.

    Financial Policy Manual Page 1 2303 USE OF A PURCHASING CARD Effective: July 1993 Revised: April of Pennsylvania Purchasing Card. POLICY 1. The appropriate Senior Financial Officer must approve all requests to obtain a new Purchasing Card. 2. The Cardholder must successfully complete required training, and, upon

  18. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-print Network

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your the items as they apply to that person. 2. Show an address where you can receive the card 10 to 14 days from

  19. SDSU Writing Center How to Submit Time Cards

    E-print Network

    Gallo, Linda C.

    SDSU Writing Center How to Submit Time Cards Fall 2014 In order to be paid for your work, you will need to submit a time card each month with your hours worked. Below are instructions for how to submit your time card. We encourage you to do this in the center, using the printer at the front desk

  20. SMART CARD CONTENT SECURITY Defining "tamperproof" for portable smart media

    E-print Network

    Zanero, Stefano

    SMART CARD CONTENT SECURITY Defining "tamperproof" for portable smart media AUTHOR: Stefano Zanero Cards are often touted as "secure" portable storage devices. A complete, high-level design metodology has been proposed for embedded information systems based on smart card devices. However

  1. Offline Dictionary Attack on Password Authentication Schemes using Smart Cards

    E-print Network

    International Association for Cryptologic Research (IACR)

    Offline Dictionary Attack on Password Authentication Schemes using Smart Cards Ding Wang1 of secure and efficient smart-card-based password authenti- cation schemes remains a challenging problem in how to achieve truly two-factor security even if the smart cards can be tampered. In this paper, we

  2. THE CARD GAME SET BENJAMIN LENT DAVIS AND DIANE MACLAGAN

    E-print Network

    Maclagan, Diane

    THE CARD GAME SET BENJAMIN LENT DAVIS AND DIANE MACLAGAN set1 is an extremely addictive, fast-paced card game found in toy stores nationwide. Although children often beat adults, the game has a rich in German Shepherds and began representing genetic data on the dogs by drawing symbols on cards

  3. How many times should you shuffle a deck of cards?

    E-print Network

    Feres, Renato

    How many times should you shuffle a deck of cards? Renato Feres Abstract These are notes on the symmetric group and card shuffling from an "experimental" viewpoint. 1 Permutations Consider a deck of n cards, which we label by the integers 1, 2, . . . , n. Let us agree to represent the order of the virgin

  4. Using card sorts for understanding website information architectures: technological,

    E-print Network

    Cairns, Paul

    Using card sorts for understanding website information architectures: technological, methodological Science, University of York {Helen.Petrie, cpower, pcairns, caglaos}@cs.york.ac.uk Abstract. The card sort technique has many uses in HCI research and practice. Card sorts have traditionally been conducted

  5. Card-Shuffling Analysis with Markov Chains Harald Hammarstrom

    E-print Network

    Häggström, Olle

    Card-Shuffling Analysis with Markov Chains Harald Hammarstr¨om January 14, 2005 1 Introduction In this essay we shall discuss mathematical models of card-shuffling. The basic question to answer is "how many times do you need to shuffle a deck of cards for it to become sufficiently randomized?". This obviously

  6. Weaknesses of an Improvement Authentication Scheme using Smart Cards

    E-print Network

    International Association for Cryptologic Research (IACR)

    Weaknesses of an Improvement Authentication Scheme using Smart Cards Rafael Martínez-Peláez a authentication scheme using smart cards to prevent impersonation attack, malicious user attack, off-line password. Keywords: Cryptanalysis; ID-based; Mutual Authentication; Network Security; Smart Cards 1. Introduction

  7. Proposal for Digitizer-to-SLINK Interface Card

    E-print Network

    Proposal for Digitizer-to-SLINK Interface Card J. Pilcher (for Haifeng Wu) 10-Sept-1999 #12;10-Sept/GLINK interface built into board s No mezzanine card s Much more compact s 640 Mb/s capability (standard) s 346 Mb, 3ns gate delay) #12;10-Sept-99 Organization q Dual structure of interface card for redundancy s All

  8. Credit Card Attitudes and Behaviors of College Students

    ERIC Educational Resources Information Center

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  9. Credit Cards and College Students: Who Pays, Who Benefits?

    ERIC Educational Resources Information Center

    Munro, Jennifer; Hirt, Joan B.

    1998-01-01

    Survey of college students who managed credit cards wisely and those who did not (N=310), revealed that responsible users were more likely to have acquired credit cards before matriculating in college. Discusses implications for future personal-debt management and for institutions of higher education with regard to credit-card vendors. (EMK)

  10. Introducing Pattern Cards for Mixed Reality Game Design Richard Wetzel

    E-print Network

    Molinari, Marc

    Introducing Pattern Cards for Mixed Reality Game Design Richard Wetzel The Mixed Reality Laboratory cards creating a pattern language for designing Mixed Reality games. The deck of cards was used in a two Factors. Keywords mixed reality, games, location-based games, pervasive games, design patterns, pattern

  11. 33 CFR 125.55 - Outstanding Port Security Card Applications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Outstanding Port Security Card... WATERFRONT FACILITIES OR VESSELS § 125.55 Outstanding Port Security Card Applications. A person who has filed an application for a Coast Guard Port Security Card and who did not receive such a document prior...

  12. 33 CFR 125.55 - Outstanding Port Security Card Applications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Outstanding Port Security Card... WATERFRONT FACILITIES OR VESSELS § 125.55 Outstanding Port Security Card Applications. A person who has filed an application for a Coast Guard Port Security Card and who did not receive such a document prior...

  13. JAVA CARD Tools for Together Control Center Wojciech Mostowski

    E-print Network

    Mostowski, Wojciech

    JAVA CARD Tools for Together Control Center Wojciech Mostowski Chalmers University of Technology, G¨oteborg, Sweden Computing Science Department e-mail: woj@cs.chalmers.se Abstract This is a description of the JAVA CARD Tools package for Together Control Center. The package supports the development of JAVA CARD

  14. 8 CFR 103.21 - Access by individuals to records maintained about them.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.21 Access...a photograph but do bear both a name and address (such as a driver's license, or credit card). (2) Individuals...

  15. CardS4: Modal Theorem Proving on Java Rajeev Prabhakar Gor e ? and Phuong Th^e Nguy^en ??

    E-print Network

    Goré, Rajeev

    manager for restricting the ow of \\secrets" between multiple applets residing on the same card, although the card and the terminal (a PC, an ATM machine, a public telephone, or even a mobile telephone). Java for the card vendor, typically a bank (for credit and debit cards), or an airline (for frequent yer cards

  16. Artist Trading Cards: Connecting with Other Communities

    ERIC Educational Resources Information Center

    Bovio, Deborah

    2011-01-01

    Creating and exchanging Artist Trading Cards (ATCs) has been a rapidly growing trend. These miniature works of art are fun to make--and even more fun to share. The intrigue of developing these handmade treasures begins with the intent of creating art simply for the love of art. In this article, the author describes how her students made their…

  17. Memory of Quark Matter Card Game

    E-print Network

    J. Csörg?; Cs. Török; T. Csörg?

    2013-03-12

    Scientists at the Relativistic Heavy Ion Collider (RHIC, BNL) recently discovered, that the hottest known form of matter is not a gas, but acts like a fluid. Furthermore, this fluid of quarks expands and flows much more perfectly than water or any other well known fluid. This aspect of the RHIC discovery can be introduced even to primary levels of physics education, noting that the usual solid to liquid to gas sequence of phase transitions now are known to be followed by a transition to a nearly perfect fluid, a liquid of quarks, at the largest temperatures made by humans. The educational games described herein were invented by middle school students, members of a Science Club in Hungary. The games were invented for their entertainment, the educational applications in teaching high energy particle and nuclear physics to laypersons are quite unexpected but most welcomed. This manuscript describes games with a deck of cards called Quark Matter cards, where each card represents an elementary particle. The games include an important contribution by Angela Melocoton, an administrator of the Guests, Users and Visitors (GUV) Center at BNL. It describes in simple terms, how to play the Memory of Quark Matter style card games.

  18. ResponseCard NXT New Clicker Activation

    E-print Network

    Barrash, Warren

    #12;#12;ResponseCard® NXT #12;#12;#12;#12;New Clicker Activation Turning Point @ Boise State University #12;New Clicker Activation Turning Point @ Boise State University #12;New Clicker Activation Turning Point @ Boise State University #12;New Clicker Activation Turning Point @ Boise State University

  19. North Carolina Child Health Report Card, 2000.

    ERIC Educational Resources Information Center

    North Carolina Child Advocacy Inst., Raleigh.

    This sixth annual report card is produced to heighten awareness of the health of the children of North Carolina by summarizing important child health indicators. The report is intended to assist health administrators, legislators, and family advocates in their efforts to improve the health and safety of children statewide. Data are presented for…

  20. FT 3 Flight Test Cards for Export

    NASA Technical Reports Server (NTRS)

    Marston, Michael L.

    2015-01-01

    These flight test cards will be made available to stakeholders who participated in FT3. NASA entered into the relationship with our stakeholders, including the FAA, to develop requirements that will lead to routine flights of unmanned aircraft systems flying in the national airspace system.

  1. Integration through a Card-Sort Activity

    ERIC Educational Resources Information Center

    Green, Kris; Ricca, Bernard P.

    2015-01-01

    Learning to compute integrals via the various techniques of integration (e.g., integration by parts, partial fractions, etc.) is difficult for many students. Here, we look at how students in a college level Calculus II course develop the ability to categorize integrals and the difficulties they encounter using a card sort-resort activity. Analysis…

  2. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FISH AND WILDLIFE OFF-RESERVATION TREATY FISHING General Provisions...The failure of any person who claims to be entitled to the benefits of a treaty fishing right to have such a card in his...

  3. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FISH AND WILDLIFE OFF-RESERVATION TREATY FISHING General Provisions...The failure of any person who claims to be entitled to the benefits of a treaty fishing right to have such a card in his...

  4. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FISH AND WILDLIFE OFF-RESERVATION TREATY FISHING General Provisions...The failure of any person who claims to be entitled to the benefits of a treaty fishing right to have such a card in his...

  5. Catalog Card Production Software for Personal Computers.

    ERIC Educational Resources Information Center

    Konneker, Lloyd; Konneker, Rachel

    1989-01-01

    Provides an introduction to software which enables librarians to use microcomputers to produce catalog cards and labels for spines and pockets. A typical computer session is described, special printer forms used by the computer are discussed, criteria for choosing a program are outlined, and a list of vendors is provided. (Author/CLB)

  6. Looking at Debit and Credit Card Fraud

    ERIC Educational Resources Information Center

    Porkess, Roger; Mason, Stephen

    2012-01-01

    This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

  7. Healthy Harbor ReportCard2012

    E-print Network

    Hilderbrand, Robert H.

    Healthy Harbor ReportCard2012 Baltimore's Annual Baltimore Harbor met water quality standards 40 shorelines, the Healthy Harbor wetlands are designed to float on the water. Inside the islands are bundles later be used as fertilizer. The Healthy Harbor Floating Wetlands were designed by Biohabitats

  8. A Primer on Automating the Card Catalog.

    ERIC Educational Resources Information Center

    Skapura, Robert

    1990-01-01

    Provides some basic guidelines for converting a card catalog to a computerized catalog in school libraries. The advantages of using the MARC format are discussed, and three conversion methods (on site, records created by the vendor off site, and full vendor conversion off site) are compared in terms of the work involved, costs, and time. (CLB)

  9. North Carolina Child Health Report Card, 2001.

    ERIC Educational Resources Information Center

    Vitaglione, Tom; Weisner, Kristie

    This seventh annual report card is produced to heighten awareness of the health of the children of North Carolina by summarizing important child health indicators. The report is intended to assist health administrators, legislators, and family advocates in their efforts to improve the health and safety of children statewide. Data are presented for…

  10. CARD No. 23 Models and Computer Codes

    E-print Network

    CARD No. 23 Models and Computer Codes 23.A BACKGROUND Section 194.23 addresses the compliance criteria requirements for conceptual models and computer codes. Conceptual models capture a general understanding of the disposal system and are used as the basis for computer simulations of how well the disposal

  11. Music at Brasenose Concert Term Card

    E-print Network

    Oxford, University of

    Music at Brasenose Concert Term Card Trinity Term 2013 All concerts are in Brasenose College Chapel May 1.25pm: Piano Recital Ella Thorpe-Beeston and Katya D'Janoeff (1 st year Music at BNC) Saturday 11 Wednesday 5 th June 1.25pm: HCR Concert (tbc) Friday 7 th June 6.15pm: `Music at Brasenose' concert Eighth

  12. Music at Brasenose Concert Term Card

    E-print Network

    Oxford, University of

    Music at Brasenose Concert Term Card Michaelmas Term 2012 All concerts are in Brasenose College Horn Triumph Brass quintet is made up of current and former students of the Royal College of Music repertoire. The quintet aspires to entertain their audiences, whilst maintaining the highest musical

  13. Inexpensive Data Acquisition with a Sound Card

    ERIC Educational Resources Information Center

    Hassan, Umer; Pervaiz, Saad; Anwar, Muhammad Sabieh

    2011-01-01

    Signal generators, oscilloscopes, and data acquisition (DAQ) systems are standard components of the modern experimental physics laboratory. The sound card, a built-in component in the ubiquitous personal computer, can be utilized for all three of these tasks and offers an attractive option for labs in developing countries such as…

  14. Dealing with Student Credit Card Debt.

    ERIC Educational Resources Information Center

    Stanford, William E.

    1999-01-01

    Discusses the danger of college students accumulating a level of credit card debt that can seriously undermine their future lives. Offers 10 suggestions for colleges including controlling solicitations, offering workshops to freshmen, adding credit information to the campus Web site, communicating with the senior class, and discouraging or…

  15. Smart-card traffic system keeps Singapore

    E-print Network

    Hunt, Julian

    , the present pay-per-trip mechanism discourages extra car use. The system motivates drivers to try quieterSmart-card traffic system keeps Singapore in the fast lane Sir -- Recognizing the high economic and environmental costs of traffic gridlocks, Singapore recently implemented an electronic road pricing (ERP) system

  16. Recurring Gift Credit Card Information Name (last)

    E-print Network

    Glasser, Adrian

    Recurring Gift Credit Card Information Name (last):::_ (first): _ Please charge my: VISA Master: _ Additional designation: Amount: _ Total Amount: _ Recurring Schedule Please break my gift into equal installment amounts for a multi-payment pledge gift: Monthly Quarterly Semi-Annually Annually Please continue

  17. Procurement Card Program COLORADO SCHOOL OF MINES

    E-print Network

    Graduate Students with a stipulated contract start and end date Other Persons of Interest All users must ·Office Furniture EXAMPLES #12;Unallowable Purchases · Restaurant and Fast Food · Travel for CSM Employees/Students · Lab Chemicals · Gift Cards · Alcohol · Logo/Trademark For Official Policy regarding these purchases

  18. Iridovirus CARD Protein Inhibits Apoptosis through Intrinsic and Extrinsic Pathways

    PubMed Central

    Chen, Chien-Wen; Wu, Ming-Shan; Huang, Yi-Jen; Lin, Pei-Wen; Shih, Chueh-Ju; Lin, Fu-Pang; Chang, Chi-Yao

    2015-01-01

    Grouper iridovirus (GIV) belongs to the genus Ranavirus of the family Iridoviridae; the genomes of such viruses contain an anti-apoptotic caspase recruitment domain (CARD) gene. The GIV-CARD gene encodes a protein of 91 amino acids with a molecular mass of 10,505 Daltons, and shows high similarity to other viral CARD genes and human ICEBERG. In this study, we used Northern blot to demonstrate that GIV-CARD transcription begins at 4 h post-infection; furthermore, we report that its transcription is completely inhibited by cycloheximide but not by aphidicolin, indicating that GIV-CARD is an early gene. GIV-CARD-EGFP and GIV-CARD-FLAG recombinant proteins were observed to translocate from the cytoplasm into the nucleus, but no obvious nuclear localization sequence was observed within GIV-CARD. RNA interference-mediated knockdown of GIV-CARD in GK cells infected with GIV inhibited expression of GIV-CARD and five other viral genes during the early stages of infection, and also reduced GIV infection ability. Immunostaining was performed to show that apoptosis was effectively inhibited in cells expressing GIV-CARD. HeLa cells irradiated with UV or treated with anti-Fas antibody will undergo apoptosis through the intrinsic and extrinsic pathways, respectively. However, over-expression of recombinant GIV-CARD protein in HeLa cells inhibited apoptosis induced by mitochondrial and death receptor signaling. Finally, we report that expression of GIV-CARD in HeLa cells significantly reduced the activities of caspase-8 and -9 following apoptosis triggered by anti-Fas antibody. Taken together, these results demonstrate that GIV-CARD inhibits apoptosis through both intrinsic and extrinsic pathways. PMID:26047333

  19. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  20. Genome-Wide Mapping of the Distribution of CarD, RNAP ?(A), and RNAP ? on the Mycobacterium smegmatis Chromosome using Chromatin Immunoprecipitation Sequencing.

    PubMed

    Landick, Robert; Krek, Azra; Glickman, Michael S; Socci, Nicholas D; Stallings, Christina L

    2014-12-01

    CarD is an essential mycobacterial protein that binds the RNA polymerase (RNAP) and affects the transcriptional profile of Mycobacterium smegmatis and Mycobacterium tuberculosis (6). We predicted that CarD was directly regulating RNAP function but our prior experiments had not determined at what stage of transcription CarD was functioning and at which genes CarD interacted with the RNAP. To begin to address these open questions, we performed Chromatin Immunoprecipitation sequencing (ChIP-seq) to survey the distribution of CarD throughout the M. smegmatis chromosome. The distribution of RNAP subunits ? and ?(A) were also profiled. We expected that RNAP ? would be present throughout transcribed regions and RNAP ?(A) would be predominantly enriched at promoters based on work in Escherichia coli (3), however this had yet to be determined in mycobacteria. The ChIP-seq analyses revealed that CarD was never present on the genome in the absence of RNAP, was primarily associated with promoter regions, and was highly correlated with the distribution of RNAP ?(A). The colocalization of ?(A) and CarD led us to propose that in vivo, CarD associates with RNAP initiation complexes at most promoters and is therefore a global regulator of transcription initiation. Here we describe in detail the data from the ChIP-seq experiments associated with the study published by Srivastava and colleagues in the Proceedings of the National Academy of Science in 2013 (5) as well as discuss the findings from this dataset in relation to both CarD and mycobacterial transcription as a whole. The ChIP-seq data have been deposited in the Gene Expression Omnibus (GEO) database, www.ncbi.nlm.nih.gov/geo (accession no. GSE48164). PMID:25089258

  1. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  2. Dual Resolution Images from Paired Fingerprint Cards

    National Institute of Standards and Technology Data Gateway

    NIST Dual Resolution Images from Paired Fingerprint Cards (PC database for purchase)   NIST Special Database 30 is being distributed for use in development and testing of fingerprint compression and fingerprint matching systems. The database allows the user to develop and evaluate data compression algorithms for fingerprint images scanned at both 19.7 ppmm (500 dpi) and 39.4 ppmm (1000 dpi). The data consist of 36 ten-print paired cards with both the rolled and plain images scanned at 19.7 and 39.4 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  3. Human Factors Assessment of Respiratory Support Pack (RSP) Cue Card

    NASA Technical Reports Server (NTRS)

    Whitmore, Mihriban; Hudy, Cynthia; Smith, Danielle; Byrne, Vicky

    2005-01-01

    The Respiratory Support Pack (RSP) is a medical pack onboard the International Space Station (ISS) that contains much of the necessary equipment for providing aid to a conscious or unconscious crewmember in respiratory distress. Inside the RSP lid pocket is a 5.5 by 11 inch paper cue card, which is used by a Crew Medical Officer as the procedure to set up the equipment and deliver oxygen to a crewmember. In training, crewmembers expressed concerns about the readability and usability of the cue card; consequently, updating the cue card was prioritized as an activity to be completed prior to Space Shuttle return-to-flight. The Usability Testing and Analysis Facility at the Johnson Space Center evaluated the current layout of the cue card, and proposed several new cue card designs based on human factors principals. A series of three studies were performed in order to experimentally compare performance with each of the cue card designs. Nonmedically trained personnel used either a redesigned RSP cue card, or the original card to simulate resuscitation (using a mannequin along with the hardware). Time to completion, errors and subjective ratings were recorded. The addition of pictures, colors, borders, and simplification of the flow of information (making minimal changes to the actual procedure content) elicited great benefits during testing. Time to complete RSP procedures was reduced by as much as three minutes with the final cue card design. Detailed results from these studies, as well as general guidelines for cue card design will be discussed.

  4. Bird Migration Card from Dust Bowl

    USGS Multimedia Gallery

    Data From this Card:Name of Bird: Mallard Locality: Wiseton Saskatchewan Observer: Mrs. Mary E M. DicksonFirst Seen: 7thNumber Seen: 12Next Seen: April 8, over 100 seenBecame Common:Last Seen:Common or Rare: CommonBreeds: NoNotes: Our lake went dry in 1936 and no water ran into it in 1937 so d...

  5. LHC card games: bringing about retrocausality?

    E-print Network

    Z. K. Silagadze

    2010-03-31

    The model of Nielsen and Ninomiya claims that "the SSC (Superconducting Supercollider) were stopped by the US Congress due to the backward causation from the big amounts of Higgs particles, which it would have produced, if it had been allowed to run". They also proposed to play a card game and if the "close LHC" card is drawn (with probability $\\sim 10^{-6}$), really close LHC on the eve of Higgs particle discovery to avoid more severe bad luck. Crazy? Probably. But paraphrasing Salvador Dali, if you believe that you and me are smarter in physics than Nielsen and Ninomiya, don't read this article, just go right on in your blissful idiocy. Therefore, I will try to make sense of backward causation. It turns out that not only the backward causation makes perfect sense in some models of possible reality, but that Nielsen and Ninomiya really have a chance to close LHC by a card game. The only thing they need is to be smart enough to manage to develop their theory up to the level of brilliance beginning from which it becomes a part of the fabric of reality. We hope, however, that they will use their outstanding abilities to bring about some more interesting future.

  6. LHC card games: bringing about retrocausality?

    E-print Network

    Silagadze, Z K

    2010-01-01

    The model of Nielsen and Ninomiya claims that "the SSC (Superconducting Supercollider) were stopped by the US Congress due to the backward causation from the big amounts of Higgs particles, which it would have produced, if it had been allowed to run". They also proposed to play a card game and if the "close LHC" card is drawn (with probability $\\sim 10^{-6}$), really close LHC on the eve of Higgs particle discovery to avoid more severe bad luck. Crazy? Probably. But paraphrasing Salvador Dali, if you believe that you and me are smarter in physics than Nielsen and Ninomiya, don't read this article, just go right on in your blissful idiocy. Therefore, I will try to make sense of backward causation. It turns out that not only the backward causation makes perfect sense in some models of possible reality, but that Nielsen and Ninomiya really have a chance to close LHC by a card game. The only thing they need is to be smart enough to manage to develop their theory up to the level of brilliance beginning from which ...

  7. Memory of Quark Matter Card Game

    E-print Network

    Csörg?, J; Csörg?, T

    2013-01-01

    Scientists at the Relativistic Heavy Ion Collider (RHIC, BNL) recently discovered, that the hottest known form of matter is not a gas, but acts like a fluid. Furthermore, this fluid of quarks expands and flows much more perfectly than water or any other well known fluid. This aspect of the RHIC discovery can be introduced even to primary levels of physics education, noting that the usual solid to liquid to gas sequence of phase transitions now are known to be followed by a transition to a nearly perfect fluid, a liquid of quarks, at the largest temperatures made by humans. The educational games described herein were invented by middle school students, members of a Science Club in Hungary. The games were invented for their entertainment, the educational applications in teaching high energy particle and nuclear physics to laypersons are quite unexpected but most welcomed. This manuscript describes games with a deck of cards called Quark Matter cards, where each card represents an elementary particle. The games ...

  8. Advanced Control Flow in Java Card Programming Peng Li Steve Zdancewic

    E-print Network

    Zdancewic, Steve

    {lipeng,stevez}@cis.upenn.edu ABSTRACT Java Card technology simplifies the development of smart card- gramming General Terms Languages Keywords Java Card, Continuation, CPS, Control Flow, Smart Card as well as the runtime environment for smart card programming, making it possible for developers

  9. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-print Network

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  10. Full Memory Read Attack on a Java Card Jip Hogenboom and Wojciech Mostowski

    E-print Network

    Mostowski, Wojciech

    present a simple attack on a Java Card smart card to perform arbitrary memory reads. The attack utilises Introduction Smart card security is always considered to be very high priority due to the na- ture of smart card products. Smart cards store our private data (e.g. fingerprints in the new generation e

  11. Formal Reasoning about Non-Atomic JAVA CARD Methods in Dynamic Logic

    E-print Network

    Mostowski, Wojciech

    dialect used to program smart cards. JAVA CARD DL is implemented in the KeY system [1], an integrated is a feature specific to JAVA CARD technology. In the context of the persistent data stored in smart card each time a PIN code provided by the user is verified against the code stored on the smart card

  12. Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary

    E-print Network

    International Association for Cryptologic Research (IACR)

    Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks with password protected smart card. In recent years, several protocols for password-based au- thenticated key between a smart card owner and smart card via an untrusted card reader. In a typical scenario, a smart

  13. PCard Agreement Page 1 of 2 University of Utah Purchasing Card

    E-print Network

    Clayton, Dale H.

    PCard Agreement Page 1 of 2 University of Utah Purchasing Card Cardholder's Agreement The University of Utah ("University") is pleased to offer you a Purchasing Card ("Card"). This Card represents the University's assets. I, the undersigned, hereby acknowledge that my receipt of a University Purchasing Card

  14. JAVA CARD Applet Firewall Exploration and Exploitation Wojciech Mostowski and Erik Poll

    E-print Network

    Mostowski, Wojciech

    JAVA CARD Applet Firewall Exploration and Exploitation Wojciech Mostowski and Erik Poll Digital implementations of the JAVA CARD ap- plet firewall. Despite the imminent release of the JAVA CARD 3.0 standard, cards with the well- established JAVA CARD 2.x standard will stay with us for some time to come. We

  15. DINER CARD TERMS AND CONDITIONS ACADEMIC YEAR 2011-12 The Swansea University flexible Diner Card ("Diners Card") provides a simple, no fuss way of paying for your food and drink on campus.

    E-print Network

    Martin, Ralph R.

    DINER CARD TERMS AND CONDITIONS ACADEMIC YEAR 2011-12 The Swansea University flexible Diner Card ("Diners Card") provides a simple, no fuss way of paying for your food and drink on campus. How do I get my Diners Card? Complete the application form below and send together with a cheque payable to Swansea

  16. Modeling intelligent agent beliefs in a card game scenario

    NASA Astrophysics Data System (ADS)

    Go?u?ski, Marcel; Tomanek, Roman; WÄ siewicz, Piotr

    In this paper we explore the problem of intelligent agent beliefs. We model agent beliefs using multimodal logics of belief, KD45(m) system implemented as a directed graph depicting Kripke semantics, precisely. We present a card game engine application which allows multiple agents to connect to a given game session and play the card game. As an example simplified version of popular Saboteur card game is used. Implementation was done in Java language using following libraries and applications: Apache Mina, LWJGL.

  17. Psych ACCESS Psych ACCESS

    E-print Network

    psychology, counseling psychology, global health, political science, forensic psychology, marriage and family of Psych Access. A post-graduation report from Career Services @ Virginia Tech (2013), based on students or professional schools. Degrees sought included Bachelor of Science in Nursing (BSN), Master's of Public

  18. 32 CFR 161.7 - ID card life-cycle procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., magnetic stripe, bar codes, or integrated circuit chip) becomes illegible or inoperable, or when a CAC is... treated as personally identifiable information, in accordance with DoD Regulation 5200.1-R, and 32...

  19. Intelligent card processing terminal of urban rail transit in Nanjing

    NASA Astrophysics Data System (ADS)

    Xia, Dechuan; Zhang, Xiaojun; Song, Yana; He, Tiejun

    2011-10-01

    In order to improve the compatibility, security and expandability of Automatic Fare Collection System in rail transit, and reduce the maintenance cost, intelligent card processing terminal is proposed in this paper. The operation flow and features of intelligent card processing terminal are analyzed in detailed, and the software and hardware structures and business treatment process are designed. Finally, the security mechanism of intelligent card processing terminal is summarized. The application results shows that Intelligent card processing terminal makes interconnection among lines easier, creates considerable economic efficiency and the social efficiency, and can be widely used.

  20. High density printed electrical circuit board card connection system

    DOEpatents

    Baumbaugh, A.E.

    1997-05-06

    A zero insertion/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned. The card connection system provides a simple solution to the need for a greater number of electrical signal connections. 12 figs.

  1. High density printed electrical circuit board card connection system

    DOEpatents

    Baumbaugh, Alan E. (Aurora, IL)

    1997-01-01

    A zero insertion/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned. The card connection system provides a simple solution to the need for a greater number of electrical signal connections.

  2. Determinants of debit cards acceptance: An empirical investigation

    NASA Astrophysics Data System (ADS)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  3. Determinants of debit cards acceptance: An empirical investigation

    SciTech Connect

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar; Bakri, Mohamed Hariri; Zulkepli, Jafri

    2014-12-04

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  4. WEST CORRIDOR (ORIGINALLY KNOWN AS LIBRARY OF CONGRESS CARD CATALOG) ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    WEST CORRIDOR (ORIGINALLY KNOWN AS LIBRARY OF CONGRESS CARD CATALOG) ON FIRST FLOOR, LOOKING EAST - Free Library of Philadelphia, Central Library, 1901 Vine Street, Philadelphia, Philadelphia County, PA

  5. CARDING MACHINES, JEFFERSON MILL. PHOTOCOPY OF c. 1900 VIEW. From ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    CARDING MACHINES, JEFFERSON MILL. PHOTOCOPY OF c. 1900 VIEW. From the collection of the Manchester Historic Association, Manchester, N. H. - Amoskeag Millyard, Canal Street, Manchester, Hillsborough County, NH

  6. Department 1824 Job Card System: A new web-based business tool

    SciTech Connect

    Brangan, J.R.

    1998-02-01

    The Analytical Chemistry Department uses a system of job cards to control and monitor the work through the organization. In the past, many different systems have been developed to allow each laboratory to monitor their individual work and report data. Unfortunately, these systems were separate and unique which caused difficulty in ascertaining any overall picture of the Department`s workload. To overcome these shortcomings, a new Job Card System was developed on Lotus Notes/Domino{trademark} for tracking the work through the laboratory. This application is groupware/database software and is located on the Sandia Intranet which allows users of any type of computer running a network browser to access the system. Security is provided through the use of logons and passwords for users who must add and/or modify information on the system. Customers may view the jobs in process by entering the system as an anonymous user. An overall view of the work in the department can be obtained by selecting from a variety of on screen reports. This enables the analysts, customers, customer contacts, and the Department Manager to quickly evaluate the work in process, the resources required, and the availability of equipment. On-line approval of the work and e-mail messaging of completed jobs has been provided to streamline the review and approval cycle. This paper provides a guide for the use of the Job Card System and information on maintenance of the system.

  7. LabVIEW Interface for PCI-SpaceWire Interface Card

    NASA Technical Reports Server (NTRS)

    Lux, James; Loya, Frank; Bachmann, Alex

    2005-01-01

    This software provides a LabView interface to the NT drivers for the PCISpaceWire card, which is a peripheral component interface (PCI) bus interface that conforms to the IEEE-1355/ SpaceWire standard. As SpaceWire grows in popularity, the ability to use SpaceWire links within LabVIEW will be important to electronic ground support equipment vendors. In addition, there is a need for a high-level LabVIEW interface to the low-level device- driver software supplied with the card. The LabVIEW virtual instrument (VI) provides graphical interfaces to support all (1) SpaceWire link functions, including message handling and routing; (2) monitoring as a passive tap using specialized hardware; and (3) low-level access to satellite mission-control subsystem functions. The software is supplied in a zip file that contains LabVIEW VI files, which provide various functions of the PCI-SpaceWire card, as well as higher-link-level functions. The VIs are suitably named according to the matching function names in the driver manual. A number of test programs also are provided to exercise various functions.

  8. cardTAP: Automated Deduction on a Smart Card Andrew Slater1 , Rajeev Gore1;2 , Joachim Posegga3, Harald Vogt3

    E-print Network

    Slater, Andrew

    cardTAP: Automated Deduction on a Smart Card Andrew Slater1 , Rajeev Gore1;2 , Joachim Posegga3 on a smart card. The prover is written in Java and implements a dual tableau calculus.1 Due to the limited resources available on cur- rent smart cards, the prover is restricted to propositional classical logic

  9. 2003 Oberthur Card Systems This document may be reproduced only in its original entirety [without revision] Oberthur CosmopolIC V4 Smart Card

    E-print Network

    © 2003 Oberthur Card Systems This document may be reproduced only in its original entirety [without revision] Oberthur CosmopolIC V4 Smart Card with ActivCard Applets FIPS 140-1 Level 2 Security Policy Public Version V2.8 March 12, 2004 Oberthur Card Systems 3150 E. Ana Street Rancho Dominguez, CA 90221

  10. Amazing Card Trick Problems Math 1102 1. Recall that each set of three cards can be arranged in six different orders. If we desig-

    E-print Network

    Reiter, Harold

    Amazing Card Trick Problems Math 1102 1. Recall that each set of three cards can be arranged in six different orders. If we desig- nate an ordering on the cards themselves, this means that we can define six of the three values, m the middle one, and h the highest value. Now among the five cards you are given, find

  11. EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond

    E-print Network

    Kohno, Tadayoshi

    EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses examine the recently issued United States Passport Card and Washing- ton State "enhanced drivers license General Terms Security, Measurement Keywords Authentication, Cloning, EPC, Passport Card, RFID, WHTI

  12. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...false Physical security features for the driver's license or identification card...SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS...15 Physical security features for the driver's license or identification card....

  13. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...false Physical security features for the driver's license or identification card...SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS...15 Physical security features for the driver's license or identification card....

  14. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...false Physical security features for the driver's license or identification card...SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS...15 Physical security features for the driver's license or identification card....

  15. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...false Physical security features for the driver's license or identification card...SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS...15 Physical security features for the driver's license or identification card....

  16. 25 CFR 514.15 - May tribes submit fingerprint cards to the NIGC for processing?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false May tribes submit fingerprint cards to the NIGC for processing...FEES § 514.15 May tribes submit fingerprint cards to the NIGC for processing? Tribes may submit fingerprint cards to the Commission for...

  17. 25 CFR 514.15 - May tribes submit fingerprint cards to the NIGC for processing?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false May tribes submit fingerprint cards to the NIGC for processing...FEES § 514.15 May tribes submit fingerprint cards to the NIGC for processing? Tribes may submit fingerprint cards to the Commission for...

  18. 25 CFR 542.9 - What are the minimum internal control standards for card games?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...days, within which to mark, cancel, or destroy cards from play. (i) This standard shall not apply where playing cards are...site, distributed to and returned from tables and removed from play by the gaming operation. (e) Plastic cards....

  19. 25 CFR 542.9 - What are the minimum internal control standards for card games?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...days, within which to mark, cancel, or destroy cards from play. (i) This standard shall not apply where playing cards are...site, distributed to and returned from tables and removed from play by the gaming operation. (e) Plastic cards....

  20. 36 CFR 1254.10 - For how long and where is my researcher identification card valid?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...false For how long and where is my researcher identification card valid? 1254...10 For how long and where is my researcher identification card valid? ...facilities that issue and use plastic researcher identification cards as part of...

  1. 36 CFR 1254.10 - For how long and where is my researcher identification card valid?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...false For how long and where is my researcher identification card valid? 1254...10 For how long and where is my researcher identification card valid? ...facilities that issue and use plastic researcher identification cards as part of...

  2. 25 CFR 542.9 - What are the minimum internal control standards for card games?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...control standards for card games? 542.9 Section 542...control standards for card games? (a) Computer applications. For any computer applications utilized...the collection of the card game drop and the count...

  3. Mated Fingerprint Card Pairs 2 (MFCP2)

    National Institute of Standards and Technology Data Gateway

    NIST Mated Fingerprint Card Pairs 2 (MFCP2) (PC database for purchase)   NIST Special Database 14 is being distributed for use in development and testing of automated fingerprint classification and matching systems on a set of images which approximate a natural horizontal distribution of the National Crime Information Center (NCIC) fingerprint classes. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  4. Checklist for designing a psychology major & filing major cards

    E-print Network

    Bucci, David J.

    Checklist for designing a psychology major & filing major cards __________________________________________________ __________________ please print your name date checklist & materials submitted This checklist will guide you in preparing cannot be checked, the major plan cannot be approved. #12;Bring the Checklist and completed major cards

  5. Algorithms for Designing Pop-Up Cards Zachary Abel1

    E-print Network

    Demaine, Erik

    Algorithms for Designing Pop-Up Cards Zachary Abel1 , Erik D. Demaine2 , Martin L. Demaine2 , Sarah for delivering babies. Dean & Sons' Little Red Riding Hood (1850) is the first known movable book where a flat ­ Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany #12;2 Algorithms for Designing Pop-Up Cards

  6. 32 CFR 1615.9 - Registration card or form.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Registration card or form. 1615.9 Section 1615.9 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM ADMINISTRATION OF REGISTRATION § 1615.9 Registration card or form. For the purposes of these regulations, the terms...

  7. 32 CFR 1615.9 - Registration card or form.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Registration card or form. 1615.9 Section 1615.9 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM ADMINISTRATION OF REGISTRATION § 1615.9 Registration card or form. For the purposes of these regulations, the terms...

  8. 32 CFR 1615.9 - Registration card or form.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Registration card or form. 1615.9 Section 1615.9 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM ADMINISTRATION OF REGISTRATION § 1615.9 Registration card or form. For the purposes of these regulations, the terms...

  9. 32 CFR 1615.9 - Registration card or form.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Registration card or form. 1615.9 Section 1615.9 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM ADMINISTRATION OF REGISTRATION § 1615.9 Registration card or form. For the purposes of these regulations, the terms...

  10. Using Cue Cards throughout the K-12 Curriculum

    ERIC Educational Resources Information Center

    Conderman, Greg; Hedin, Laura R.

    2015-01-01

    As a flexible instructional tool, cue cards offer support for students with and without disabilities. By providing different amounts of support, they also can be used to differentiate instruction in a variety of subject areas and grade levels. This article describes various strategies for using cue cards and includes examples from K-12 classrooms.

  11. 78 FR 39020 - Market Test on Gift Cards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... Market Test on Gift Cards AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal Service filing requesting a temporary extension of a market test on gift... temporarily extend its Gift Card market test under 39 U.S.C. 3641(d).\\1\\ The market test is set to expire...

  12. 75 FR 70753 - Market Test Involving Greeting Cards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-18

    ... Market Test Involving Greeting Cards AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recently-filed Postal Service proposal to conduct a market test involving greeting cards. A key feature of the market test is an alternative arrangement for payment of postage. Under...

  13. Neural Data Mining for Credit Card Fraud Detection T. Langsdorf

    E-print Network

    Brause, R.

    Neural Data Mining for Credit Card Fraud Detection R. Brause, 1) T. Langsdorf 1) , M. Hepp 2) 1) J of credit card fraud is an important ap- plication for prediction techniques. One major obstacle for using successfully to obtain a high fraud cov- erage combined with a low false alarm rate. 1 Introduction

  14. IR Cards: Inquiry-Based Introduction to Infrared Spectroscopy

    ERIC Educational Resources Information Center

    Bennett, Jacqueline; Forster, Tabetha

    2010-01-01

    As infrared spectroscopy (IR) is frequently used in undergraduate organic chemistry courses, an inductive introduction to IR spectroscopy that uses index cards printed with spectra, structures, and chemical names is described. Groups of students are given an alphabetized deck of these "IR cards" to sort into functional groups. The students then…

  15. 77 FR 46258 - Debit Card Interchange Fees and Routing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-03

    ...The Board has amended the provisions in Regulation II (Debit Card Interchange Fees and Routing) that govern adjustments to debit card interchange transaction fees to make an allowance for fraud- prevention costs incurred by issuers. The amendments permit an issuer to receive or charge an amount of no more than 1 cent per transaction (the same amount currently permitted) in addition to its......

  16. Elements--A Card Game of Chemical Names and Symbols

    ERIC Educational Resources Information Center

    Sevcik, Richard S.; Hicks, O'Dell; Schultz, Linda D.; Alexander, Susan V.

    2008-01-01

    "Elements" is a competitive card game designed to help middle school students recognize and correlate the names and symbols of the most significant chemical elements. Each student is required to construct his or her own decks of playing cards--one with the names of the chemical elements and one with their corresponding symbols--and compete against…

  17. Quality Control for the 3-in-1 Cards 1. Overview

    E-print Network

    phases. The first is a series of acceptance tests done on the cards during manufacturing, to ensure that the production is proceeding as planned. The second phase consists of burn-in and detailed testing of each card before delivery to the PMT- block assembly sites. 2. Acceptance Tests It is proposed that the production

  18. 77 FR 37558 - Disclosure of Certain Credit Card Complaint Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ...The Bureau of Consumer Financial Protection (the ``Bureau'') is issuing a final policy statement (the ``Policy Statement'') to provide guidance on how the Bureau plans to exercise its discretion to publicly disclose certain credit card complaint data that do not include personally identifiable information. The Bureau receives credit card complaints from consumers under the terms of Title X of......

  19. Isolating the Performance Impacts of Network Interface Cards through Microbenchmarks

    E-print Network

    , rixner, hykim}@rice.edu Abstract This paper studies the impact of network interface cards (NICsIsolating the Performance Impacts of Network Interface Cards through Microbenchmarks Technical Report #EE0401 Vijay S. Pai, Scott Rixner, and Hyong-youb Kim Rice University Houston, TX 77005 {vijaypai

  20. Isolating the Performance Impacts of Network Interface Cards through Microbenchmarks

    E-print Network

    Isolating the Performance Impacts of Network Interface Cards through Microbenchmarks Vijay S. Pai Scott Rixner Rice University Houston, TX 77005 {vijaypai,rixner,hykim}@rice.edu Hyong-youb Kim Many factors can prevent a Gigabit Ethernet network interface card (NIC) from achieving line rate

  1. Study Snake A Flash-Card App for Android

    E-print Network

    Plotkin, Joshua B.

    Study Snake A Flash-Card App for Android Goal : Improve Retention of Information learned in school, but they are also boring. Classic arcade games are addicting, but they are also useless. StudySnake is an app-Cards are an effective medium for using spaced repetition, and an App can assist in reminding the user when the next

  2. Using Playing Cards to Simulate a Molecular Clock

    ERIC Educational Resources Information Center

    Westerling, Karin E.

    2008-01-01

    Changes in DNA base-repair may serve as an indicator of the time elapsed since divergence from a common ancestor. DNA sequences can now be analyzed. The simulation presented in this article allows students to observe the accumulation of changes in a randomly mutating sequence of playing cards. The cards are analogous to DNA nucleotide or protein…

  3. An Overview of Opening and Carding for Nonwoven Applications.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The opening and carding of fibers is well understood for yarn production. The same operations may also serve a role in nonwoven applications. The presentation is intended as an overview of the options and parameters involved in the opening, cleaning, and carding of fibers, particularly cotton, for...

  4. Disentangling Dimensions in the Dimensional Change Card-Sorting Task

    ERIC Educational Resources Information Center

    Kloo, Daniela; Perner, Josef

    2005-01-01

    The dimensional change card-sorting task (DCCS task) is frequently used to assess young children's executive abilities. However, the source of children's difficulty with this task is still under debate. In the standard DCCS task, children have to sort, for example, test cards with a red cherry or a blue banana into two boxes marked with target…

  5. 12 CFR 226.12 - Special credit card provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 226.12 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a...) Prompt notification of returns and crediting of refunds. (1) When a creditor other than the card...

  6. The new star of cable TV: smart cards.

    PubMed

    Watson, S

    1994-05-01

    Cable television viewers in New York are tuning in to an unusual new ad campaign for health care smart cards. Berdy Medical Systems Inc. of Rochelle Park, N.J., is running the ads in the hopes that card-carrying consumers will press their physicians and hospitals to jump on the automation bandwagon and buy electronic records software. PMID:10141195

  7. Universal Tailored Access: Automating Setup of Public and Classroom Computers.

    ERIC Educational Resources Information Center

    Whittaker, Stephen G.; Young, Ted; Toth-Cohen, Susan

    2002-01-01

    This article describes a setup smart access card that enables users with visual impairments to customize magnifiers and screen readers on computers by loading the floppy disk into the computer and finding and pressing two successive keys. A trial with four elderly users found instruction took about 15 minutes. (Contains 3 references.) (CR)

  8. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  9. Efficiency at Sorting Cards in Compressed Air

    PubMed Central

    Poulton, E. C.; Catton, M. J.; Carpenter, A.

    1964-01-01

    At a site where compressed air was being used in the construction of a tunnel, 34 men sorted cards twice, once at normal atmospheric pressure and once at 3½, 2½, or 2 atmospheres absolute pressure. An additional six men sorted cards twice at normal atmospheric pressure. When the task was carried out for the first time, all the groups of men performing at raised pressure were found to yield a reliably greater proportion of very slow responses than the group of men performing at normal pressure. There was reliably more variability in timing at 3½ and 2½ atmospheres absolute than at normal pressure. At 3½ atmospheres absolute the average performance was also reliably slower. When the task was carried out for the second time, exposure to 3½ atmospheres absolute pressure had no reliable effect. Thus compressed air affected performance only while the task was being learnt; it had little effect after practice. No reliable differences were found related to age, to length of experience in compressed air, or to the duration of the exposure to compressed air, which was never less than 10 minutes at 3½ atmospheres absolute pressure. PMID:14180485

  10. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  11. Stanford GO CARDs Checklist Get ready to yell "GO CARD!" in Stanford Stadium, in your dorm and all around campus.

    E-print Network

    Jurafsky, Daniel

    Stanford GO CARDs Checklist Get ready to yell "GO CARD!" in Stanford Stadium, in your dorm and all. Go! Create own tradition Eat Midnight Breakfast Dead Week Primal Scream Read the Stanford Daily Play Assasins Get rolled out Pull an all-nighter Attend a Frost concert Attend a Senior Night Go

  12. CardS4: Modal Theorem Proving on Java Rajeev Prabhakar Gore and Phuong Th^e Nguy^en

    E-print Network

    Goré, Rajeev

    on current Java cards. We hope to use this prover as the basis of an on-board security manager the card and the terminal (a PC, an ATM machine, a public telephone, or even a mobile telephone). Java a bank transfer via the Quicken home-banking software [Bru97]. The purpose of this paper is, first

  13. CardS4: Modal Theorem Proving on Java Rajeev Prabhakar Gor e + and Phuong Th e Nguy en #

    E-print Network

    Goré, Rajeev

    manager for restricting the flow of ``secrets'' between multiple applets residing on the same card a clock signal, and to act as an interface between the card and the terminal (a PC, an ATM machine attacker. Another is an attack al­ lowing an outside intruder to register a bank transfer via the Quicken

  14. Maxed out: The Relationship between Credit Card Debt, Credit Card Distress and Grade Point Averages for College Students

    ERIC Educational Resources Information Center

    Smith, Temple Day

    2011-01-01

    Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…

  15. The Latest Information on Fort Detrick Gate Access Procedures | Poster

    Cancer.gov

    As of Jan. 5, all visitors to Fort Detrick are required to undergo a National Crime Information Center background check prior to entering base. The background checks are conducted at Old Farm Gate. The new access procedures may cause delays at all Fort Detrick gates, but especially at Old Farm Gate. Access requirements have not changed for employees and personnel with a federal/NIH PIV card. Other types of identification badges are no longer acceptable.

  16. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  17. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  18. The Security Email Based on Smart Card

    NASA Astrophysics Data System (ADS)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  19. ACAA fly ash basics: quick reference card

    SciTech Connect

    2006-07-01

    Fly ash is a fine powdery material created when coal is burned to generate electricity. Before escaping into the environment via the utility stacks, the ash is collected and may be stored for beneficial uses or disposed of, if necessary. The use of fly ash provides environmental benefits, such as the conservation of natural resources, the reduction of greenhouse gas emissions and eliminating the needed for ash disposal in landfills. It is also a valuable mineral resource that is used in construction and manufacturing. Fly ash is used in the production of Portland cement, concrete, mortars and stuccos, manufactured aggregates along with various agricultural applications. As mineral filler, fly ash can be used for paints, shingles, carpet backing, plastics, metal castings and other purposes. This quick reference card is intended to provide the reader basic source, identification and composition, information specifically related to fly ash.

  20. Investigating customer racial discrimination in the secondary baseball card market.

    PubMed

    Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M

    2011-01-01

    A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price. PMID:21337740

  1. The swipe card model of odorant recognition.

    PubMed

    Brookes, Jennifer C; Horsfield, Andrew P; Stoneham, A Marshall

    2012-01-01

    Just how we discriminate between the different odours we encounter is not completely understood yet. While obviously a matter involving biology, the core issue isa matter for physics: what microscopic interactions enable the receptors in our noses-small protein switches—to distinguish scent molecules? We survey what is and is not known about the physical processes that take place when we smell things, highlighting the difficulties in developing a full understanding of the mechanics of odorant recognition. The main current theories, discussed here, fall into two major groups. One class emphasises the scent molecule's shape, and is described informally as a "lock and key" mechanism. But there is another category, which we focus on and which we call "swipe card" theories:the molecular shape must be good enough, but the information that identifies the smell involves other factors. One clearly-defined "swipe card" mechanism that we discuss here is Turin's theory, in which inelastic electron tunnelling is used to discern olfactant vibration frequencies. This theory is explicitly quantal, since it requires the molecular vibrations to take in or give out energy only in discrete quanta. These ideas lead to obvious experimental tests and challenges. We describe the current theory in a form that takes into account molecular shape as well as olfactant vibrations. It emerges that this theory can explain many observations hard to reconcile in other ways. There are still some important gaps in a comprehensive physics-based description of the central steps in odorant recognition. We also discuss how far these ideas carry over to analogous processes involving other small biomolecules, like hormones, steroids and neurotransmitters. We conclude with a discussion of possible quantum behaviours in biology more generally, the case of olfaction being just one example. This paper is presented in honour of Prof. Marshall Stoneham who passed away unexpectedly during its writing. PMID:23202229

  2. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    PubMed

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration. PMID:23355184

  3. Open access

    NASA Astrophysics Data System (ADS)

    2012-05-01

    Open-access journals are publishing at a pace that is not much faster than some recently launched subscription-based journals. The swiftest and surest route to full open-access publishing is then for funders, institutions and publishers to agree on the conditions for self-archiving in publicly accessible repositories.

  4. George Mason University Graduate Admission Application Fee Credit Card Authorization Form

    E-print Network

    George Mason University Graduate Admission Application Fee Credit Card Authorization Form Applicant application fee online, may pay the graduate application fee using this credit card authorization form. We accept MasterCard or Visa only; we do NOT accept Discover or American Express. Credit Card Authorization

  5. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  6. PCA: Jini-based Personal Card Assistant Roger Kehr, Joachim Posegga, Harald Vogt

    E-print Network

    Abstract We describe the Personal Card Assistant, a scenario that brings together PDAs and smart cards. The underlying idea is that a PDA acts as a personal device for controlling a smart card attached to it using for integrating the PDA and smart cards into unknown service networks a mobile user is confronted with. 1

  7. Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

    E-print Network

    Mostowski, Wojciech

    - erties that are of importance to the smart card industry. We discuss the properties one by one JAVA CARD [8] is a technology designed to incorporate JAVA in smart card pro- gramming. The main subset of properties that are of interest to the smart card industry [18]. We demonstrate the formalisa

  8. Smart Playing Cards: A Ubiquitous Computing Game Kay Romer, Svetlana Domnitcheva

    E-print Network

    Smart Playing Cards: A Ubiquitous Computing Game Kay R¨omer, Svetlana Domnitcheva Department the "Smart Playing Cards" application, a ubiquitous com- puting game that augments a classical card game of ubiquitous computing, design and im- plementation of the Smart Playing Cards application gave us some insight

  9. Jeu de cartes or Jeu Descartes: Business Cards in a French Course for the Professions.

    ERIC Educational Resources Information Center

    Gegerias, Mary

    This paper discusses the use of French business cards in a college-level French language and culture course for professionals. Among other assignments, students were each given a different card and asked to speak about the design of their card, the business represented, idiomatic expressions and historical allusions on the card, and the use of…

  10. Measuring Up 2004: The State Report Card on Higher Education. Montana

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  11. Measuring Up 2004: The State Report Card on Higher Education. North Dakota

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  12. Measuring Up 2004: The State Report Card on Higher Education. Pennsylvania

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  13. Measuring Up 2004: The State Report Card on Higher Education. Virginia

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  14. Measuring Up 2004: The State Report Card on Higher Education. North Carolina

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  15. Measuring Up 2004: The State Report Card on Higher Education. Nebraska

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  16. Measuring Up 2004: The State Report Card on Higher Education. Wyoming

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  17. Measuring Up 2004: The State Report Card on Higher Education. New Hampshire

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  18. Biometrics and Smart Cards in Identity Management Bart Jacobs and Erik Poll

    E-print Network

    Jacobs, Bart

    of smartcards are bank or credit cards, and SIM cards in mobile phones. Digital pay TV sys- tems also useBiometrics and Smart Cards in Identity Management Bart Jacobs and Erik Poll Radboud University widely used for public transport systems, for instance as the Oyster card in London or the ov

  19. Measuring Up 2004: The State Report Card on Higher Education. Nevada

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

  20. By April 15 Submit Abstract (electronically) Abstract Payment Form (with $35 check or credit card)

    E-print Network

    Gadsby, David

    or credit card) Poster Competition Application Form Symposium Award Application (if applicable) By August 15 Submit Advance Meeting Registration/Accommodations Form (with check or credit card) Submit Equipment Rental Form (with check or credit card) Submit Late Abstract and Form (with $35 check or credit card