Note: This page contains sample records for the topic access card cac from Science.gov.
While these samples are representative of the content of Science.gov,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of Science.gov
to obtain the most current and comprehensive results.
Last update: August 15, 2014.
1

What's Hot--and Not--in Card Access Systems.  

ERIC Educational Resources Information Center

Describes four uses of newer card access systems on college campuses: stored value, entitlement, access control, and vending. Discusses the continued reluctance of schools to move to cards containing computer chips rather than simply magnetic stripes. (EV)

Sturgeon, Julie

2002-01-01

2

EduCard. Adult Education Access Card. Policy Option Paper on Strategic Recommendation 4. First Edition.  

ERIC Educational Resources Information Center

One recommendation of the 1989 California Strategic Plan for Adult Education is the use of EduCard. EduCard, the Adult Education Access Card, is a means of giving learners access to information about educational opportunities and providing administrators with machine-readable information on learners' prior education and traiing. Three models are:…

Porter, Dennis

3

JCCap: Capability-based Access Control for Java Card  

Microsoft Academic Search

This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious applications, either between one terminal application and one Java Card applet or between two applets hosted inside the same Java Card. Using JCCap, access to objects is controlled by means of softw are capabilities

Daniel Hagimont; Jean-jacques Vandewalle

2000-01-01

4

CARDS (COMPUTER ACCESS TO RESEARCH ON DIETARY SUPPLEMENTS)  

EPA Science Inventory

CARDS stands for Computer Access to Research on Dietary Supplements. It is a database of federally funded research projects pertaining to dietary supplements. Currently, CARDS contains projects funded by the Institutes and Centers (ICs) of the National Institutes of Health (NIH) ...

5

Implementation conditional access system for pay TV based on Java card  

Microsoft Academic Search

This paper presents the implementation of the conditional access system for pay TV based on the Java card. The conditional access system (CA) is widely used to control user access to the system and protect the pay TV programs. This Java smart card is implemented for conditional access to the system and triple DES cryptography techniques. It provides functionality for

N. Prasertsatid

2004-01-01

6

Smart Card Technology: New Methods for Computer Access Control.  

National Technical Information Service (NTIS)

A smart card is a credit-card-sized device containing one or more integrated circuit chips, which perform the functions of a microprocessor, memory, and an input/output interface. Smart cards, and other related devices, may be used to provide an increased...

M. E. Haykin R. B. J. Warnar

1988-01-01

7

An end-to-end secure patient information access card system.  

PubMed

The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer. PMID:10786073

Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

2000-03-01

8

Age verification cards fail to fully prevent minors from accessing tobacco products  

Microsoft Academic Search

BackgroundProper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors.ObjectiveWe aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards

Hideyuki Kanda; Yoneatsu Osaki; Takashi Ohida; Yoshitaka Kaneita; Takeshi Munezawa

2010-01-01

9

Credit-Card Bill Seeks to Protect Students but Could Limit Their Access to Credit  

ERIC Educational Resources Information Center

Congress passed legislation last week that would shield students and other consumers from sudden spikes in interest rates and fees, but that could make it harder for young people to access credit to pay for college. The legislation would extend broad new consumer protections to all credit-card holders, offering special protections to college…

Field, Kelly

2009-01-01

10

A Universal Access, Smart-Card-Based, Secure File System  

Microsoft Academic Search

The SFS provides transparent, end-to-end encryption (1) support to users accessing files across the Internet on HTTP or FTP servers. In this paper we describe a SFS architecture, the current implementation, and the future directions for our work.

James Hughes; Chris Feist; Steve Hawkinson; Jeff Perrault; Matthew O'Keefe; David Corcoran

1999-01-01

11

Understanding Credit Card Liquidity  

Microsoft Academic Search

This paper considers the growth of credit card liquidity in explaining household credit card use. With data from the 2004 Survey of Consumer Finances we identify key predictors of new credit card charges for households. The data suggest credit card spending appears motivated by low-cost access to credit card liquidity. This is consistent with previous research arguing credit card use

Ryan R. Brady

2008-01-01

12

Challenges of CAC in Heterogeneous Wireless Cognitive Networks  

NASA Astrophysics Data System (ADS)

Call admission control (CAC) is known as an effective functionality in ensuring the QoS of wireless networks. The vision of next generation wireless networks has led to the development of new call admission control (CAC) algorithms specifically designed for heterogeneous wireless Cognitive networks. However, there will be a number of challenges created by dynamic spectrum access and scheduling techniques associated with the cognitive systems. In this paper for the first time, we recommend that the CAC policies should be distinguished between primary users and secondary users. The classification of different methods of cac policies in cognitive networks contexts is proposed. Although there have been some researches within the umbrella of Joint CAC and cross-layer optimization for wireless networks, the advent of the cognitive networks adds some additional problems. We present the conceptual models for joint CAC and cross-layer optimization respectively. Also, the benefit of Cognition can only be realized fully if application requirements and traffic flow contexts are determined or inferred in order to know what modes of operation and spectrum bands to use at each point in time. The process model of Cognition involved per-flow-based CAC is presented. Because there may be a number of parameters on different levels affecting a CAC decision and the conditions for accepting or rejecting a call must be computed quickly and frequently, simplicity and practicability are particularly important for designing a feasible CAC algorithm. In a word, a more thorough understanding of CAC in heterogeneous wireless cognitive networks may help one to design better CAC algorithms.

Wang, Jiazheng; Fu, Xiuhua

13

College Debit Cards: Actions Needed to Address ATM Access, Student Choice, and Transparency.  

National Technical Information Service (NTIS)

A growing number of colleges and universities have entered into agreements with financial firms to provide debit and prepaid card services for students. As the number of agreements has grown, questions have arisen over fees and issues such as student choi...

2014-01-01

14

CAC-RD: A Call Admission Control for UMTS Networks  

Microsoft Academic Search

This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access\\/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving

Carlos R. Storck; Anna Izabel T. Ribeiro; Fatima De L. P. Duarte-figueiredo

2008-01-01

15

Inequality of Access to Educational Resources: A National Report Card for Eighth-Grade Math.  

ERIC Educational Resources Information Center

Considers social and ethnic inequity in access to resources for mathematics learning in eighth grade using data from 41 states and territories participating in the 1992 Trial State Assessment of the National Assessment of Educational Progress. Findings indicate that state differences in access to key educational resources are important. (SLD)

Raudenbush, Stephen W.; Fotiu, Randall P.; Cheong, Yuk Fai

1998-01-01

16

77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...  

Federal Register 2010, 2011, 2012, 2013

...number 8520.2, April 1, 2004, 4.4 Joint Task Force-Global Network Operations (JTF-GNO) Communication Tasking Order (CTO) 07-015 Task 10. Miscellaneous: DOD Instruction 8520.2 can be accessed at the following Web site: DoD Instruction...

2012-12-10

17

Architecture and implementation for a system enabling smartphones to access smart card based healthcare records.  

PubMed

The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has been the healthcare professional need of quality information, in every healthcare provision incident, whenever and wherever this incident may take place. In order to address this need a truly mobile health care system is required, one that will be able to provide a healthcare provider with accurate patient-related information regardless of the time and place that healthcare is provided. In order to fulfill this role the present study proposes the architecture for a Healthcare Smartcard system, which provides authenticated healthcare professionals with remote mobile access to a Patient's Healthcare Record, through their Smartphone. Furthermore the research proceeds to develop a working prototype system. PMID:23823404

Karampelas, Vasilios; Pallikarakis, Nicholas; Mantas, John

2013-01-01

18

A House of Cards.  

ERIC Educational Resources Information Center

Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

Kennedy, Mike

2000-01-01

19

Follow Up: Credit Card Caution  

ERIC Educational Resources Information Center

In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students a lesson they will…

Cahill, Timothy P.

2007-01-01

20

Developing Smart Card-Based Applications Using Java Card  

Microsoft Academic Search

\\u000a In this paper we describe a methodology for developing smart card-based applications which accounts for both internal and\\u000a external software production: on-card and client programs. This development methodology is based on the application of distributed\\u000a object-oriented principles to Java Card. We design a model in which a card application is viewed as a remote object accessed\\u000a through method invocations handled

Jean-jacques Vandewalle; Eric Vétillard

1998-01-01

21

Countermeasures to secure smart cards  

US Patent & Trademark Office Database

The present disclosure introduces a new technique for hiding sensitive information in smart cards. A smartcard system relying on stegnography rather than cryptography may act as a countermeasure to prevent extraction of cryptographic information such as passwords. In one embodiment, the smart card system of the present disclosure may be used to authenticate a smart card user. A password may be stored within a hidden memory location of a smart card. A smart card may interface with an external device. Data representing the hidden memory location of the stored password may be transmitted to an external device. Access to the hidden memory location of the smart card by the external device may be allowed. The password stored within the smart card memory is compared to input data entered into the external device. If the input data matches the password stored within the smart card, a user may be authenticated.

2013-04-09

22

Secure Object Flow Analysis for Java Card  

Microsoft Academic Search

The access control exercised by the Java Card firewall can be bypassed by the use of shareable objects. To help detecting unwanted access to objects, we propose a static analysis that calcu- lates a safe approximation of the possible flow of objects between Java Card applets. The anal- ysis deals with a subset of the Java Card byte- code focusing

Marc Éluard; Thomas P. Jensen

2002-01-01

23

CAC - NUCLEAR THERMAL ROCKET CORE ANALYSIS CODE  

NASA Technical Reports Server (NTRS)

One of the most important factors in the development of nuclear rocket engine designs is to be able to accurately predict temperatures and pressures throughout a fission nuclear reactor core with axial hydrogen flow through circular coolant passages. CAC is an analytical prediction program to study the heat transfer and fluid flow characteristics of a circular coolant passage. CAC predicts as a function of time axial and radial fluid conditions, passage wall temperatures, flow rates in each coolant passage, and approximate maximum material temperatures. CAC incorporates the hydrogen properties model STATE to provide fluid-state relations, thermodynamic properties, and transport properties of molecular hydrogen in any fixed ortho-para combination. The program requires the general core geometry, the core material properties as a function of temperature, the core power profile, and the core inlet conditions as function of time. Although CAC was originally developed in FORTRAN IV for use on an IBM 7094, this version is written in ANSI standard FORTRAN 77 and is designed to be machine independent. It has been successfully compiled on IBM PC series and compatible computers running MS-DOS with Lahey F77L, a Sun4 series computer running SunOS 4.1.1, and a VAX series computer running VMS 5.4-3. CAC requires 300K of RAM under MS-DOS, 422K of RAM under SunOS, and 220K of RAM under VMS. No sample executable is provided on the distribution medium. Sample input and output data are included. The standard distribution medium for this program is a 5.25 inch 360K MS-DOS format diskette. CAC was developed in 1966, and this machine independent version was released in 1992. IBM-PC and IBM are registered trademarks of International Business Machines. Lahey F77L is a registered trademark of Lahey Computer Systems, Inc. SunOS is a trademark of Sun Microsystems, Inc. VMS is a trademark of Digital Equipment Corporation. MS-DOS is a registered trademark of Microsoft Corporation.

Clark, J. S.

1994-01-01

24

A low-cost secure schemes for authentications and access control with the use of multiple public IC cards  

Microsoft Academic Search

In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id\\/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used

Kuo-Yi Chen; Chin-Yang Lin; Ting-Wei Hou

2010-01-01

25

Card Colm  

NSDL National Science Digital Library

The Card Colm bimonthly column is sponsored by the Mathematical Association of America (MAA) and it explores mathematical card principles and effects for fun. It's an inspired idea ignited by the musings and mediations of Martin Gardner, a man who loved such things. The column is penned by Colm Mulcahy who, when not enjoying card tricks, can be found teaching at Spelman College. The posts have titles like "Never Forget a Face (Double-Dealing with a Difference)" and "Predictability Outranks Luck." Each post contains fun diagrams, witty asides, and links to other references. People with an interest in probability, card games and mathematics in general will find much to enjoy here.

2013-06-27

26

Coding the Eggen Cards (Poster abstract)  

NASA Astrophysics Data System (ADS)

(Abstract only) A look at the Eggen Portal for accessing the Eggen cards. And a call for volunteers to help code the cards: 100,000 cards must be looked at and their star references identified and coded into the database for this to be a valuable resource.

Silvis, G.

2014-06-01

27

An Intelligent Memory Card For LBS  

Microsoft Academic Search

This paper introduces a new conceptual design of Intelligent Memory Card (IMC), which can access wireless network and acquire related location information, so as to enjoy LBS (Local Based Service) conveniently. In addition, IMC is platform-independent and can be used in any mobile device with memory card slot. Then we implement that IMC design on an SD card and use

Xin Ma; Xin Zhang; Chunxiao Jiang; Nengqiang He; Yong Ren; Canfeng Chen; Zhicheng Deng; Jian Ma

2009-01-01

28

Anonymous credit cards  

Microsoft Academic Search

This paper describes a communications networking technique for funds transfer which combines the privacy of cash transactions with the security, record-keeping and charging mechanisms of credit cards. The scheme uses a communications network and cryptographic protocols to separate information. The company that extends credit to the individual and collects the bill does not have access to the specific purchases, and

Steven H. Low; Sanjoy Paul; Nicholas F. Maxemchuk

1994-01-01

29

It's in the Cards.  

ERIC Educational Resources Information Center

Examines how the use of electronic access-control system enables college and universities to provide a safer environment for students and staff. The advantages of no-key doors, adapting entry card systems for multiple uses, and successfully retaining lock and key systems when facilities do not lend themselves to electronic security are discussed.…

Kennedy, Mike

2000-01-01

30

Access Denied  

ERIC Educational Resources Information Center

Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

Villano, Matt

2008-01-01

31

A Type System for Checking Applet Isolation in Java Card  

Microsoft Academic Search

Abstract. A Java Card applet is, in general, not allowed to access elds and methods of other applets on the same smart card. This applet iso- lation property is enforced by dynamic,checks in the Java Card Virtual Machine. This paper describes a rened,type system for Java Card that enables static checking of applet isolation. With this type system, rew all

Werner Dietl; Peter Müller; Arnd Poetzsch-heffter

2004-01-01

32

A Type System for Checking Applet Isolation in Java Card  

Microsoft Academic Search

A Java Card applet is, in general, not allowed to access elds and methods of other applets on the same smart card. This applet iso- lation property is enforced by dynamic checks in the Java Card Virtual Machine. This paper describes a rened type system for Java Card that enables static checking of applet isolation. With this type system, rew

Werner Dietl; Peter M; Arnd Poetzsch-Heter

33

Computationally Efficient Dynamic Code Assignment Schemes With Call Admission Control (DCA-CAC) for OVSF-CDMA Systems  

Microsoft Academic Search

This paper investigates computationally efficient suboptimal dynamic code assignment (DCA) schemes with call admission control (CAC) for orthogonal variable spreading factor code-division multiple-access systems. We examine two different approaches. The first approach reduces the complexity of the DCA scheme by partitioning the total resource (either capacity or service class) into several mutually exclusive subsets and assigns each subset of resource

Jun-Seong Park; Lei Huang; C.-C. Jay Kuo

2008-01-01

34

An Operational Semantics of the Java Card Firewall  

Microsoft Academic Search

This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card rew all, method invocation, eld access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card rew all using standard tools from operational semantics. Such a descrip- tion is necessary for formally

Marc Éluard; Thomas P. Jensen; Ewen Denney

2001-01-01

35

CardWeb  

NSDL National Science Digital Library

Ram Research Group's CardWeb Inc. strives to provide comparative information on a variety of US payment cards for consumers and competitive card industry information for executives. On-site tools for consumers include monthly surveys of credit card deals (CardTrak), a national database of bank credit card issuers (CardLocator), and a guide to payment card types and terms (CardLearn), among others. Executives in the payment industry may benefit from a daily news service of business payment card happenings (CardFlash), financial data on the card industry and its players (CardData), and links to current payment card-advertising campaigns (CardWatch) for comparison and analysis.

36

Developing JAVA Card Application with RMI API  

NASA Astrophysics Data System (ADS)

This paper describes research in the use of the RMI to develop Java Card applications. the Java Card RMI (JCRMI), which is based on the J2SE RMI distributed-object model. In the RMI model a server application creates and makes accessible remote objects, and a client application obtains remote references to the server's remote objects, and then invokes remote methods on them. In JCRMI, the Java Card applet is the server, and the host application is the client.

JunWu, Xu; JunLing, Liang

37

Memory Cards  

Microsoft Academic Search

Before we go into detail with the theme of this chapter it is appropriate to introduce some terms that will be used in the\\u000a rest of the chapter. For this purpose we will define the field of application and the environment of the Flash memory card,\\u000a and some useful notions to better understand its basic architecture and use.

M. Iaculo; M. Picca; F. Tiziani; S. Ghezzi; P. Baggi

38

Decentralized Authorization with ECDSA on a Java Smart Card  

Microsoft Academic Search

Traditionally, smart cards have been used as secure tokens in identitybased access control. That is, a smart card has been used as an intelligentstorage of protected cryptographic information, such as a sharedsecret or a private key in a public key system. The cryptographic informationis then used to prove the possession of the card in a secureway either locally or remotely

Tommi Elo; Pekka Nikander

2000-01-01

39

Cooperation Among Competitors: The Economics of Credit Card Associations  

Microsoft Academic Search

The paper analyzes two controversial features of the credit card industry. The first is the cooperative determination of the interchange fee by member banks in credit card associations (Visa and MasterCard). The interchange fee is the ``access charge'' paid by the merchants' banks, the acquirers, to cardholders' banks, the issuers. The second practice is the prohibition for merchants accepting a

Jean-Charles Rochet; Jean Tirole

1999-01-01

40

Accessibility  

Cancer.gov

The NCI Center for Cancer Research (CCR) wants the information on this Web site to be accessible to all. If you use special adaptive equipment to access the Web and encounter problems when using our site, please let us know.

41

Personal medical information system using laser card  

NASA Astrophysics Data System (ADS)

The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

Cho, Seong H.; Kim, Keun H.; Choi, Hyung-Sik; Park, Hyun W.

1996-04-01

42

Campus Card Tricks.  

ERIC Educational Resources Information Center

Examines the development of an innovative student identification card system that includes off-campus banking and credit card functions. Finding solutions to bank objections, credit card company rule problems, and software difficulties are discussed. (GR)

Fickes, Michael

1999-01-01

43

Systems and methods for using verified information cards in a communications network  

US Patent & Trademark Office Database

Digital information cards associated with verified information about users are described. The cards can be used to optimize a network communications experience or interaction for a user and a commercial entity, such as a website provider. The cards can be user-centric in that the user can control access to information associated with the card. A website can access the information claim using a link of the information card and can customize a user's website experience based on the verified information claim.

2013-05-14

44

American Health Information Management Association. Position statement. Issue: patient cards.  

PubMed

In its simplest form, a patient card is a credit card sized record made of paper or plastic that contains identification information. A card may contain additional information, such as insurance or limited health information. Of the many technologies available, chip cards and optical cards are best suited for use in healthcare. If their expense can be justified and nation-wide standards established, cards could help improve timely access to basic health information such as demographic, insurance, and basic medical information needed for emergency treatment. Technology may permit a patient's entire longitudinal (lifetime) health history to be maintained on a card, but this should not be the only source of the longitudinal record. To assure its accessibility to legitimate users throughout the healthcare system, the longitudinal health record must be a computer-based patient record maintained on a controlled access network. PMID:10130019

1993-11-01

45

[Application of patient card technology to health care].  

PubMed

The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel. PMID:7750811

Sayag, E; Danon, Y L

1995-03-15

46

Transactions in Java Card  

Microsoft Academic Search

A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transaction mechanism must meet the demands by the applications and the system itself within the minimal re- sources offered by current smart card hardware. This pa- per presents the current transaction model implied by

Marcus Oestreicher

1999-01-01

47

Galaxy Trading Cards  

NSDL National Science Digital Library

This collection of nine cards focuses on the three types of galaxies: spiral, elliptical, and irregular. Each card displays a color image of a galaxy on one side and describes the galaxy's type, its location within a constellation, and interesting facts on the other side. The Hubble Space Telescope card includes interesting facts, as well as suggestions for using the cards.

1999-01-01

48

Magnetic Field Viewing Cards  

NASA Astrophysics Data System (ADS)

For some years now laminated cards containing a green, magnetically sensitive film have been available from science education suppliers. When held near a magnet, these cards appear dark green in regions where the field is perpendicular to the card and light green where the field is parallel to the card. The cards can be used to explore the magnetic field near a variety of magnets as well as near wire loops. In this paper we describe how to make these cards and how we have used them in our physics classrooms and labs.

Kanim, Stephen; Thompson, John R.

2005-09-01

49

Object Lifetimes in Java Card  

Microsoft Academic Search

Java Card promises the ease of programming in Java to the world of smart cards. Java's memory model how- ever is resource intensive especially for smart card hardware. Hence, adapting Java's memory model to Java Card must retain the easy programming para- digm while enabling Java Card applications to maxi- mize the use of smart card memory. To this end,

Marcus Oestreicher; Ksheerabdhi Krishna

1999-01-01

50

Tearing Java Cards  

Microsoft Academic Search

This paper reports on investigations into the JAVA CARD transaction mechanism, especially on the interaction with so-called non- atomic methods in the JAVA CARD API. This work started with eorts to develop a formalisation of the transaction mechanism that could be used to formally verify the correctness of applications that use these mechanisms to protect themselves from card tears—the sudden

Engelbert Hubbers; Wojciech Mostowski; Erik Poll

2006-01-01

51

Reading the Cards.  

ERIC Educational Resources Information Center

Describes trends in the technology and use of "smart cards," cards embedded with computer chips to store information and thereby speed and simplify various business and administrative transactions. Addresses future applications for colleges and universities, American Express'"Blue" card, military and medical applications, the role of bandwidth,…

Grills, Caroline M.

2001-01-01

52

Unraveling a Card Trick  

NASA Astrophysics Data System (ADS)

In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

Hoare, Tony; Shankar, Natarajan

53

Raman scattering from the CaC6 superconductor  

NASA Astrophysics Data System (ADS)

Phys. Rev. B Phys. Rev. Lett. Phys. Lett. A Phys. Rev. 2MgB2 -1cm-1,-1cm-1/T,2gE2g 1gA1g 2DS2?S^E 2?L^E 2DA2Â 02?0 6CaC6 A polarized Raman scattering study has been performed on bulk 1st stage intercalated graphite CaC6 crystals at sub-Tc temperatures. We identify all three Raman active Eg bands expected for the Rm6 space group of CaC6 at 440, 1120 and 1508,-1 and find them to be in agreement with zone center modes predicted by first principles calculations of phonon dispersion.^1 In addition the equivalents of the graphite D and G bands are observed at respective frequencies. Inherent to the disorder induced double resonant scattering process^2 the D band shifts from 1308,-1 to 1332,-1 upon the change of the excitation laser wavelength from 647,m to 476 ,m. Assuming linear dependence of the D band peak position as a function of excitation energy this translates to the frequency shift of 35,-1/,V. By comparing the integrated intensity of the G band at 1582,-1 in 6 to the one in kish graphite the relative fraction of higher stage domains to the 1st stage intercalation is estimated to be less then 0.2%. Finally upon the superconducting phase transition we observe a 2? peak with the frequency of 24,-1 at 5,K. With temperature increase this peak persists shortly up to the SC phase transition at 11.6,and shows temperature dependence consistent with the strong coupling regime. ^1M. Calandra and F. Mauri, PRL 95, 237002 (2005). ^2C. Thomson and S. Reich, PRL 85, 5214 (2000).

Mialitsin, A.; Kim, J.; Kremer, R.; Blumberg, G.

2008-03-01

54

Pressure-induced superconductivity in CaC2.  

PubMed

Carbon can exist as isolated dumbbell, 1D chain, 2D plane, and 3D network in carbon solids or carbon-based compounds, which attributes to its rich chemical binding way, including sp-, sp(2)-, and sp(3)-hybridized bonds. sp(2)-hybridizing carbon always captures special attention due to its unique physical and chemical property. Here, using an evolutionary algorithm in conjunction with ab initio method, we found that, under compression, dumbbell carbon in CaC2 can be polymerized first into 1D chain and then into ribbon and further into 2D graphite sheet at higher pressure. The C2/m structure transforms into an orthorhombic Cmcm phase at 0.5 GPa, followed by another orthorhombic Immm phase, which is stabilized in a wide pressure range of 15.2-105.8 GPa and then forced into MgB2-type phase with wide range stability up to at least 1 TPa. Strong electron-phonon coupling ? in compressed CaC2 is found, in particular for Immm phase, which has the highest ? value (0.562-0.564) among them, leading to its high superconducting critical temperature Tc (7.9?9.8 K), which is comparable with the 11.5 K value of CaC6. Our results show that calcium not only can stabilize carbon sp(2) hybridization at a larger range of pressure but also can contribute in superconducting behavior, which would further ignite experimental and theoretical interest in alkaline-earth metal carbides to uncover their peculiar physical properties under extreme conditions. PMID:23690580

Li, Yan-Ling; Luo, Wei; Zeng, Zhi; Lin, Hai-Qing; Mao, Ho-kwang; Ahuja, Rajeev

2013-06-01

55

Pressure-induced superconductivity in CaC2  

PubMed Central

Carbon can exist as isolated dumbbell, 1D chain, 2D plane, and 3D network in carbon solids or carbon-based compounds, which attributes to its rich chemical binding way, including sp-, sp2-, and sp3-hybridized bonds. sp2-hybridizing carbon always captures special attention due to its unique physical and chemical property. Here, using an evolutionary algorithm in conjunction with ab initio method, we found that, under compression, dumbbell carbon in CaC2 can be polymerized first into 1D chain and then into ribbon and further into 2D graphite sheet at higher pressure. The C2/m structure transforms into an orthorhombic Cmcm phase at 0.5 GPa, followed by another orthorhombic Immm phase, which is stabilized in a wide pressure range of 15.2–105.8 GPa and then forced into MgB2-type phase with wide range stability up to at least 1 TPa. Strong electron–phonon coupling ? in compressed CaC2 is found, in particular for Immm phase, which has the highest ? value (0.562–0.564) among them, leading to its high superconducting critical temperature Tc (7.9?9.8 K), which is comparable with the 11.5 K value of CaC6. Our results show that calcium not only can stabilize carbon sp2 hybridization at a larger range of pressure but also can contribute in superconducting behavior, which would further ignite experimental and theoretical interest in alkaline–earth metal carbides to uncover their peculiar physical properties under extreme conditions.

Li, Yan-Ling; Luo, Wei; Zeng, Zhi; Lin, Hai-Qing; Mao, Ho-kwang; Ahuja, Rajeev

2013-01-01

56

FERMI Race Card Game  

NSDL National Science Digital Library

In this card game, players compete to be the first to build the Fermi satellite and use it to observe five astronomical targets. Eighty-six custom-designed cards contain information on the various Fermi components, science and education teams, and astronomical objects. In Stage I, the players build their satellite by collecting component and experience points cards, and in Stage II they collect astronomical target cards. There are also offensive cards used to slow an opponent's progress and defensive cards to counter the "attacks." The game teaches players about the components of a satellite, the roles of individuals working on a satellite mission (including educators), and the obstacles that can occur in their construction.

57

Holo-Chidi video concentrator card  

NASA Astrophysics Data System (ADS)

The Holo-Chidi Video Concentrator Card is a frame buffer for the Holo-Chidi holographic video processing system. Holo- Chidi is designed at the MIT Media Laboratory for real-time computation of computer generated holograms and the subsequent display of the holograms at video frame rates. The Holo-Chidi system is made of two sets of cards - the set of Processor cards and the set of Video Concentrator Cards (VCCs). The Processor cards are used for hologram computation, data archival/retrieval from a host system, and for higher-level control of the VCCs. The VCC formats computed holographic data from multiple hologram computing Processor cards, converting the digital data to analog form to feed the acousto-optic-modulators of the Media lab's Mark-II holographic display system. The Video Concentrator card is made of: a High-Speed I/O (HSIO) interface whence data is transferred from the hologram computing Processor cards, a set of FIFOs and video RAM used as buffer for data for the hololines being displayed, a one-chip integrated microprocessor and peripheral combination that handles communication with other VCCs and furnishes the card with a USB port, a co-processor which controls display data formatting, and D-to-A converters that convert digital fringes to analog form. The co-processor is implemented with an SRAM-based FPGA with over 500,000 gates and controls all the signals needed to format the data from the multiple Processor cards into the format required by Mark-II. A VCC has three HSIO ports through which up to 500 Megabytes of computed holographic data can flow from the Processor Cards to the VCC per second. A Holo-Chidi system with three VCCs has enough frame buffering capacity to hold up to thirty two 36Megabyte hologram frames at a time. Pre-computed holograms may also be loaded into the VCC from a host computer through the low- speed USB port. Both the microprocessor and the co- processor in the VCC can access the main system memory used to store control programs and data for the VCC. The Card also generates the control signals used by the scanning mirrors of Mark-II. In this paper we discuss the design of the VCC and its implementation in the Holo-Chidi system.

Nwodoh, Thomas A.; Benton, Stephen A.; Prabhakar, Aditya

2001-12-01

58

WWW+smart card: towards a mobile health care management system  

Microsoft Academic Search

This paper highlights the benefits of combining the World Wide Web and smart card technologies to support a highly mobile health management framework. In particular, we describe an approach using the SmartCard–Web Gateway Interface (SGI) as a common interface to communicate and access the medical records residing in a smart card. Importantly, by employing HTTP as the baseline protocol to

Alvin T. S Chan

2000-01-01

59

2010 Resource Cards on California Schools  

ERIC Educational Resources Information Center

With an index, and separate sections that cover related topics, this booklet provides fingertip access to the latest information about California's public education system. The 2010 Resource Cards also include a robust section on community colleges. This booklet contains the following sections: (1) School Finance/Related Laws, which includes…

EdSource, 2010

2010-01-01

60

JavaCard API  

Microsoft Academic Search

This paper reports on ongoing work to develop a formal spec- ication of the JavaCard API using the specication language JML. It discusses the specication of the JCSystem class, which deals with the JavaCard rewall, (atomic) transactions and transient objects. The JCSystem class seems to be the hardest class in the API to specify, and it is closely connected with

Hans Meijer; Erik Poll

61

Monumental Court Cards  

ERIC Educational Resources Information Center

Card playing is a popular pastime in many cultures, including games like bridge, gin rummy, and 52-pickup. In this article, the author describes an art project inspired by the unique designs on the face cards and the intricate art of the overall design. (Contains 1 online resource.)

Long, Caroline

2010-01-01

62

Planet Quest Observing Cards  

NSDL National Science Digital Library

The PlanetQuest Observing Cards are designed to give telescope operators and other interpreters a new way of explaining the night sky. Relating common observing objects to our search for exoplanets makes these spectacular sights more understandable. These cards are a great resource for use at observing night events, providing new stories to tell about commonly viewed celestial objects.

63

Printed circuit card hybrid  

Microsoft Academic Search

A hybrid connector is presented whereby both electrical and fiber optic cables are connected to a printed circuit card. The connector consists of a female half which contains a plurality of fiber optic contact inserts molded into the connector, and also female electrical connections. The male half of the connector is an integral part of a printed circuit card constructed

Arnold Flores

1986-01-01

64

MCNP6 Fission Multiplicity with FMULT Card  

SciTech Connect

With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

Wilcox, Trevor [Los Alamos National Laboratory; Fensin, Michael Lorne [Los Alamos National Laboratory; Hendricks, John S. [Los Alamos National Laboratory; James, Michael R. [Los Alamos National Laboratory; McKinney, Gregg W. [Los Alamos National Laboratory

2012-06-18

65

Reasoning about Card Tears and Transactions in Java Card  

Microsoft Academic Search

The Java dialect Java Card for programming smartcards contains some features which do not exist in Java. Java Card distin- guishes persistent and transient data (data stored in EEPROM and RAM, respectively). Because power to a smartcard can suddenly be in- terrupted by a so-called card tear, by someone removing the smartcard from the reader, Java Card provides a notion

Engelbert Hubbers; Erik Poll

2004-01-01

66

Multiplication Tables - Matching Cards  

NSDL National Science Digital Library

This interactive Flash version of the familiar Concentration game ("pelmanism" in the UK) helps a single user practice multiplication facts while developing memory and concentration skills. The player can choose an array of 16, 20, or 24 cards, which appear face down. The goal is to flip two cards at a time to match all the pairs of factors with their products as efficiently as possible. A scoring feature discourages random guessing. Users can choose to work with factors in three ranges: 2x-10x, 2x-21x, or 11x-21x. Printable versions of the game cards are available to download.

2001-03-01

67

Flip Flop - Matching Cards  

NSDL National Science Digital Library

This interactive Flash version of the familiar game Concentration ("pelmanism" in the UK) helps a single user practice addition facts while developing memory and concentration skills. The player can choose an array of 16, 20, or 24 cards, which appear face down. The goal is to flip two cards at a time to match all the 2- or 3-addend expressions with their sums as efficiently as possible. A scoring feature discourages random guessing. Printable versions of the game cards are available to download.

2001-06-01

68

Report Cards and Nursing Homes  

ERIC Educational Resources Information Center

Purpose: We first describe which states have produced nursing home report cards; second, we compare what information is provided in these report cards; third, we identify data sources used to produce the report cards; and, finally, we examine seven factors previously shown to be associated with the usefulness of report-card information and provide…

Castle, Nicholas G.; Lowe, Timothy J.

2005-01-01

69

Report Cards and Nursing Homes  

Microsoft Academic Search

Purpose: We first describe which states have pro- duced nursing home report cards; second, we compare what information is provided in these report cards; third, we identify data sources used to produce the report cards; and, finally, we examine seven factors previously shown to be associated with the usefulness of report-card information and provide several examples from current reporting efforts

Nicholas G. Castle; Timothy J. Lowe

2005-01-01

70

Paperless coupon card  

US Patent & Trademark Office Database

A paperless coupon system and method are provided that facilitate encouraging and rewarding consumer use of coupons, and decreasing the costs associated with coupon distribution and redemption for commercial entities. The system and method involve issuing a machine readable article such as a card, for example, to a user or offeree and registering the card on a website or other communication network to associate the card with an offeree user account, generating and displaying paperless coupons from which the user or offeree can select, and allowing the user to link their selected coupons to their machine readable article and redeem them in an electronic and automatic manner at, and/or after purchase of the related item(s) through their use of the card during the purchase transaction.

2013-10-08

71

Pentagon Credit Card Audit  

NSDL National Science Digital Library

The Code Red worm and base closings are not the only things the Pentagon has to worry about lately. The General Accounting Office (GAO) has agreed to perform a department-wide audit, including an investigation of abuse of the Pentagon's 1.8 million credit cards. At the request of Senator Charles Grassley (R-Iowa), the GAO began its investigation by looking into potential purchase card abuse on two San Diego Naval bases. They found "a weak overall internal control environment, flawed or nonexistent policies and procedures, and a lack of adherence to valid policies and procedures." The Pentagon has defended its purchase card program, claiming misuse of the cards is significantly below the commercial benchmark and that the savings on paperwork cover the cost of any fraud. Nonetheless, in its initial investigations, the GAO found little control over the $68 million dollars of purchases made last year at the two San Diego bases.

Koplow, Travis.

2001-01-01

72

Credit Card Quiz.  

ERIC Educational Resources Information Center

Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

Marks, Jeff

2000-01-01

73

Mixing In Math Card Games  

NSDL National Science Digital Library

This site features nine Mixing-in-Math fast-paced card games that bring together arithmetic, probability, strategic thinking and logical reasoning. "Capture Cards" and "Ask Me" were designed especially for children just learning to count, compare, and add numbers. Each card game lists the goal, appropriate grade level, number of players and instructions. Players can use regular playing cards or Mixing in Math card decks can be purchased.

2012-01-01

74

Credit Card Analysis  

NSDL National Science Digital Library

In this example, students are asked to obtain a credit card disclosure statement, identify the various interest rates and payment rules, and keep track of a revolving monthly balance under several payment scenarios. While modeling several months to a year of credit card statements is easily accomplished with pencil, paper, and a basic calculator, this example is also well-suited for analysis with a spreadsheet.

Boersma, Stuart

75

Biometrics and smart cards combine to offer high security  

SciTech Connect

This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued.

Seidman, S.

1986-01-01

76

Ab initio study of d^ magnetism in CaC  

NASA Astrophysics Data System (ADS)

The half-metallic ferromagnetism in d^0 ionic compounds has attracted considerable attention in the spintronics community [Phys. Rev. B 73 024404, 2006]. In this work we employ density functional theory to study electronic, magnetic, and mechanical properties of the high ionic CaC compound in the Zinc Blend (ZB), Rock Salt (RS), B2, Wurtzite (WZ), NiAs, and tetragonal structures.The observed ferromagnetic equilibrium state in the RS, NiAs, WZ, tetragonal and ZB structures is attributed to the partially filled sharp p band of carbon around the Fermi level. Half-metallicity has been found in the equilibrium ZB and expanded WZ structures with a magnetic moment of 2 ?B/formula units. Comparing the Gibbs free energy of various structures indicates favorability of the half metallic phases in negative pressures. Topological analysis of the electronic charge density reveals topological character of the paramagnetic-ferromagnetic phase transition of the revised NiAs and B2 structures as well as the geometrical character of the magnetic phase transitions of the RS and ZB structures.

Akbarzadeh, Hadi; Nourbakhsh, Zahra; Javad Hashemifar, S.

2011-03-01

77

Breastfeeding Report Card - United States, 2013  

MedlinePLUS

... to... Añadir en... Favorites Delicious Digg Google Bookmarks Breastfeeding Report Card 2013 Background There are many ways ... Breastfeeding Report Card, 2013 - [PDF - 1.4MB] Previous Breastfeeding Report Cards Breastfeeding Report Card 2012 Breastfeeding Report ...

78

On-Card Bytecode Verification for Java Card  

Microsoft Academic Search

This paper presents a novel approach to the problem of bytecode verification for Java Card applets. Owing to its low memory requirements, our verification algorithm is the first that can be embedded on a smart card, thus increasing tremendously the security of post-issuance downloading of applets on Java Cards.

Xavier Leroy

2001-01-01

79

War of the Credit Cards.  

ERIC Educational Resources Information Center

Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

Nicklin, Julie L.

1993-01-01

80

A Mechanism for Anonymous Credit Card Systems  

Microsoft Academic Search

This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e.

Shinsuke Tamura; Tatsuro Yanase

2007-01-01

81

Credit Cards: Facts and Theories  

Microsoft Academic Search

We use data from several waves of the Survey of Consumer Finances to document credit and debit card ownership and use across US demographic groups. We then present recent theoretical and empirical contributions to the study of credit and debit card behavior. Utilization rates of credit lines and portfolios of card holders present several puzzles. Credit line increases initiated by

Carol C. Bertaut; Michael Haliassos

2006-01-01

82

Memory Card Camera and Player.  

National Technical Information Service (NTIS)

A memory card camera which records digital still images on a semiconductor memory card has been developed. The camera contains image data compression LSIs and is capable of recording 12 high-quality frame images on an 18-Mbit SRAM card. In addition, it is...

F. Izawa T. Saga T. Suyama

1991-01-01

83

Greeting Card Boxes  

NSDL National Science Digital Library

In this activity, learners make cool boxes out of old (or new) greeting cards or postcards. Before making the recycled boxes, learners can practice making boxes from grid paper while learning about area and volume. The lesson guide contains detailed tips for leaders including background information about the math concepts related to this activity.

Murphy, Pat; Lambertson, Lori; Tesler, Pearl; Exploratorium

2001-01-01

84

Credit Card Debt Puzzles  

Microsoft Academic Search

Most US credit card holders revolve high-interest debt, often combined with substantial (i) asset accumulation by retirement, and (ii) low-rate liquid assets. Hyperbolic discounting can resolve only the former puzzle (Laibson et al., 2003). Bertaut and Haliassos (2002) proposed an \\

Michael Halisassos; Michael Reiter

2005-01-01

85

THE CONCEPTUAL CARD DECK  

Microsoft Academic Search

The conceptual card deck is a game for the collaborative construction of concept maps. It was developed at the Conéctate al Conocimiento Project of Panama as an easy way to introduce novice mappers to concept maps and propositional structure, with very little prior explanation of these notions. Though it has been used by some of the Project's facilitators in teacher

Rita Marissa Giovani; María Carballeda; Norma Miller; Gerardo Lezcano; Carmen Ramos; Adrián Chang

2008-01-01

86

The Eggen Card Project  

NASA Astrophysics Data System (ADS)

(Abstract only) Olin Eggen, noted astronomer (1919-1998), left to us all his raw observation records recorded on 3x5 cards. This project is to make all this data available as an online resource. History and progress of the project will be presented. Project details available at: https://sites.google.com/site/eggencards/home.

Silvis, G.

2014-06-01

87

Smart card multiple function badge  

SciTech Connect

Smart cards are credit card-sized computers with integrated data storage, an operating system to manage the data, and built-in security features that protect the data. They are used to distribute information to remote sites, providing the same or greater reliability, data integrity, and information security than a network system. However, smart cards may provide greater functionality at a lower cost than network systems. The US Department of Energy Hanford Site is developing the smart card to be used as a multiple function identification badge that will service various data management requirements on the Site. This paper discusses smart card technology and the proposed Hanford Site applications.

Nelson, R.A.

1993-06-01

88

Design and implementation of a smart card based healthcare information system.  

PubMed

Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns. PMID:16356586

Kardas, Geylani; Tunali, E Turhan

2006-01-01

89

Access Nets: Modeling Access to Physical Spaces  

Microsoft Academic Search

\\u000a Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility\\u000a in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could\\u000a differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy\\u000a permits becomes surprisingly difficult requiring knowledge of permission levels,

Robert Frohardt; Bor-Yuh Evan Chang; Sriram Sankaranarayanan

2011-01-01

90

Global Warming Wheel Card  

NSDL National Science Digital Library

In this activity, students construct a Global Warming Wheel Card, a hand-held tool that they can use to estimate their household's emissions of carbon dioxide and learn how they can reduce them. One side of the wheel illustrates how much carbon dioxide a household contributes to the atmosphere per year through activities such as driving a car, using energy in the home, and disposing of waste. The other side shows how changes in behavior can reduce personal emissions.

US Environmental Protection Agency (EPA)

91

Solar System Trading Cards  

NSDL National Science Digital Library

The students will collect solar system trading cards by playing an interactive card game. They will identify the sun, planets, comets, and asteroids by answering questions about them. By playing the game, students will gain knowledge about the solar system and they will view pictures taken by the Hubble Space Telescope and other NASA missions. Students will view an image accompanied by a question with three responses. By using the computer mouse, they will chose an answer. When the response is correct, additional information about the image is provided. If an incorrect answer is chosen, students are provided with additional information before they chose a new response. A glossary of terms can be found. At the end of the game, students are assessed with a list of correctly identified solar system objects. This site includes an overview, teacher lesson plans, links to the National Science Education Standards, science background for the teacher, downloadable cards, and links to other sites. The lesson plan includes the goal/purpose, desired outcomes, prerequisites, new vocabulary, general misconceptions, preparation time, execution time, needed materials, engagement activities, step-by-step instructions, evaluation/assessment, and follow-up activities. Suggestions are given for one computer classrooms, those without computers, and home schoolers.

Storr, Alex; Space, Amazing; Mccue, Betty; Flowers, Connie; Institute, Space T.

2007-12-12

92

Java card: Internet computing on a smart card  

Microsoft Academic Search

The smart card-which offers Internet programmers a truly safe place to generate and store a private encryption key-will soon be recognized as a useful component of Internet computing. Until now the security precautions surrounding smart-card technology have effectively prevented its use in general computing systems, but the recent implementation of the secure Internet language Java on a smart card not

S. B. Guthery

1997-01-01

93

Implementing Open Authentication for Web Services with a Secure Memory Card  

Microsoft Academic Search

Open authentication protocols have become a standard solution to allow interfacing of third-party applications and websites. This paper presents a rationale for the use of secure memory cards with NFC-enabled service. A software application prototype is presented to show how a secure memory card can provide a portable authentication module to access web services. The prototype shows that it is

Aki-Petteri Leinonen; Tuomo Tuikka; Erkki Siira

2012-01-01

94

Credit Card Solicitation Policies in Higher Education: Does "Protecting" Our Students Make a Difference?  

ERIC Educational Resources Information Center

Reports on a study that investigated the effect of a university's solicitation policy on students' acquisition and usage of credit cards. Attempts by universities to limit access to and use of credit cards appear to be ineffective. Suggests alternative policies be constructed around teaching students sound money management skills. (Author/JDM)

Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd S.

2001-01-01

95

Specific Heat of the Ca-Intercalated Graphite Superconductor CaC6  

NASA Astrophysics Data System (ADS)

The superconducting state of Ca-intercalated graphite CaC6 has been investigated by specific heat measurements. The characteristic anomaly at the superconducting transition (Tc=11.4K) indicates clearly the bulk nature of the superconductivity. The temperature and magnetic field dependence of the electronic specific heat are consistent with a fully gapped superconducting order parameter. The estimated electron-phonon coupling constant is ?=0.70±0.04, suggesting that the relatively high Tc of CaC6 can be explained within the intermediate coupling BCS approach.

Kim, J. S.; Kremer, R. K.; Boeri, L.; Razavi, F. S.

2006-06-01

96

75 FR 10414 - Researcher Identification Card  

Federal Register 2010, 2011, 2012, 2013

...an account using cash, check, money order, debit card, or credit card. Your researcher identification card number as encoded...in part 1253 of this chapter, you may use cash or credit card to purchase a debit card from the vending...

2010-03-08

97

A Java Card CAP converter in PVS  

Microsoft Academic Search

Abstract: The Java Card language is a trimmed down dialect of Java aimed at programmingsmart cards. Java Card species its own classle format (the Java Card ConvertedAPplet (CAP) format) that is optimised with respect to the limited space resourcesof smart cards. This paper deals with the certied development of algorithms necessaryfor the conversion of ordinary Java classles into the CAP

Thomas Genet; Thomas P. Jensen; Vikash Kodati; David Pichardie

2003-01-01

98

Microfinance IdeaCard Index  

NSDL National Science Digital Library

The Microfinance IdeaCard Index is a collection of "good practices" and "inspiring ideas" drawn from microfinance initiatives in Asia, Africa, and Latin America. Each IdeaCard portrays a simple, short thought on the design, development, or maintenance of a microfinance institution, and creator Hari Srinivas hopes to solicit additional ideas from interested practitioners via email to assist future projects. Currently, 53 IdeaCards are posted and submission information is available online.

Srinivas, Hari.

99

Fuzzy Virtual Card Agent for Customizing Divisible Card Payments  

Microsoft Academic Search

E-commerce customers may have a problem when paying for the purchase of a major item, if its price is larger than the available credit on their credit card. In the brick and mortar world, this problem would be solved by paying part of the bill with cash or with a second credit card. In e-commerce, however, this has not been

Soon Ae Chun; Yoo Jung An; James Geller

2005-01-01

100

Common Badging and Access Control System (CBACS)  

NASA Technical Reports Server (NTRS)

This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

Dischinger, Portia

2005-01-01

101

HyperCLIPS: A HyperCard interface to CLIPS  

NASA Technical Reports Server (NTRS)

HyperCLIPS combines the intuitive, interactive user interface of the Apple Macintosh(TM) with the powerful symbolic computation of an expert system interpreter. HyperCard(TM) is an excellent environment for quickly developing the front end of an application with buttons, dialogs, and pictures, while the CLIPS interpreter provides a powerful inference engine for complex problem solving and analysis. By integrating HyperCard and CLIPS the advantages and uses of both packages are made available for a wide range of uses: rapid prototyping of knowledge-based expert systems, interactive simulations of physical systems, and intelligent control of hypertext processes, to name a few. Interfacing HyperCard and CLIPS is natural. HyperCard was designed to be extended through the use of external commands (XCMDs), and CLIPS was designed to be embedded through the use of the I/O router facilities and callable interface routines. With the exception of some technical difficulties which will be discussed later, HyperCLIPS implements this interface in a straight forward manner, using the facilities provided. An XCMD called 'ClipsX' was added to HyperCard to give access to the CLIPS routines: clear, load, reset, and run. And an I/O router was added to CLIPS to handle the communication of data between CLIPS and HyperCard.

Pickering, Brad; Hill, Randall W., Jr.

1990-01-01

102

Smart cards--the key to trustworthy health information systems.  

PubMed Central

Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up.

Neame, R.

1997-01-01

103

Personal Identity Verification Card Management Report.  

National Technical Information Service (NTIS)

This report provides an overview of card management systems, identifies generic card management requirements, and considers some technical approaches to filling the existing gaps in PIV card management. The primary guiding principles in selecting technica...

J. Dray D. Corcoran

2006-01-01

104

Purchase Card Program Controls Needs Strengthening  

NSF Publications Database

... Controls Over Purchase Card Use in BIO Need Improvement (Report No. 00-2008). 2 3 4 5 z 37% of ... in the NSF Purchase Card Manual to state specifically that purchase cards are to be kept in locked ...

105

Formation of Nanofoam carbon and re-emergence of Superconductivity in compressed CaC6  

PubMed Central

Pressure can tune material's electronic properties and control its quantum state, making some systems present disconnected superconducting region as observed in iron chalcogenides and heavy fermion CeCu2Si2. For CaC6 superconductor (Tc of 11.5?K), applying pressure first Tc increases and then suppresses and the superconductivity of this compound is eventually disappeared at about 18?GPa. Here, we report a theoretical finding of the re-emergence of superconductivity in heavily compressed CaC6. The predicted phase III (space group Pmmn) with formation of carbon nanofoam is found to be stable at wide pressure range with a Tc up to 14.7?K at 78?GPa. Diamond-like carbon structure is adhered to the phase IV (Cmcm) for compressed CaC6 after 126?GPa, which has bad metallic behavior, indicating again departure from superconductivity. Re-emerged superconductivity in compressed CaC6 paves a new way to design new-type superconductor by inserting metal into nanoporous host lattice.

Li, Yan-Ling; Luo, Wei; Chen, Xiao-Jia; Zeng, Zhi; Lin, Hai-Qing; Ahuja, Rajeev

2013-01-01

106

77 FR 16019 - Privacy Act of 1974; System of Records  

Federal Register 2010, 2011, 2012, 2013

...Access to computerized data is restricted by passwords; users must have a common access card (CAC) to access the data. Retention and Disposal: Data stored digitally within the system is retained until access is no longer required....

2012-03-19

107

A Formal Specification of the Java Card Firewall  

Microsoft Academic Search

this paper is to provide a formal specication of the Java Cardrewall, a mechanism designedto protect the security and integrity of the Java Card Runtime Environment (JCRE) and of each applet. Inthe Java Cardrewall scheme, applets can only access objects that were created by applets dened in thesame package or through special object sharing mechanisms such as shareable interfaces

Igor Siveroni; Thomas Jensen; Marc Eluard

2001-01-01

108

Document Cards: A Top Trumps Visualization for Documents  

Microsoft Academic Search

Finding suitable, less space consuming views for a document's main content is crucial to provide convenient access to large document collections on display devices of different size. We present a novel compact visualization which represents the document's key semantic as a mixture of images and important key terms, similar to cards in a top trumps game. The key terms are

Hendrik Strobelt; Daniela Oelke; Christian Rohrdantz; Andreas Stoffel; Daniel A. Keim; Oliver Deussen

2009-01-01

109

260 K bit Flat Domain Memory Card module  

Microsoft Academic Search

Flat domain shift registers use the propagation of domains in low coercive force. channels formed in a ferromagnetlc thin film, the magnetization lying in the plane of the film. A recent design allows to store 130Kbits per substrate with reduced electronic accessing circuits. This paper describes an experimental memory card of 260 Kbit capacity, 21×17cm in size, organized in 64

C. Battarel; M. Hanaut; H. Fima

1978-01-01

110

Implementation of Java Card Virtual Machine  

Microsoft Academic Search

Java card is a new system for programming smart cards, which is based on the Java language and Virtual Machine. Java card\\u000a programs (applets) run in Java Card Runtime Environment (JCRE) including the Java Card Virtual Machine (JCVM), the framework,\\u000a the associated native methods and the API (Application Programming Interface). JCVM is implemented as two separate pieces:\\u000a off-card VM (Virtual

Liu Songyan; Zhigang Mao; Yizheng Ye

2000-01-01

111

Life in the Extreme Trading Cards  

NSDL National Science Digital Library

This set of cards highlights a different extremophile group (e.g. halophiles, thermophiles, acidophiles) with a photo of the environment they live in on the front of the card and then "stats" on the back of the card. Currently the cards are PDF's but will ultimately be printed as 2.5"x3.5" cards (in the spirit of baseball trading cards).

Museum, Uw G.

112

Correctness of Java Card Tokenisation  

Microsoft Academic Search

We present a formalisation of the bytecode optimisation of Sun's Java Card language from the class file to CAP file format as a set of constraints between the two formats and define and prove its correctness. Java Card bytecode is formalised as an abstract operational semantics, which can then be instantiated into the two formats. The optimisation is given as

Ewen Denney

1999-01-01

113

Rewritable holographic memory card system  

Microsoft Academic Search

The new rewritable holographic memory card (HMC) of Optilink provides a novel solution for high density optical storage of personal data. In contrast to most holographic storage systems using highly multiplexed transmissive volume holograms in bulk materials, our approach is adapted to the card format using a polymer thin film holographic storage material, operating in reflection mode, allowing writing and

E. Lorincz; P. Koppa; F. Ujhelyi; P. I. Richter; G. Szarvas; Gabor Erdei; P. S. Ramanujam

2000-01-01

114

An Anonymous Credit Card System  

Microsoft Academic Search

Credit cards have many important benefits; however, these same bene- fits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank's need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were

Elli Androulaki; Steven M. Bellovin

2009-01-01

115

Authentication techniques for smart cards  

SciTech Connect

Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

Nelson, R.A.

1994-02-01

116

PREL Pacific Region Language Cards.  

ERIC Educational Resources Information Center

This collection of 10 cue cards presents English translations of common English words and expressions into 10 Pacific Region languages: Palauan, Samoan, Chamorro, Hawaiian, Carolinian, Chuukese, Pohnpeian, Marshallese, Yapese, and Kosraean. The cards translate the following: hello, good morning, good afternoon, good night, thank you, you're…

Pacific Region Educational Lab., Honolulu, HI.

117

Multiple Level Weighted Card Sorting  

Microsoft Academic Search

Mental models of domains may be hierarchical in nature and may include several levels of abstraction. In this article, initial emphasis is placed on reviewing past and current methods and practices in card sorting with respect to their suitability to capture such mental models. Then a new variant of card sorting is described that improves the collection and reconstruction of

Joachim Harloff

2005-01-01

118

Identification of Gene Expression Changes from Colitis to CRC in the Mouse CAC Model  

PubMed Central

A connection between colorectal carcinogenesis and inflammation is well known, but the underlying molecular mechanisms have not been elucidated. Chemically induced colitis-associated cancer (CAC) is an outstanding mouse model for studying the link between inflammation and cancer. Additionally, the CAC model is used for examining novel diagnostic, prognostic, and predictive markers for use in clinical practice. Here, a CAC model was established in less than 100 days using azoxymethane (AOM) with dextran sulfate sodium salt (DSS) in BALB/c mice. We examined the mRNA expression profiles of three groups: control untreated mice (K), DSS-induced chronic colitis mice (D), and AOM/DSS-induced CAC (AD) mice. We identified 6301 differentially expressed genes (DEGs) among the three groups, including 93 persistently upregulated genes and 139 persistently downregulated genes. Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analyses revealed that the most persistent DEGs were significantly enriched in metabolic or inflammatory components in the tumor microenvironment. Furthermore, several associated DEGs were identified as potential DEGs by protein-protein interaction (PPI) network analysis. We selected 14 key genes from the DEGs and potential DEGs for further quantitative real-time PCR (qPCR) verification. Six persistently upregulated, 3 persistently downregulated DEGs, and the other 3 genes showed results consistent with the microarray data. We demonstrated the regulation of 12 key genes specifically involved in Wnt signaling, cytokine and cytokine receptor interactions, homeostasis, and tumor-associated metabolism during colitis-associated CRC. Our results suggest that a close relationship between metabolic and inflammatory mediators of the tumor microenvironment is present in CAC.

Li, Xin; Gao, Yuyan; Yang, Ming; Zhao, Qi; Wang, Guangyu; Yang, Yan mei; Yang, Yue; Liu, Hui; Zhang, Yanqiao

2014-01-01

119

The Ins and Outs of Access Control.  

ERIC Educational Resources Information Center

Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

Longworth, David

1999-01-01

120

75 FR 78685 - Privacy Act of 1974; System of Records  

Federal Register 2010, 2011, 2012, 2013

...Access Card (CAC) Photos for identification...Social Security Number (SSN), and other...address, and telephone number, when and where...advertising or marketing campaigns that may include...Name, service number, selective service...Access Card (CAC) Photos for...

2010-12-16

121

FRONTLINE: The Card Game  

NSDL National Science Digital Library

Credit card companies have been the subject of renewed interest by the general public and regulatory agencies in the federal government, and this program by Frontline investigates "the future of the massive consumer loan industry and its impact on a fragile national economy." The program is hosted by correspondent Lowell Bergman, and represents a joint endeavor with The New York Times. As with most Frontline programs, visitors can watch the full program online, though before doing so, they may wish to take a look at the informative "Seven Things You Need to Know" section. Here they can breeze through helpful reminders, including "Cardholders Have New Protections" and "Free Traps Are Still Out There". The site has a number of extras, including additional interviews, a podcast with Bergman, and a discussion board for viewers to chime in with their appraisal of the program.

122

Developing Java Card Applications with B  

Microsoft Academic Search

This work proposes a methodology for the rigorous development of Java Card smart card applications, using the B Method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specifi- cation of the aplication logic needs not be preoccupied with the specific

Bruno Emerson Gurgel Gomes; Anamaria Martins Moreira; David Déharbe

2007-01-01

123

An integrated development environment for Java Card  

Microsoft Academic Search

This article describes a Java Card programming environment which to a large extent is generated from formal specications of the syntax and semantics of Java Card, the JCRE (Java Card Runtime Environment), and the Java Card APIs. The resulting environment consists of a set of tightly integrated and somewhat smart tools, such as a Java specic structure editor and a

Isabelle Attali; Denis Caromel; Carine Courbis; Ludovic Henrio; Henrik Nilsson

2001-01-01

124

Bytecode verification on Java smart cards  

Microsoft Academic Search

This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior o-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post-issuance downloading of applets on Java Cards. This article

Xavier Leroy

2002-01-01

125

Smart card payment and risk scenarios  

Microsoft Academic Search

Current payment methods, that are based on cash and magnetic strip cards, are ei- ther expensive to use, or they do not offer enough security for payments. Smart card based payment systems offer several benefits over currently used cash and magnetic strip cards. Building and delivering smart card based payments systems is not an easy task. It includes several risks

Mika Mäntylä

126

A Better Way to Deal the Cards  

Microsoft Academic Search

This paper considers the effect of riffle shuffling on decks of cards, allowing for some cards to be indistinguishable from other cards. The dual problem of dealing a game with hands, such as bridge or poker, is also considered. The Gilbert-Shannon-Reeds model of card shuffling is used, along with variation distance for measuring how close to uniform a deck has

Mark A. Conger; Jason Howald

2009-01-01

127

Credit Cards. Bulletin No. 721. (Revised.)  

ERIC Educational Resources Information Center

This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

Fox, Linda Kirk

128

An empirical investigation of US credit card users: Card choice and usage behavior  

Microsoft Academic Search

The purpose of this research is to analyze household credit card choice and usage behavior. The theoretical model used to analyze the credit card choice behavior is a conjoint model which assumes the utility maximization and rational evaluation of the available credit card alternatives. The study also investigates the effects of credit card attitudes and practices on the credit card

Ali Kara; Erdener Kaynak; Orsay Kucukemiroglu

1996-01-01

129

Healthcare provides many opportunities for card technologies.  

PubMed

Smart cards and optical memory cards are among the fastest growing technologies today. Though their use in healthcare is not yet widespread, they promise great potential benefits in several areas of healthcare delivery. Both cards are credit card-sized plastic devices that can store information. Embedded in smart cards are one or more computer chips which store and process information, and some cards provide as much computer power as a PC. Optical memory cards use laser technology to store and read information. PMID:10120739

Amoroso, L A; Pollokoff, A M

1990-12-01

130

Evidence for gap anisotropy in CaC6 from directional point-contact spectroscopy.  

PubMed

We present the first results of directional point-contact spectroscopy in high-quality CaC6 samples both along the ab plane and in the c-axis direction. The superconducting order parameter Delta(0), obtained by fitting the Andreev-reflection (AR) conductance curves at temperatures down to 400 mK with the single-band 3D Blonder-Tinkham-Klapwijk model, presents two different distributions in the two directions of the main current injection, peaked at 1.35 and 1.71 meV, respectively. By ab initio calculations of the AR conductance spectra, we show that the experimental results are in good agreement with the recent predictions of gap anisotropy in CaC6. PMID:18518573

Gonnelli, R S; Daghero, D; Delaude, D; Tortello, M; Ummarino, G A; Stepanov, V A; Kim, J S; Kremer, R K; Sanna, A; Profeta, G; Massidda, S

2008-05-23

131

Corrosion of aluminium metal in OPC- and CAC-based cement matrices  

SciTech Connect

Corrosion of aluminium metal in ordinary Portland cement (OPC) based pastes produces hydrogen gas and expansive reaction products causing problems for the encapsulation of aluminium containing nuclear wastes. Although corrosion of aluminium in cements has been long known, the extent of aluminium corrosion in the cement matrices and effects of such reaction on the cement phases are not well established. The present study investigates the corrosion reaction of aluminium in OPC, OPC-blast furnace slag (BFS) and calcium aluminate cement (CAC) based systems. The total amount of aluminium able to corrode in an OPC and 4:1 BFS:OPC system was determined, and the correlation between the amount of calcium hydroxide in the system and the reaction of aluminium obtained. It was also shown that a CAC-based system could offer a potential matrix to incorporate aluminium metal with a further reduction of pH by introduction of phosphate, producing a calcium phosphate cement.

Kinoshita, Hajime, E-mail: h.kinoshita@sheffield.ac.uk [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom)] [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom); Swift, Paul; Utton, Claire [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom)] [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom); Carro-Mateo, Beatriz [The Public University of Navarra, C/Esquíroz, 30 trasera, Pamplona 31007 (Spain)] [The Public University of Navarra, C/Esquíroz, 30 trasera, Pamplona 31007 (Spain); Marchand, Geraldine [The National Institute of Applied Sciences (INSA) Lyon, 20 Avenue Albert Einstein 69621 Villeurbanne Cedex (France)] [The National Institute of Applied Sciences (INSA) Lyon, 20 Avenue Albert Einstein 69621 Villeurbanne Cedex (France); Collier, Nick [National Nuclear Laboratory, Chadwick House, Birchwood Park, Warrington, WA3 6AE (United Kingdom)] [National Nuclear Laboratory, Chadwick House, Birchwood Park, Warrington, WA3 6AE (United Kingdom); Milestone, Neil [Industrial Research Ltd., 69 Gracefield Road, Lower Hutt, 5040 (New Zealand)] [Industrial Research Ltd., 69 Gracefield Road, Lower Hutt, 5040 (New Zealand)

2013-08-15

132

Stream processing health card application.  

PubMed

In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data. PMID:22127523

Polat, Seda; Gündem, Taflan Imre

2012-10-01

133

CREDIT CARD TERMS AND CONDTIONS  

Cancer.gov

I, the undersigned, have read and understand this document and the documents referenced and voluntarily agree to accept responsibility for a Leidos Biomedical Research, Inc. Commercial Credit Card and its use according to the Leidos Biomedical Research, Inc. procedures.

134

Charge density waves in the graphene sheets of the superconductor CaC6  

Microsoft Academic Search

Graphitic systems have an electronic structure that can be readily manipulated through electrostatic or chemical doping, resulting in a rich variety of electronic ground states. Here we report the first observation and characterization of electronic stripes in the highly electron-doped graphitic superconductor, CaC6, by scanning tunnelling microscopy and spectroscopy. The stripes correspond to a charge density wave with a period

N. E. Shuttleworth; S. R. Schofield; K. Iwaya; C. F. Hirjibehedin; Ch. Renner; G. Aeppli; M. Ellerby; K. C. Rahnejat; C. A. Howard

2011-01-01

135

Advanced control flow in Java card programming  

Microsoft Academic Search

Java Card technology simplifies the development of smart card applications by providing a high-level programming language similar to Java. However, the master-slave programming model used in current Java Card platform creates control flow difficulties when writing complex card programs, making it inconvenient, tedious, and error-prone to implement Java Card applications. This paper examines these drawbacks of the master-slave model and

Peng Li; Steve Zdancewic

2004-01-01

136

Secure interoperability of patient data cards in health networks.  

PubMed

In the healthcare area, chip card based information systems occur in the shape of patient data cards providing informational self determination and mobility of the users as well as quality, integrity, accountability, and availability of the data stored on the card, thus improving the shared care of patients. Dealing with sensitive personal medical information, shared care information systems have to provide appropriate security services, only authorized users allowing restricted rights to the patients' data according to the "need to know" principle. The DIABCARD project aims the implementation and evaluation of a chip card based medical information system (CCMIS) for facilitating communication and co-operation between health professionals in different organisations or departments caring the same patient with Diabetes as an example. In co-operation with the EC-funded TrustHealth project, the communication and application security services needed are provided as strong authentication and the derived services like authorization, access control, accountability, confidentiality etc. The solution is based on Health Professional Cards and Trusted Third Party services. Besides the secure handling of the patient's chip cart in DIABCARD workstations, also the secure communication between these workstations and related departmental systems has been implemented. Finally, a few legal issues, future trends like the XML standard set and their implications for the solution presented as well as for distributed health information systems in general are shortly discussed. PMID:11187483

Blobel, B; Spiegel, V; Pharow, P; Engel, K; Engelbrecht, R

2000-01-01

137

Access Nets: Modeling Access to Physical Spaces  

NASA Astrophysics Data System (ADS)

Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy permits becomes surprisingly difficult requiring knowledge of permission levels, spatial layout, and time. In this paper, we present a formal modeling framework, called AccessNets, suitable for describing a combination of access permissions, physical spaces, and temporal constraints. Furthermore, we provide evidence that model checking techniques are effective in reasoning about physical access control policies. We describe our results from a tool that uses reachability analysis to validate security policies.

Frohardt, Robert; Chang, Bor-Yuh Evan; Sankaranarayanan, Sriram

138

Far-infrared signature of a superconducting gap in intercalated graphite CaC6.  

NASA Astrophysics Data System (ADS)

CaC6 is exceptional in the series of intercalated graphite compounds because of its high superconducting transition temperature, Tc=11.5K. The superconducting gap, 2?=25.6 ± 3.2cm-1, measured by scanning tunneling spectroscopy (N. Bergeal et al., PRL 97, 077003 (2006)), is consistent with the weak-coupling BCS type superconductivity. The superconducting gap can be directly probed also by far-infrared spectroscopy. We studied the reflectance R of CaC6 between 4 and 100cm-1 from 3K to 15K. We see the signature of the superconducting gap in the reflectance ratio of superconducting state Rs to the normal state Rn and can follow its temperature dependence. The appearance of the gap signature in Rs/Rn tells us that CaC6 is in the dirty limit. Different models, including an anisotropic gap and a multi-gap scenario, will be discussed to fit the optical data.

Nagel, U.; Huvonen, D.; Room, T.; Kim, J. S.; Boeri, L.; Kremer, R. K.; Razavi, F. S.

2007-03-01

139

Structural behavior of the acetylide carbides Li2C2 and CaC2 at high pressure  

NASA Astrophysics Data System (ADS)

The effects of high pressure (up to 30 GPa) on the structural properties of lithium and calcium carbide, Li2C2 and CaC2, were studied at room temperature by Raman spectroscopy in a diamond anvil cell. Both carbides consist of C2 dumbbells which are coordinated by metal atoms. At standard pressure and temperature two forms of CaC2 co-exist. Monoclinic CaC2-II is not stable at pressures above 2 GPa and tetragonal CaC2-I possibly undergoes a minor structural change between 10 and 12 GPa. Orthorhombic Li2C2 transforms to a new structure type at around 15 GPa. At pressures above 18 GPa (CaC2) and 25 GPa (Li2C2) Raman spectra become featureless, and remain featureless upon decompression which suggests an irreversible amorphization of the acetylide carbides. First principles calculations were used to analyze the pressure dependence of Raman mode frequencies and structural stability of Li2C2 and CaC2. A structure model for the high pressure phase of Li2C2 was searched by applying an evolutionary algorithm.

Nylén, Johanna; Konar, Sumit; Lazor, Peter; Benson, Daryn; Häussermann, Ulrich

2012-12-01

140

Targeting the poor in times of crisis: the Indonesian health card.  

PubMed

This paper looks at targeting performance of the Indonesian health card programme that was implemented in August 1998 to protect access to health care for the poor during the Indonesian economic crisis. By February 1999, 22 million people had received a health card. The health card provided a user fee waiver for public health care. Targeting of the health card was pro-poor, but with considerable leakage to the non-poor. Utilization of the health card for outpatient care was also pro-poor, but conditional on ownership, the middle quintiles were more likely to use the card. Targeting of the health card followed a decentralized design combining geographic targeting with community-based targeting instruments. This design facilitated the rapid implementation of the programme, but targeting performance suffered from a lack of information on the regional impact of the crisis, while at local level not all barriers to accessing health care services were overcome by the health card. Indirect and direct costs of seeking health care seem to be the main deterrent to using the health card, and are higher in more remote areas. Micro-simulations show that geographic targeting can contribute considerably to improving targeting performance, but most of the targeting gains are to be made at the local level, with district programme management and public health care providers. This study highlights the need for adequate and up-to-date social welfare indicators. In addition, further research would need to focus on how local knowledge can be utilized for signalling poverty dynamics and local barriers to access. PMID:18334517

Sparrow, Robert

2008-05-01

141

Predictors of Vaccination Card Retention in Children 12-59 months old in Karachi, Pakistan  

PubMed Central

Objective To determine the factors associated with retaining the vaccination card among care takers of 12-59 months old children in Karachi, Pakistan. Methods This was an analytical cross-sectional study in Karachi. Households were randomly selected throughout a multistage cluster sampling technique. Data was collected for 504 children of 12- 59 months of age. Questionnaire was administered to caretakers to gather information regarding the children’s vaccination status, socio-demographic characteristics and reviewing their vaccination cards. Statistical analysis was done by SPSS 19 using logistic regression. Results: Among 462 vaccinated children, caretakers of 33% provided vaccination cards. Odds of card retention decrease if the caretaker has a large household i.e., >5 people sharing one room (AOR 0.277, 95% CI: 0.096, 0.797) and if the child is of four to five years of age (AOR 0.544, 95% CI: 0.305, 0.970). Gender of the child, and the caretaker’s education and access to electronic media were not significant predictors of vaccination card retention in our study. Conclusion Our study showed that vaccination card retention for children 12-59 months of age was low (33%) in Karachi. There is a need to educate caretakers of young children regarding the importance of keeping vaccination card and to disseminate this information through healthcare providers. Improving vaccination card retention is one of the key measures which will help towards accurately estimating coverage and to inform health policy decisions.

Sheikh, Sana Sadiq; Ali, Syed Asad

2014-01-01

142

Debiasing Using Decomposition: The Case of Memory-Based Credit Card Expense Estimates  

Microsoft Academic Search

This article develops a conceptual framework to examine how consumers incorporate mem- ory-based and context-based cues in estimating past and future credit card expenses. Focusing on memory-based information, in this framework we suggest that past credit card expenses may be recalled as holistic totals or episodic individual expenses depending on the accessibility of each form of expense. We tested the

Joydeep Srivastava; Priya Raghubir

2002-01-01

143

Dome It Challenge Scenario Cards  

NSDL National Science Digital Library

Student teams find solutions to hypothetical challenge scenarios that require them to sustainably manage both resources and wastes. They begin by creating a card representing themselves and the resources (inputs) they need and wastes (outputs) they produce. Then they incorporate additional cards for food and energy components and associated necessary resources and waste products. They draw connections between outputs that provide inputs for other needs, and explore the problem of using linear solutions in resource-limited environments. Then students incorporate cards based on biorecycling technologies, such as algae photobioreactors and anaerobic digesters in order to make circular connections. Finally, the student teams present their complete biorecycling engineering solutions to their scenariosâin poster formatâby connecting outputs to inputs, and showing the cycles of how wastes become resources.

Membrane Biotechnology Laboratory, College of Engineering,

144

Match-on-Card for Secure and Scalable Biometric Authentication  

Microsoft Academic Search

The majority of biometric systems in use today operate in a database environment. Whether it is a large-scale database such\\u000a as US-VISIT or a small bank of biometrics stored on a server for logical access in an office, the solutions are based on insecure\\u000a networks that are vulnerable to cyberattacks. Match-on-Card technology eliminates the need for the database by both

Christer Bergman

145

Flash Cards 1.0  

NSDL National Science Digital Library

Perhaps you would like a way to help memorize important chemical equations? Or perhaps you are preparing to memorize certain Gallic phrases for an upcoming trip to Lyons? This helpful application can help users with both situations, and a number of other similar dilemmas. Flash Cards 1.0 allows users to create their own flashcards, and they can import data from other sources, including websites and text documents. Additionally, a setup page gives users the ability to set the interval time between cards, their text color, and other variables. This version is compatible with all computers running Mac OS X 10.2 and newer.

2007-01-01

146

Card Lab: A Population Genetics Simulation Exercise.  

ERIC Educational Resources Information Center

Explains the use of a card lab to demonstrate how a population bottleneck impacts genetic diversity and the survival of a population. Uses a standard deck of playing cards to show how age structure can magnify bottleneck effects. (DDR)

Easton, Christopher M.

1997-01-01

147

Far-infrared signature of the superconducting gap in intercalated graphite CaC6  

NASA Astrophysics Data System (ADS)

Terahertz reflectance spectra of the Ca-intercalated graphite CaC6 reveal a superconducting gap below 11 K. The gap signature lacks a sharp onset to full reflectivity at 2?0 but rather shows a distribution of gap values consistent with an anisotropic gap. The experimental data were successfully fitted to the gap distribution obtained from density-functional calculations of Sanna [Phys. Rev. B 75, 020511(R) (2007)]. The temperature dependence of the superconducting gap is characteristic for a BCS type superconductor.

Nagel, U.; Hüvonen, D.; Joon, E.; Kim, J. S.; Kremer, R. K.; Rõõm, T.

2008-07-01

148

Scanning tunneling spectroscopy on the novel superconductor CaC6.  

PubMed

We present scanning tunneling microscopy and spectroscopy of the newly discovered superconductor CaC6. The tunneling conductance spectra, measured between 3 and 15 K, show a clear superconducting gap in the quasiparticle density of states. The gap function extracted from the spectra is in good agreement with the conventional BCS theory with Delta0=1.6+/-0.2 meV. The possibility of gap anisotropy and two-gap superconductivity is also discussed. In a magnetic field, direct imaging of the vortices allows us to deduce a coherence length in the ab plane xiab approximately 33 nm. PMID:17026267

Bergeal, N; Dubost, V; Noat, Y; Sacks, W; Roditchev, D; Emery, N; Hérold, C; Marêché, J-F; Lagrange, P; Loupias, G

2006-08-18

149

Experimental evidence of s-wave superconductivity in bulk CaC6.  

PubMed

The temperature dependence of the in-plane magnetic penetration depth, lambda(ab)(T), has been measured in a c-axis oriented polycrystalline CaC(6) bulk sample using a high-resolution mutual inductance technique. A clear exponential behavior of lambda(ab)(T) has been observed at low temperatures, strongly suggesting isotropic s-wave pairing. Data fit using the standard BCS theory yields lambda(ab)(0) = (720 +/- 80) A and delta(0) = (1.79 +/- 0.08) meV. The ratio 2delta(0)/k(B)T(c) = (3.6 +/- 0.2) gives indication for a weakly coupled superconductor. PMID:16605783

Lamura, G; Aurino, M; Cifariello, G; Di Gennaro, E; Andreone, A; Emery, N; Hérold, C; Marêché, J-F; Lagrange, P

2006-03-17

150

Effect of pressure on superconducting Ca-intercalated graphite CaC6  

NASA Astrophysics Data System (ADS)

The effect of pressure on the superconducting transition temperature (Tc) of the Ca-intercalated graphite compound CaC6 has been investigated up to ˜16kbar . Tc is found to increase under pressure with a large relative ratio ?Tc/Tc of ?0.4%/kbar . Using first-principles calculations, we show that the positive effect of pressure on Tc can be explained within the scope of electron-phonon theory due to the presence of a soft phonon branch associated with in-plane vibrations of the Ca atoms. The implications of the present findings for the current debate about the superconducting mechanism in graphite intercalation compounds are discussed.

Kim, J. S.; Boeri, L.; Kremer, R. K.; Razavi, F. S.

2006-12-01

151

High Pressure and Superconductivity: Intercalated Graphite Cac 6 as a Model System  

Microsoft Academic Search

\\u000a Superconducting CaC6 is found to exhibit two important pressure effects: (i) a large P-induced T\\u000a c enhancement up to 15.1 K at 7.5 GPa, the highest T\\u000a c value hitherto reported for graphite intercalated compounds; and (ii) a dramatic T\\u000a c drop down to ~3 K at a critical pressure of ~9 GPa suggestive of a structural instability. We show

A. Gauzzi; N. Bendiab; M. D’Astuto; B. Canny; M. Calandra; F. Mauri; G. Loupias; S. Takashima; H. Takagi; N. Takeshita; C. Terakura; N. Emery; C. Herold; Ph. Lagrange; M. Hanfland; M. Mezouar

2010-01-01

152

Efficient implementation of anonymous credentials on Java Card smart cards  

Microsoft Academic Search

The Direct Anonymous Attestation scheme allows to map procedures with an imperative requirement for anonymity, such as voting, to the electronic world while offering provable security. However, the scheme is complex and requires demanding computations to be performed on a tamper-proof device. Such devices, e.g. secure smart cards, are typically resource constrained. We present the first implementation of the (simplified)

M. Sterckx; B. Gierlichs; B. Preneel; I. Verbauwhede

2009-01-01

153

Java Card or How to Cope with the New Security Issues Raised by Open Cards?  

Microsoft Academic Search

In this paper, we aim to discuss various threats raised by Java Cards at various levels of the system. First, we address the Java Card platform security itself, from the chip security features to the Java Card virtual machine. Next, we expose how to deal with application se- curity which is a standard problem for smart card manufacturers but a

Pierre Girard; Jean-Louis Lanet

1999-01-01

154

Securing interoperability between chip card based medical information systems and health networks.  

PubMed

Health information systems supporting shared care are going to be distributed and interoperable. Dealing with sensitive personal medical information, such information systems have to provide appropriate security services, allowing only authorised users restricted access rights to the patients' data according to the 'need to know' principle. Especially in healthcare, chip card based information systems occur in the shape of patient data cards providing informational self determination and mobility of the users as well as quality, integrity, accountability, and availability of the data stored on the card, thus improving the shared care of patients. The DIABCARD project aims at the implementation and evaluation of a chip card based medical information system (CCMIS) for facilitating communication and co-operation between health professionals in different organisations or departments caring the same patient with diabetes as an example. In co-operation with the EC-funded TrustHealth(2) project, communication and application security services needed are provided like strong authentication as well as the derived services such as authorisation, access control, accountability, confidentiality, etc. The solution is based on Health Professional Cards and Trusted Third Party services. In addition to the secure handling of the patient's chip card and data in DIABCARD workstations, the secure communication between these workstations and related departmental systems has been implemented. Based on the results of this feasibility study, an enhanced security services specification for the DIABCARD example of a CCMIS is provided which will be implemented in the framework of a health network being established in the German federal state Bavaria. Beside the preferred solution of a combination of Patient Identification Card and Patient Data Card, lower level alternatives using card-verifiable certificates are explained in some details. Finally, a few legal issues, future trends like the XML standard set and their implications for the solution presented as well as for distributed health information systems in general are shortly discussed. PMID:11734401

Blobel, B; Pharow, P; Spiegel, V; Engel, K; Engelbrecht, R

2001-12-01

155

Targeted deletion of Kif18a protects from colitis-associated colorectal (CAC) tumors in mice through impairing Akt phosphorylation  

SciTech Connect

Highlights: •Kif18A is up-regulated in CAC of mouse model. •Kif18a{sup ?/?} mice are protected from CAC. •Tumor cells from Kif18a{sup ?/?} mice undergo more apoptosis. •Kif18A deficiency induces poor Atk phosphorylation. -- Abstract: Kinesins are a superfamily of molecular motors involved in cell division or intracellular transport. They are becoming important targets for chemotherapeutic intervention of cancer due to their crucial role in mitosis. Here, we demonstrate that the kinesin-8 Kif18a is overexpressed in murine CAC and is a crucial promoter during early CAC carcinogenesis. Kif18a-deficient mice are evidently protected from AOM–DSS-induced colon carcinogenesis. Kif18A is responsible for proliferation of colonic tumor cells, while Kif18a ablation in mice promotes cell apoptosis. Mechanistically, Kif18a is responsible for induction of Akt phosphorylation, which is known to be associated with cell survival regulation. In conclusion, Kif18a is critical for colorectal carcinogenesis in the setting of inflammation by mechanisms of increased PI3K-AKT signaling. Inhibition of Kif18A activity may be useful in the prevention or chemotherapeutic intervention of CAC.

Zhu, Houbao [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China)] [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Xu, Wangyang [Department of Clinical Laboratories, Ninth People’s Hospital, SJTUSM, Shanghai 200011 (China)] [Department of Clinical Laboratories, Ninth People’s Hospital, SJTUSM, Shanghai 200011 (China); Zhang, Hongxin [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China)] [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Liu, Jianbing [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China) [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Shanghai Research Center for Model Organisms, Shanghai 201203 (China); Xu, Haimin [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China)] [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China); Lu, Shunyuan; Dang, Suying [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China)] [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Kuang, Ying [Shanghai Research Center for Model Organisms, Shanghai 201203 (China)] [Shanghai Research Center for Model Organisms, Shanghai 201203 (China); Jin, Xiaolong [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China)] [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China); Wang, Zhugang, E-mail: zhugangw@shsmu.edu.cn [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China) [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Shanghai Research Center for Model Organisms, Shanghai 201203 (China)

2013-08-16

156

Do consumers really want credit card reform?  

Microsoft Academic Search

Earlier this year, several bills were introduced in Congress to curb what many consumer advocates have described as abusive credit card practices. These bills were intended to keep credit card issuers from penalizing consumers for paying their card balances in full each month. In unveiling one of the measures, Congressman John LaFalce declared, \\

Kathryn L. Combs; Stacey L. Schreft

1999-01-01

157

Credit card fraud: awareness and prevention  

Microsoft Academic Search

Purpose – To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers. Design\\/methodology\\/approach – A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billions of dollars each year. Numerous schemes and techniques

Katherine J. Barker; Jackie DAmato; Paul Sheridon

2008-01-01

158

Cost-reducing multipurpose microfilm card  

NASA Technical Reports Server (NTRS)

Microfilm-aperture card is printed in the same format on both sides which enables the use of one card for mounting films that are ''right reading'' on both the base side and the emulsion side. This reduces the number of microfilm-card formats.

Smith, A. V.

1970-01-01

159

Practical Java Card bytecode compression 1  

Microsoft Academic Search

Our work concerns bytecode compression on an embedded, tiny and safe environment, and more specif- ically JAVA CARDS. (2) and (4) propose a way to compress java card bytecode into a format executable in an ultra light embedded system, using macro-packing. Our implementation, improved with new specical algorithms, allows a better compress rate (up to 32%). In a smart card

Gabriel Bizzotto; Gilles Grimaud

2002-01-01

160

Memory consumption analysis of Java smart cards  

Microsoft Academic Search

Memory is a scarce resource in Java smart cards. Developers and card suppliers alike would want to make sure, at compile- or load-time, that a Java Card applet will not overflow memory when performing dynamic class instantiations. Although there are good solutions to the general problem, the challenge is still out to produce a static analyser that is certified and

Pablo Giambiagi; Gerardo Schneider

161

An evaluation of the Java Card environment  

Microsoft Academic Search

In this paper, we present the experiment we have conducted to evaluate the suitability of Java cards for advanced applications. We developed a resource-consuming application in a Java card using only the specified Java Card environment, and noted which missing features could have been useful to improve the functionalities of our application or to ease its development. We then propose

Christophe Rippert; Daniel Hagimonty

2001-01-01

162

Solar System Trading Cards Jr. Edition  

NSDL National Science Digital Library

This collection of thirteen cards depicts Solar System objects such as planets, comets, asteroids, and the Sun. The front of each card displays a color image of a Solar System object; the back provides facts about the object. The Hubble Space Telescope card contains the directions for the game.

2005-01-01

163

Engineering software development with HyperCard  

NASA Technical Reports Server (NTRS)

The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

Darko, Robert J.

1990-01-01

164

Creativity and the TAT Blank Card.  

ERIC Educational Resources Information Center

The correlation between number of words used to describe an imaginary picture on the blank card of the Thematic Apperception Test and creativity scores was examined with 47 undergraduate women. Results indicated length of response to the blank card correlated better with creativity than did length of response to picture cards. (DB)

Wakefield, John F.

1986-01-01

165

The Market for Electronic Cash Cards  

Microsoft Academic Search

We develop a theoretical framework aimed to model the pricing of electronic cash cards and the market domain in which these cards will be used in an environment where charge cards and currency (the legal tender) are competing payment media. We also investigate whether the adoption of the various payment media generates an underutilization or overutilization of the electronic cash

Oz Shy; Juha Tarkka

2002-01-01

166

Data storage on holographic memory card  

Microsoft Academic Search

Our goal is to develop a re-writable holographic memory card system based on thin film polymer media on credit card size plastic carriers. Data is stored in our system in form of polarization holograms that present high efficiency and excellent suppression of higher orders even for thin material. Data is written on the card in a parallel way using spatial

Pal Koppa; Gabor Erdei; Ferenc Ujhelyi; Peter Varhegyi; T. Ujvari; Emoeke Loerincz; Gabor Szarvas; Soeren Hvilsted; P. S. Ramanujam; Peter I. Richter

2000-01-01

167

Digital Memory Card Market and Technology  

Microsoft Academic Search

This paper provides a review of the NAND and NOR flash memory technology and the market trend. Details on the market share and providers of NOR and NAND are included. Key considerations are focused on the various memory storage card formats, flash IC packaging and card assembly process. Manufacturing issues in the latest trend of further reducing the card size

Wei Koh

2005-01-01

168

Smart Playing Cards: A Ubiquitous Computing Game  

Microsoft Academic Search

We present the ‘Smart Playing Cards’ application, a ubiquitous computing game that augments a classical card game with information technological functionality by attaching RFID tags to the cards. We also mention requirements that such an application makes on a supporting software infrastructure for ubiquitous computing.

Kay Römer; Svetlana Domnitcheva

2002-01-01

169

How Many Cards? Let's Ask the LCM.  

ERIC Educational Resources Information Center

Describes an activity in which students deal a deck of cards to 5, then 4, then 3, then 2 players; note the number of cards left over each time; and from this information determine the number of cards in the deck. (MKR)

Zerger, Monte J.

1996-01-01

170

HyperCard Monitor System.  

ERIC Educational Resources Information Center

An investigation into high level event monitoring within the scope of a well-known multimedia application, HyperCard--a program on the Macintosh computer, is carried out. A monitoring system is defined as a system which automatically monitors usage of some activity and gathers statistics based on what is has observed. Monitor systems can give the…

Harris, Julian; Maurer, Hermann

171

Bus-Programmable Slave Card  

NASA Technical Reports Server (NTRS)

Slave microprocessors in multimicroprocessor computing system contains modified circuit cards programmed via bus connecting master processor with slave microprocessors. Enables interactive, microprocessor-based, single-loop control. Confers ability to load and run program from master/slave bus, without need for microprocessor development station. Tristate buffers latch all data and information on status. Slave central processing unit never connected directly to bus.

Hall, William A.

1990-01-01

172

Comparing Candidate Hospital Report Cards  

SciTech Connect

We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

1997-12-31

173

New Cards for New Brides.  

National Technical Information Service (NTIS)

The study was conducted to determine feasibility of having States provide the Social Security Administration (SSA) with name-change and other data, for updating the enumeration file and issuing a corrected Social Security card, as part of the marriage reg...

G. De Luna

1991-01-01

174

Switch Card Apparatus and Methods.  

National Technical Information Service (NTIS)

Switch card apparatus are disclosed. In one embodiment, a circuit includes a first portion having a first switch adapted to be coupled to a first voltage, a second portion including a second switch, and a third portion including a third switch. The first ...

G. H. Smith H. N. Nguyen R. A. Kubinski T. T. Phan

2004-01-01

175

75 FR 6005 - Privacy Act of 1974; System of Records  

Federal Register 2010, 2011, 2012, 2013

...addition, the system will be a controlled system with passwords, and Common Access Card (CAC) governing access to data. Retention and disposal: Records are destroyed when no longer needed for reference and/or for conducting business....

2010-02-05

176

76 FR 53421 - Privacy Act of 1974; System of Records  

Federal Register 2010, 2011, 2012, 2013

...addition, the electronic system is controlled with passwords, and Common Access Card (CAC) governing access to data. Retention and disposal: Delete information in the database when no longer needed. Electronic records are destroyed by...

2011-08-26

177

Intestinal Anastomosis by Use of a Memory-shaped Compression Anastomosis Clip (Hand CAC 30): Early Clinical Experience  

PubMed Central

Purpose The safety and the efficacy of the compression anastomosis clip (Hand CAC 30) have been demonstrated by animal studies. This study was designed to evaluate the clinical validity of the Hand CAC 30 in enterocolic side-to-side anastomosis after colonic or enteric resections. Methods A non-randomized prospective data collection was performed for patients undergoing a side-to-side anastomosis using the Hand CAC 30. Eligibility criteria for the use of the Hand CAC 30 were for anastomoses between the colon and the ileum or between two small bowels. The primary short-term endpoint was the rate of anastomotic leakage. Other clinical outcomes, including intra- and postoperative complications, length of operation time and hospital stay, and the clip elimination time were recorded. Results A total of 63 patients (male, 36) underwent an enteric or right-sided colonic resection followed by a side-to-side anastomosis using the Hand CAC 30. Laparoscopic surgery was performed in 36 patients, in whom one patient who underwent a laparoscopic right hemicolectomy was converted to an open procedure (1/32, 3.1%). One patient with ascending colon cancer showed postoperative anastomotic leakage and died of co-morbid ischemic heart disease. There were no other surgical mortalities. The exact date of expulsion of the clip could not be recorded because most patients were not aware of clip elimination. No patients manifested clinical symptoms of anastomotic stricture. Conclusion Short-term evaluation of the Hand CAC 30 anastomosis in patients undergoing enterocolic surgery proved it to be a safe and efficacious alternative to the standard hand-sewn or stapling technique.

Lee, Hak-Youn; Woo, Jin-Hee; Park, Si-Young; Kang, Nam-Wook; Park, Ki-Jae

2012-01-01

178

Reminder card helps patients remember OCs.  

PubMed

Organon has developed the Reminder Card to help women patients remember their regular intake of oral contraceptive (OC) pills. About 50% of women take birth control pills as prescribed, 25% miss a pill per month, and 25% miss two or more pills in the same time frame. The plastic card, about the size and shape of a credit card, contains a microchip timer. Reminder cards are available to providers who use the Starter Kits issued by the company for new-start patients on the Mircette OC. When patients begin their first pack of pills, they select the time of day they prefer to have the Reminder Card emit its tiny beep. The time is set into the microchip timer and the card is programmed to sound automatically at the pre-set time each day for the next three months. The direction for using the Reminder Card is outlined. PMID:12295327

1999-11-01

179

Access control violation prevention by low-cost infrared detection  

Microsoft Academic Search

A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant

Andrew N. Rimmer

2004-01-01

180

Health smart cards: differing perceptions of emergency department patients and staff.  

PubMed

An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported. PMID:19203343

Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

2009-02-01

181

CAC3(MSI1) suppression of RAS2(G19V) is independent of chromatin assembly factor I and mediated by NPR1.  

PubMed

Cac3p/Msi1p, the Saccharomyces cerevisiae homolog of retinoblastoma-associated protein 48 (RbAp48), is a component of chromatin assembly factor I (CAF-I), a complex that assembles histones H3 and H4 onto replicated DNA. CAC3 overexpression also suppresses the RAS/cyclic AMP (cAMP) signal transduction pathway by an unknown mechanism. We investigated this mechanism and found that CAC3 suppression of RAS/cAMP signal transduction was independent of either CAC1 or CAC2, subunits required for CAF-I function. CAC3 suppression was also independent of other chromatin-modifying activities, indicating that Cac3p has at least two distinct, separable functions, one in chromatin assembly and one in regulating RAS function. Unlike Cac1p, which localizes primarily to the nucleus, Cac3p localizes to both the nucleus and the cytoplasm. In addition, Cac3p associates with Npr1p, a cytoplasmic kinase that stablizes several nutrient transporters by antagonizing a ubiquitin-mediated protein degradation pathway. Deletion of NPR1, like overexpression of Cac3p, suppressed the RAS/cAMP pathway. Furthermore, NPR1 overexpression interfered with the ability of CAC3 to suppress the RAS/cAMP pathway, indicating that extra Cac3p suppresses the RAS/cAMP pathway by sequestering Npr1p. Deletion of NPR1 did not affect the quantity, phosphorylation state, or localization of Ras2p. Consistent with the idea that Npr1p exerts its effect on the RAS/cAMP pathway by antagonizing a ubiquitin-mediated process, excess ubiquitin suppressed both the heat shock sensitivity and the sporulation defects caused by constitutive activation of the RAS/cAMP pathway. Thus, CAC3/MSI1 regulates the RAS/cAMP pathway via a chromatin-independent mechanism that involves the sequestration of Npr1p and may be due to the increased ubiquitination of an Npr1p substrate. PMID:11238915

Johnston, S D; Enomoto, S; Schneper, L; McClellan, M C; Twu, F; Montgomery, N D; Haney, S A; Broach, J R; Berman, J

2001-03-01

182

Superconducting graphene sheets in CaC6 enabled by phonon-mediated interband interactions  

NASA Astrophysics Data System (ADS)

There is a great deal of fundamental and practical interest in the possibility of inducing superconductivity in a monolayer of graphene. But while bulk graphite can be made to superconduct when certain metal atoms are intercalated between its graphene sheets, the same has not been achieved in a single layer. Moreover, there is a considerable debate about the precise mechanism of superconductivity in intercalated graphite. Here we report angle-resolved photoelectron spectroscopy measurements of the superconducting graphite intercalation compound CaC6 that distinctly resolve both its intercalant-derived interlayer band and its graphene-derived ?* band. Our results indicate the opening of a superconducting gap in the ?* band and reveal a substantial contribution to the total electron–phonon-coupling strength from the ?*-interlayer interband interaction. Combined with theoretical predictions, these results provide a complete account for the superconducting mechanism in graphite intercalation compounds and lend support to the idea of realizing superconducting graphene by creating an adatom superlattice.

Yang, S.-L.; Sobota, J. A.; Howard, C. A.; Pickard, C. J.; Hashimoto, M.; Lu, D. H.; Mo, S.-K.; Kirchmann, P. S.; Shen, Z.-X.

2014-03-01

183

A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.  

PubMed

Besides the overall budget for building the infrastructure of a healthcare-service-based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 plus medical institutions. One was who was to pay for the network (ADSL or modem) connection fee; the other was who was to pay for the firewall/anti-virus software. This paper addresses the second issue by proposing an efficient freeware firewall, named card-assisted firewall (CAF), for NHI VPN edge-hosts, which is also an add-on-value application of the National Healthcare IC card that every insurant and medical professional has. The innovative concept is that any NHI VPN site (edge-host) can establish diversified secure-authenticated connections with other sites only by an authentication mechanism, which requires a NHI Java card state machine and the Access Control List of the host. It is different from two-factor authentication cards in four ways: (1) a PIN code is not a must; (2) it requires authentication with the remote IC card Data Centre; (3) the NHI cards are already available, no modification is needed, and there is no further cost for the deployment of the cards; (4) although the cards are in the reader, the communication cannot start unless the cards are in the corresponding states; i.e. the states allow communication. An implementation, on a Microsoft Windows XP platform, demonstrated the system's feasibility over an emulation of the NHI VPN framework. It maintained a high line speed, the driver took up 39 KB of disk space, installation was simple, not requiring any extra hardware or software, and the average packet processing time of the CAF driver measured was 0.3084 ms. The average overhead in comparing the Access Control List predefined routing in card, in an FTP testing experiment, was 5.7 micros (receiving) and 8 micros (sending). PMID:17541860

Huang, Jyh-Win; Hou, Ting-Wei

2007-06-01

184

AUGMENTING C-CARDS WITH MUSIC ACTIONS  

Microsoft Academic Search

The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety of Computer Science concepts. Here a simple extension to c-cards

Andrea Valente; Kirstin Lyon; Kristoffer Jensen

185

Measurement Analysis When Benchmarking Java Card Platforms  

NASA Astrophysics Data System (ADS)

The advent of the Java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the bytecode level. This paper focuses on the validity of our time measurements on smart cards.

Paradinas, Pierre; Cordry, Julien; Bouzefrane, Samia

186

Telephone chip-cards as individual dosemeters  

Microsoft Academic Search

It has been observed that a certain type of telephone chip-card can be used as radiation detectors for individuals exposed to external gamma doses. The radiation dose responses of more than 200 chip-cards, produced by various companies since 1990, were investigated using infrared stimulated luminescence (IRSL). The radiation dose responses of some of the chip-cards were found to be compatible

H. Y. Göksu

2003-01-01

187

Star Deck, Constellations cards and games  

NSDL National Science Digital Library

Introduces students to constellations. Each card is one constellation and each is color coded by season. They fit on 4x6 index cards for handling/play. A guide to the constellations is included which discusses the origin, myths, and astronomical points of interest in each. There are numerous ways to use them in a class. Example: 52 constellations visible in N. Hemisphere, 52 cards with 4 suites (seasons), 3 facecards for each season (zodiac). Game suggestions are included at the site.

188

Lightweight Mobile Credit-Card Payment Protocol  

Microsoft Academic Search

\\u000a Recently, making Internet credit-card payment is widely accepted. Several payment protocols have been proposed to secure the\\u000a credit-card payment on fixed networks. However, these protocols do not apply well to wireless networks due to the limitations\\u000a of wireless devices and wireless networks themselves. In this paper, we propose a simple and powerful credit-card payment\\u000a protocol for wireless networks. We implement

Supakorn Kungpisdan; Bala Srinivasan; Phu Dung Le

2003-01-01

189

System of nano-silver inkjet printed memory cards and PC card reader and programmer  

Microsoft Academic Search

This work describes the development of inkjet printed, low-cost memory cards, and complementary pair of memory card reader and card reader\\/programmer for PCs. This constitutes a complete system that can be used for various applications. The memory cards are manufactured by inkjet printing nano-silver ink on photo paper substrate. The printed memory structures have an initial high resistance that can

Henrik Andersson; Alexandru Rusu; Anatoliy Manuilskiy; Stefan Haller; Suat Ayöz; Hans-Erik Nilsson

2011-01-01

190

Verification of JAVA CARD Applets Behavior with Respect to Transactions and Card Tears  

Microsoft Academic Search

The Java card transaction mechanism allows to protect sensitive operations on smart cards against problems due to card tears or power losses. Statements within a transaction are viewed as a single atomic operation so that either they are all performed or none of them is. KRAKATOA is a tool for static verification of Java programs annotated in JML (Java modeling

Claude Marché; Nicolas Rousset

2006-01-01

191

CARD-8 protein, a new CARD family member that regulates caspase-1 activation and apoptosis.  

PubMed

Caspase-associated recruitment domains (CARD) are protein-protein interaction modules found extensively in proteins that play important roles in apoptosis, NFkappaB activation, and cytokine regulation. In this study we identified a novel human protein, CARD-8, which contains a C-terminal CARD domain with high similarity to the CARD domain of caspase-1/ICE. We demonstrate that CARD-8 interacts physically with caspase-1 and negatively regulates caspase-1-dependent IL-1beta generation in the THP-1 monocytic cell line. CARD-8 binds also to ICEBERG and pseudo-ICE, two other recently identified proteins, which bind to the CARD domain of caspase-1 and negatively regulate its activity. Reverse transcriptase-PCR analysis revealed that CARD-8 is expressed mainly in monocytes, placenta, lymph nodes, and spleen. This pattern of expression is consistent with caspase-1 expression in the same cells and tissues. CARD-8 was also found to negatively regulate NF-kappaB activation by TNF-alpha stimulation and by ectopically expressed RICK, suggesting that this protein may control cell survival. Consistent with these results, stable expression of CARD-8 in U937 or THP-1 cells sensitizes the cells to differentiation-induced apoptosis. Overexpression of CARD-8 can also induce apoptosis in transfected cells. The results suggest that CARD-8 represents a new signaling molecule involved in the regulation of caspase-1 and NF-kappaB activation. PMID:11821383

Razmara, Marjaneh; Srinivasula, Srinivasa M; Wang, Lin; Poyet, Jean-Luc; Geddes, Brad J; DiStefano, Peter S; Bertin, John; Alnemri, Emad S

2002-04-19

192

Interfaces for Personal Identity Verification - Part 2: End-Point PIV Card Application Card Command Interface.  

National Technical Information Service (NTIS)

FIPS 201 defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that the identity credentials must be stored on a smart card. SP 800-73-2 contains techn...

H. Ferraiolo J. F. Dray K. Mehta R. Chandramouli S. B. Guthery W. MacGregor

2008-01-01

193

The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand  

ERIC Educational Resources Information Center

The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year 1 New…

Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

2010-01-01

194

48 CFR 2913.301 - Governmentwide commercial purchase card.  

Code of Federal Regulations, 2013 CFR

... (a) The Government purchase card has far fewer requirements for...the same legal restrictions apply to credit card purchases that apply to other...developing Office/Agency Purchase/Credit Card Program procedures. A number of...

2013-10-01

195

48 CFR 2413.301 - Governmentwide commercial purchase card.  

Code of Federal Regulations, 2013 CFR

...Governmentwide commercial purchase card. (c) HUD's procedures concerning...government-wide commercial purchase card are contained in its Handbook on the Government-wide Commercial Credit Card Program. [60 FR 46155,...

2013-10-01

196

48 CFR 13.301 - Governmentwide commercial purchase card.  

Code of Federal Regulations, 2013 CFR

...using the Governmentwide commercial purchase card shall establish procedures for use and control of the card that comply with the Treasury Financial...terms and conditions of the current GSA credit card contract. Agency procedures should...

2013-10-01

197

77 FR 37558 - Disclosure of Certain Credit Card Complaint Data  

Federal Register 2010, 2011, 2012, 2013

...CFPB-2011-0040] Disclosure of Certain Credit Card Complaint Data AGENCY: Bureau...discretion to publicly disclose certain credit card complaint data that do not include...information. The Bureau receives credit card complaints from consumers...

2012-06-22

198

77 FR 75410 - Request for Information Regarding Credit Card Market  

Federal Register 2010, 2011, 2012, 2013

...Request for Information Regarding Credit Card Market AGENCY: Bureau of Consumer...SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and...review (Review) of the consumer credit card market, within the limits of...

2012-12-20

199

75 FR 32158 - Information Collection; SRS Publications Evaluation Card  

Federal Register 2010, 2011, 2012, 2013

...Service Information Collection; SRS Publications Evaluation Card AGENCY: Forest Service...approved information collection, SRS Publications Evaluation Card. DATES: Comments...SUPPLEMENTARY INFORMATION: Title: SRS Publications Evaluation Card. OMB Number:...

2010-06-07

200

48 CFR 213.301 - Governmentwide commercial purchase card.  

Code of Federal Regulations, 2013 CFR

...for Establishing and Managing Purchase, Travel, and Fuel Card Programsâ at http://www.acq.osd.mil/dpap/pdi/pc/docs/dod_charge_card_guide_20080819.doc. Additional guidance on the fuel card programs is available at...

2013-10-01

201

Specifying Access Control Policies on Data Streams  

Microsoft Academic Search

Many data stream processing systems are increasingly being used to support applications that handle sensitive information,\\u000a such as credit card numbers and locations of soldiers in battleground [1,2,3,6]. These data have to be protected from unauthorized\\u000a accesses. However, existing access control models and mechanisms cannot be adequately adopted on data streams. In this paper,\\u000a we propose a novel access control

Barbara Carminati; Elena Ferrari; Kian-lee Tan

2007-01-01

202

The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers  

ERIC Educational Resources Information Center

This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such…

Cheetham, Mandy

2014-01-01

203

An Open Smart Card Infrastructure for South African e-Services  

Microsoft Academic Search

The emergence of electronic services in South Africa presents a challenge of online identification and effecting payments. The South African government through the Home Affairs National Identification System (HANIS) project has identified the smart card as an ideal technology to develop a secure digital identification and payment tool that will be used in future to access and pay for electronic

P T Nkomo; A Terzoli; H N Muyingi

204

Flexible Peripheral Component Interconnect Input/Output Card  

NASA Technical Reports Server (NTRS)

The Flexible Peripheral Component Interconnect (PCI) Input/Output (I/O) Card is an innovative circuit board that provides functionality to interface between a variety of devices. It supports user-defined interrupts for interface synchronization, tracks system faults and failures, and includes checksum and parity evaluation of interface data. The card supports up to 16 channels of high-speed, half-duplex, low-voltage digital signaling (LVDS) serial data, and can interface combinations of serial and parallel devices. Placement of a processor within the field programmable gate array (FPGA) controls an embedded application with links to host memory over its PCI bus. The FPGA also provides protocol stacking and quick digital signal processor (DSP) functions to improve host performance. Hardware timers, counters, state machines, and other glue logic support interface communications. The Flexible PCI I/O Card provides an interface for a variety of dissimilar computer systems, featuring direct memory access functionality. The card has the following attributes: 8/16/32-bit, 33-MHz PCI r2.2 compliance, Configurable for universal 3.3V/5V interface slots, PCI interface based on PLX Technology's PCI9056 ASIC, General-use 512K 16 SDRAM memory, General-use 1M 16 Flash memory, FPGA with 3K to 56K logical cells with embedded 27K to 198K bits RAM, I/O interface: 32-channel LVDS differential transceivers configured in eight, 4-bit banks; signaling rates to 200 MHz per channel, Common SCSI-3, 68-pin interface connector.

Bigelow, Kirk K.; Jerry, Albert L.; Baricio, Alisha G.; Cummings, Jon K.

2010-01-01

205

Using Graphics Cards for Quantized FEM Computations  

Microsoft Academic Search

Graphics cards exercise increasingly more computing power and are highly optimized for high data transfer vol- umes. In contrast typical workstations perform badly when data exceeds their processor caches. Performance of scien- tific computations very often is wrecked by this deficiency. Here we present a novel approach by shifting the computa- tional load from the CPU to the graphics card.

Martin Rumpf; Robert Strzodka

2001-01-01

206

Tightening Up the I. D. Card System  

ERIC Educational Resources Information Center

Kingsborough Community College, of Brooklyn, New York, has credit-type cards for students and personnel. At registration the college logo is imprinted on the top of the card. Matching photographs are available from a microfiche retrieval system. (Author/MLF)

Edwards, Ralph; Silver, David B.

1976-01-01

207

Credit Card Debt in Ireland: Recent Trends  

Microsoft Academic Search

The rapid build-up of debt by Irish households over the past decade has attracted attention to all aspects of personal borrowing. While most of the increase in personal debt has come from residential mortgages, the ease with which debt can be run up on credit cards makes trends in credit card borrowing of particular interest. The Statistics Department introduced a

John Kelly; Aisling Reilly

2005-01-01

208

State Report Card, 2009-2010  

ERIC Educational Resources Information Center

As part of compliance with with the federal No Child Left Behind Act, this document presents the State Report Card of Arizona for 2009-2010. The report card provides tables relating to percentage of students who passed AIMS in Arizona by subject and grade. The tables shown in this document include: (1) Mathematics Grade 3; (2) Reading Grade 3; (3)…

Arizona Department of Education, 2010

2010-01-01

209

An Excel-lent Card Trick  

ERIC Educational Resources Information Center

Card tricks based on mathematical principles can be a great way to get students interested in exploring some important mathematical ideas. In this article, the author discusses a simple spreadsheet implementation that shows students why the card trick works and allows them to explore several variations. As an added bonus, students are introduced…

Zullo, Holly S.

2011-01-01

210

Rigorous development of Java Card applications  

Microsoft Academic Search

We present an approach to rigorous, tool supported design and de- velopment of Java Card applications. We employ the Unied Modelling Language (UML) and formal methods for object oriented software devel- opment in our approach. Our goal is to make Java Card applications robust \\\\by design\\

Wojciech Mostowski

2002-01-01

211

A Dynamic Logic for Java Card  

Microsoft Academic Search

. In this paper, I describe a Dynamic Logic for Java Card andoutline a sequent calculus for this logic that axiomatises Java Card. Thepurpose of the logic is to provide a framework for software vericationthat can be integrated into real-world software development processes.1 IntroductionDesign principles and goals. The work that is reported in this paper hasbeen carried out as part

Bernhard Beckert

2000-01-01

212

Testing the Java Card Applet Firewall  

Microsoft Academic Search

In this paper we discuss the methodology and results of testing the Java Card applet firewall mechanism. The main motivation for this work is the complexity of the firewall. Given the complexity, non-compliance of the cards with respect to the ocial specification is not unlikely. Firewall implementation faults may lead to serious security issues. Although we did not discover any

Wojciech Mostowski; Erik Poll

2007-01-01

213

Quality Report Cards and Nursing Home Quality  

Microsoft Academic Search

Purpose: This study examined the potential role that publicly disseminated quality report cards can play in improving quality of care in nursing homes. Design and Methods: We review the literature and the experience gained over the last two decades with report cards for hospitals, physicians, and health plans, and consider the issues that are of particular importance in the context

Dana B. Mukamel; William D. Spector

2003-01-01

214

Standards Based Report Cards. Research Brief  

ERIC Educational Resources Information Center

With the increased focus on standards-based education, more and more states, districts and school are becoming interested in standards-based grading and report cards. Hawaii, for example, is a state that is working hard on its "Standards Implementation Design" (SID), including standards-based report cards. As a component of Maine's Local…

Muir, Mike

2005-01-01

215

A Simulation of Coevolution Using Playing Cards  

ERIC Educational Resources Information Center

In this article, the author describes a simulation of a coevolutionary "arms race" and introduce a way of teaching it that lets students use the theory of natural selection to explain the outcomes of the simulation. The simulation uses the numerical cards from an UNO[R] playing card deck to represent the speeds of individuals in populations of…

Tatina, Robert

2007-01-01

216

A HyperCard Map Information System.  

ERIC Educational Resources Information Center

Describes the development of a HyperCard system at the University of Hong Kong that enables users to retrieve information about maps, aerial photos, or satellite images in a particular area of interest. User needs are discussed, and cartobibliographic information contained in the HyperCard stacks is described. (six references) (LRW)

Chu, Chi-King

1991-01-01

217

College Student Performance and Credit Card Usage.  

ERIC Educational Resources Information Center

Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

2001-01-01

218

Cognitive Credit Cards: Acquiring Learning Strategies.  

ERIC Educational Resources Information Center

Describes the Cognitive Credit Card, an individualized approach to helping students with learning disabilities select and apply appropriate learning strategies. The CCC is a credit card-sized laminated set of cognitive or metacognitive cues for a specific topic. Feedback from students, teachers, and parents has been highly positive. (DB)

Edmunds, Alan L.

1999-01-01

219

Helping Consumers Choose a Credit Card.  

ERIC Educational Resources Information Center

A sample of 204 Canadians were presented information in 3 formats--matrix table, summary, and combination--with which to choose an appropriate credit card. Summary ratings of credit cards combined with a table of fees, interest rates, and grace periods reduced information processing efforts and led to better consumer decisions. (SK)

d'Astous, Alain; Miquelon, Diane

1991-01-01

220

Arab Consumers' Behavior Towards Credit Card Usage  

Microsoft Academic Search

Credit card usage by consumers across the oil-rich Arab countries (such as Qatar, Bahrain, and Kuwait) is changing the landscape of consumer behavior, motivating Arab consumers to buy more often, and promoting impulse buying. Our study examines Arab consumers' behavior towards credit card usage from multi-cultural perspective by replicating a western model propounded by Kaynak et al. (1986) and Kaynak

Khalid Al. Sulaiti; Zafar U. Ahmed; Sri Beldona

2006-01-01

221

Smart card industry: a technological system  

Microsoft Academic Search

The aim of this paper is to study smart card industry from a system perspective. This provides three analysis levels. First, it outlines a conceptual approach to the description and analysis of smart card as a complex and diversified technological cluster. Second, it highlights the market structure at three main different levels of downstream\\/upstream relationship. Third, it deals with the

2005-01-01

222

Rethinking the Smart Card Technology, Invited Paper  

Microsoft Academic Search

Creating security architectures and processes that directly interact with consumers, especially in consumer electronics, has to take into account usability, user-experience and skill level. Smart cards provide secure services, even in malicious environments, to end-users with a fairly straightforward limited usage pattern that even an ordinary user can easily deal with. The way the smart card industry achieves this is

Raja Naeem Akram; Konstantinos Markantonakis

2014-01-01

223

CAC3 (MSI1) Suppression of RAS2G19V Is Independent of Chromatin Assembly Factor I and Mediated by NPR1  

Microsoft Academic Search

Cac3p\\/Msi1p, the Saccharomyces cerevisiae homolog of retinoblastoma-associated protein 48 (RbAp48), is a component of chromatin assembly factor I (CAF-I), a complex that assembles histones H3 and H4 onto replicated DNA. CAC3 overexpression also suppresses the RAS\\/cyclic AMP (cAMP) signal transduction pathway by an unknown mechanism. We investigated this mechanism and found that CAC3 suppression of RAS\\/cAMP signal transduction was independent

STEPHEN D. JOHNSTON; SHINICHIRO ENOMOTO; LISA SCHNEPER; MARK C. MCCLELLAN; FLORENCE TWU; NATHAN D. MONTGOMERY; STEVEN A. HANEY; JAMES R. BROACH; JUDITH BERMAN

2001-01-01

224

First-principles study on the surface half-metallicity of CaC in the zinc-blende structure  

Microsoft Academic Search

We investigate the electronic structure and the surface half-metallicity of CaC in the zinc-blende structure by using the first-principles full-potential linearized augmented plane-wave (FPLAPW) method. It is found that the (1 1 0) surface preserves the half-metallic character of the bulk, while in the case of the (0 0 1) surfaces including the Ca-terminated and C-terminated surfaces the surface states

Kailun Yao; Guoying Gao; Zuli Liu

2008-01-01

225

Connection Admission Control CAC and Differentiated Resources Allocation RA in a Low Earth Orbit LEO Satellite Constellation  

Microsoft Academic Search

The Up\\/Down Link UDL of a Low Earth Orbit LEO satellite constellation is a scarce radio resource that needs to be shared efficiently\\u000a between many users with different needs. A suitable Connection Admission Control CAC policy is required. In our study we assume\\u000a that the network handles three types of calls: real time (voice) calls with strict constraints over the

Rima Abi Fadel; Samir Tohmé

2002-01-01

226

Twin laws of whewellite, CaC 2 O 4 ·H 2 O. A structural and growth approach  

Microsoft Academic Search

Both natural and synthetic crystals of whewellite (CaC2O4·H2O, sp.g. P21\\/c) occur commonly as twins. The geometrical, reticular and structural features of the most important twin law, twin plane (100), and the dubious law (\\u000a$$\\\\overline {\\\\text{1}} $$\\u000a01) were investigated. The strict application of the periodic bond chain (PBC) theory (Hartman and Perdok 1955) makes possible the identification of original

Dino Aquilano; Marinella Franchini-Angela

1981-01-01

227

Design and Analysis of Wireless Systems using CAC and M-QAM Adaptive Modulation for Throughput Improvement  

Microsoft Academic Search

In this paper we introduce an effective bandwidth- based Call Admission Control (CAC) with adaptive modulation technique to manage the traffic in a wireless IP-based network. Since the next generation of communication networks will carry different classes of traffic, e.g., voice, video, fax, data and multimedia, over the same network and these different classes of traffic usually require different quality-of-service

Neda Aboutorab; Abbass Mohammadi

2008-01-01

228

Computer-Access-Code Matrices  

NASA Technical Reports Server (NTRS)

Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

Collins, Earl R., Jr.

1990-01-01

229

FPGA mezzanine card DSP module  

NASA Astrophysics Data System (ADS)

Today's most sophisticated real-time control systems, such as the LHC or alike, are facing similar problem of processing terabits per second of raw data generated by the diagnostic systems - where in addition most of the data is useless and only generates an empty burden for computing modules. Many approaches have already been adopted to make the realtime control possible under such circumstances including: parallel computing, modularity and data mining. Furthermore many factors determine the real efficiency of the whole system including: transfer rates between components and modules, "slow" memories or architecture and frequency of computing units. This paper presents a concept of realization, architecture, and hardware implementation of a digital signal processing module utilizing modern technologies, standards and approaches in one single card.

Janicki, Tom; Cieszewski, Rados?aw; Kasprowicz, Grzegorz; Po?niak, Krzystof T.

2011-06-01

230

Insider protection: a report card  

SciTech Connect

Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is not focussing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. We discuss the general trends in insider protection and the limitations of protection measures currently in use. We also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel.

Al-Ayat, R.A.; Judd, B.R.

1986-01-01

231

Insider protection: A report card  

SciTech Connect

Enhanced security measures against external threats (e.g., terrorists, criminals) have been implemented at most facilities that handle special nuclear material, classified information, or other assets critical to national security. Attention is now focusing on insider protection, and safeguards managers are attempting to provide balanced protection against insider and outsider threats. Potential insider threats include attempts by facility employees to steal special nuclear material (SNM), to cause a radiological hazard to the public, to sabotage critical facilities, or to steal property or classified information. This paper presents a report card on the status of insider protection at Department of Energy and Nuclear Regulatory Commission-licensed facilities, with emphasis on SNM theft. The authors discuss the general trends in insider protection and the limitations of protection measures currently in use. They also discuss the most critical needs for improved procedures, technology, analytical tools, and education for safeguards personnel.

Al-Ayat, R.A.; Judd, B.R.

1986-01-01

232

Biochemical and molecular biological characterization of CAC2, the Arabidopsis thaliana gene coding for the biotin carboxylase subunit of the plastidic acetyl-coenzyme A carboxylase.  

PubMed Central

The biotin carboxylase subunit of the heteromeric chloroplastic acetyl-coenzyme A carboxylase (ACCase) of Arabidopsis thaliana is coded by a single gene (CAC2), which is interrupted by 15 introns. The cDNA encodes a deduced protein of 537 amino acids with an apparent N-terminal chloroplast-targeting transit peptide. Antibodies generated to a glutathione S-transferase-CAC2 fusion protein react solely with a 51-kD polypeptide of Arabidopsis; these antibodies also inhibit ACCase activity in extracts of Arabidopsis. The entire CAC2 cDNA sequence was expressed in Escherichia coli and the resulting recombinant biotin carboxylase was enzymatically active in carboxylating free biotin. The catalytic properties of the recombinant biotin carboxylase indicate that the activity of the heteromeric ACCase may be regulated by light-/dark-induced changes in stromal pH. The CAC2 gene is maximally expressed in organs and tissues that are actively synthesizing fatty acids for membrane lipids or oil deposition. The observed expression pattern of CAC2 mirrors that previously reported for the CAC1 gene (J.-K. Choi, F. Yu, E.S. Wurtele, B.J. Nikolau [1995] Plant Physiol 109: 619-625; J. Ke, J.-K. Choi, M. Smith, H.T. Horner, B.J. Nikolau, E.S. Wurtele [1997] Plant Physiol 113: 357-365), which codes for the biotin carboxyl carrier subunit of the heteromeric ACCase. This coordination is probably partially established by coordinate transcription of the two genes. This hypothesis is consistent with the finding that the CAC2 and CAC1 gene promoters share a common set of sequence motifs that may be important in guiding the transcription of these genes.

Sun, J; Ke, J; Johnson, J L; Nikolau, B J; Wurtele, E S

1997-01-01

233

Advanced access control system  

SciTech Connect

A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described.

Barnes, L.D.; King, R.W.

1980-02-01

234

Photocatalytic degradation of an azo dye Sunset Yellow under UV-A light using TiO2/CAC composite catalysts  

NASA Astrophysics Data System (ADS)

The photocatalytic activity and the promoting effect of titania (TiO2) by commercial activated carbon (CAC) for removing the pollutant in wastewater were investigated. The TiO2/CAC composite photocatalysts with various ratios of CAC to TiO2 were prepared by sol-gel method. The catalyst was characterized by X-ray diffraction (XRD), high resolution scanning electron microscope (HR-SEM), energy dispersive spectra (EDS), diffuse reflectance spectra (DRS), photoluminescence spectra (PL), X-ray photoelectron spectroscopy (XPS) and Brunauer-Emmett-Teller (BET) surface area measurement methods. The photocatalytic activity of TiO2/CAC was investigated for the degradation of Sunset Yellow (SY) in aqueous solution using UV-A light. The TiO2/CAC is found to be more efficient than prepared TiO2 and TiO2-P25 at pH 7 for the mineralization of SY. The synergism between TiO2 and CAC may increase the catalytic activity. The effects of operational parameters such as the amount of photocatalyst, dye concentration and initial pH on photo mineralization of SY have been analyzed. The mineralization of SY has been confirmed by COD measurements. The catalyst is found to be reusable.

Rajamanickam, D.; Shanthi, M.

2014-07-01

235

Photocatalytic degradation of an azo dye Sunset Yellow under UV-A light using TiO2/CAC composite catalysts.  

PubMed

The photocatalytic activity and the promoting effect of titania (TiO2) by commercial activated carbon (CAC) for removing the pollutant in wastewater were investigated. The TiO2/CAC composite photocatalysts with various ratios of CAC to TiO2 were prepared by sol-gel method. The catalyst was characterized by X-ray diffraction (XRD), high resolution scanning electron microscope (HR-SEM), energy dispersive spectra (EDS), diffuse reflectance spectra (DRS), photoluminescence spectra (PL), X-ray photoelectron spectroscopy (XPS) and Brunauer-Emmett-Teller (BET) surface area measurement methods. The photocatalytic activity of TiO2/CAC was investigated for the degradation of Sunset Yellow (SY) in aqueous solution using UV-A light. The TiO2/CAC is found to be more efficient than prepared TiO2 and TiO2-P25 at pH 7 for the mineralization of SY. The synergism between TiO2 and CAC may increase the catalytic activity. The effects of operational parameters such as the amount of photocatalyst, dye concentration and initial pH on photo mineralization of SY have been analyzed. The mineralization of SY has been confirmed by COD measurements. The catalyst is found to be reusable. PMID:24662758

Rajamanickam, D; Shanthi, M

2014-07-15

236

Australian healthcare: a smart card for a clever country  

Microsoft Academic Search

In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone

S. Morris; J. Cooper; D. Bomba; L. Brankovic; M. Miller; F. Pacheco

1995-01-01

237

Malicious Code on Java Card Smartcards: Attacks and Countermeasures  

Microsoft Academic Search

When it comes to security, an interesting dierence between Java Card and regular Java is the absence of an on-card bytecode ver- ifier on most Java Cards. In principle this opens up the possibility of malicious, ill-typed code as an avenue of attack, though the Java Card platform oers some protection against this, notably by code signing. This paper gives

Wojciech Mostowski; Erik Poll

2008-01-01

238

Automatic Test Generation for Java-Card Applets  

Microsoft Academic Search

Open-cards have introduced a new life cycle for smart card embedded applications. In the case of Java Card, they have raised the problem of embedded object-oriented applet validation. In this article, we describe a methodology for Java Card applet verification, and its application on a case study. This methodology is based on automatic test generation. We first take benefits of

Hugues Martin; Lydie Du Bousquet

2000-01-01

239

75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...  

Federal Register 2010, 2011, 2012, 2013

...pertaining to personnel, medical, and dental issues that impact the PIP Program...Component-specific CAC personal identification number (PIN) reset workstations. (10) To the maximum...capability for a CAC holder to reset or unlock PINs from a system outside of the CAC...

2010-08-06

240

User's manual for the DAD-1 data acquisition daughter board for the SuperCard-2  

SciTech Connect

A detailed description of how to use the DAD-1 data acquisition daughter board is given. The DAD-1 daughter board is used with the SuperCard-2, a VME format processor board manufactured by CSP Inc. that is based on the Intel i860 microprocessor. The daughter board provides high speed acquisition of digital data through a general purpose input port. Data are transferred through direct memory access operations to the memory on the SuperCard-2 board at a rate up to 40 million, 14 bit samples per second. A first-in, first-out memory is used to buffer the data during the transfer. Several different data acquisition operating modes are available that make a combination of a SuperCard-2 processor board and a DAD-1 daughter board suitable for a wide range of real time data analysis and feedback control functions.

Ferron, J.R.

1993-05-01

241

Secured Smart Card Using Palm Vein Biometric On-Card-Process  

Microsoft Academic Search

The biometric on-card-process solution used on the smart card has a potential for high security with greatly minimized fraud risks in financial sector. In this paper we discuss the palm vein biometric system and its compatibility in financial sector, software design for on-card-processing solution based on Java virtual machine. The solution is stimulated and the result obtained and that was

R. Jeyaprakash; Jin Lee; S. Biswas; J. M. Kim

2008-01-01

242

Providing longitudinal health care information with the new German Health Card--a pilot system to track patient pathways.  

PubMed

The paper describes an application system that employs the new German Health Card to provide a technical solution for tracking patient pathways. The aim is to improve the flow and availability of health care information. We used standard software components and technologies in order to facilitate interoperability with multiple system platforms and allow for customizing as the specification process for the German Health Card is not yet completed. Every health care provider contact is recorded on the card and associated medical documents are stored in a central database and can be retrieved via Web Services running on a central application server. The patient pathway can thus be chronologically tracked by the clinician and relevant longitudinal information is made accessible quickly. Our system for tracking patient pathways with the new German Health Card can be regarded as a first example of its great future potential. PMID:16458996

Marschollek, Michael; Demirbilek, Edip

2006-03-01

243

Petersburg Public Library Card Catalog Collection Index  

NSDL National Science Digital Library

The Library of Virginia (LVA) (last discussed in the June 18, 1999 Scout Report) has added a digitized card index to newspapers held by the Library (predominantly from Petersburg), covering the years 1797 to 1877. One of the most complete local newspaper indexes in Virginia, the index is comprised of 43,810 typed 3 x 5 cards which cover local events, including the period of reconstruction following the Civil War, in great detail. The subjects of the articles indexed on the cards are listed alphabetically on one long page. Each entry card contains the following information: Main index entry: the subject of the newspaper article indexed; Subheading: additional information about the article; and Reference line: date, city, name of newspaper, page, and column number. A listing of newspapers covered by the index and their respective date ranges and microfilm numbers at the LVA is also available.

1999-01-01

244

Educational Card Games for Understanding Gastrointestinal Physiology.  

ERIC Educational Resources Information Center

Presents the rules for two educational card-games that provide an opportunity to integrate, analyze, and interpret basic concepts in gastrointestinal physiology. Enhances students' abilities to apply and synthesize. (DDR)

Odenweller, Cynthia M.; Hsu, Christopher T.; DiCarlo, Stephen E.

1998-01-01

245

Dot Card and Ten Frame Activities  

NSDL National Science Digital Library

This 37-page pdf provides background information and teaching activities for developing young children's number sense. The document includes instructions and printable materials for using dot cards, five frames, and ten frames.

Kolson, Kara; Mole, Suzanne; Silva, Manuel

2006-01-01

246

College Student Credit Card Usage and Debt.  

ERIC Educational Resources Information Center

Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

Rybka, Kathryn M.

2001-01-01

247

Health smart cards: merging technology and medical information.  

PubMed

Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed. PMID:12627691

Ward, Sherry R

2003-01-01

248

High performance annotation-aware JVM for Java cards  

Microsoft Academic Search

Early applications of smart cards have focused in the area of personal security. Recently, there has been an increasing demand for networked, multi-application cards. In this new scenario, enhanced application-specific on-card Java applets and complex cryptographic services are executed through the smart card Java Virtual Machine (JVM). In order to support such computation-intensive applications, contemporary smart cards are designed with

Ana Azevedo; Arun Kejariwal; Alexander V. Veidenbaum; Alexandru Nicolau

2005-01-01

249

Correlates of credit card ownership in men and women.  

PubMed

In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership. PMID:16173358

Yang, Bijou; Lester, David

2005-06-01

250

Anonymous credentials on a standard java card  

Microsoft Academic Search

Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time user-centric identity management gains acceptance. Anonymous credential schemes are the optimal realization of user-centricity. However, on inexpensive hardware platforms, typically used for eID cards, these schemes could not be made to meet the necessary requirements such as future-proof key lengths and transaction times on

Patrik Bichsel; Jan Camenisch; Thomas Groß; Victor Shoup

2009-01-01

251

Development of access controller based on dual-CPU design  

Microsoft Academic Search

In order to improve reliability and speediness of access control system, in hardware design, the shortcomings of access controller with a CPU is analyzed in this paper. The core module of the hardware system is designed based on two microcontrollers. In software design, main program and subprogram are programmed according to coordinate and independent mode. The card reader controlling, door

He Pei-Chong; Chen Xiang-Guang; Xie Hua-Biao

2011-01-01

252

[Professional health cards (CPS): informatic health care system in France].  

PubMed

The Professional Health Card Public interest group (Groupement d'Intérêt Public-Carte de professionnel de Santé (GIP-CPS)) was founded in 1993 as a joint initiative by the different parties involved in health care in France: the state, the representatives of the health care professions and the compulsory and complementary health insurance organizations. The CPS system enables safe exchange and electronic sharing of medical data. Via Intranet connections and Extranet hosting of medical files, databases, the CPS system enables health care professionals who access servers to be identified with certainty. For email exhanges, the CPS systems guarantees the sender's identity and capacity. The electronic signature gives legal value to the email. The system also enables confidential email. The health card system (CPS) contributes to making the health service efficient. Shared medical files, health care networks, health warning systems or electronic requests for reimbursement of health insurance expenses all use the CPS system. More than 300,000 health care professionals use it regularly. The freedom of movement of patients throughout Europe has led to the growth of exchanges and information sharing between health professionals in the States of the Union. More and more health professionals will be leaving their own countries to work in foreign countries in the future. It is essential that their freedom of movement is accompanied by the ability to prove their rights to practice. PMID:16385785

Fortuit, P

2005-09-01

253

Medicare beneficiary knowledge of and experience with prescription drug cards.  

PubMed

Medicare beneficiaries used prescription drug discount cards, both Medicare and non-Medicare cards, to assist them in paying for the cost of prescription drugs. This article describes the beneficiary's awareness and understanding, sources of information, and experience with drug discount cards a year prior and during the implementation of the Medicare-Approved Prescription Drug Discount Card program. Also, it explores beneficiary characteristics that contribute to card ownership and knowledge about drug discount cards. Understanding these experiences and factors can inform future outreach and education campaigns for the Medicare Drug Coverage program. PMID:18624082

Rudolph, Noemi V; Williams, Sunyna S

2007-01-01

254

Laparoscopic treatment of celiac axis compression syndrome (CACS) and hiatal hernia: Case report with bleeding complications and review?  

PubMed Central

INTRODUCTION Median arcuate ligament (MAL) malposition is a rare cause of celiac axis compression syndrome (CACS) or Dunbar syndrome. PRESENTATION OF CASE A 26-year-old female presented with severe postprandial epigastric pain, weight loss, heartburn and regurgitation unresponsive to medical therapy. CT angiography and duplex ultrasound demonstrated the MAL crossing anterior to the celiac artery (CA). Reconstructions demonstrated CA compression, while the superior mesenteric artery (SMA) was normal. The MAL was laparoscopically divided, releasing the celiac axis. A concomitant Nissen fundoplication was performed. At 3-months follow-up, the CT-scan demonstrated no evidence of CACS with complete symptom resolution. DISCUSSION Dunbar's syndrome can be treated with endovascular surgery, laparoscopic MAL division or vascular surgery.Six anatomical and morphologic variations of aortic and esophageal hiatus are described. The result of the analysis of these anatomical data leads to the conclusion that hiatus hernia, Dunbar's syndrome and GERD have a common etiopathogenesis and physiopathology. CONCLUSION Laparoscopic treatment is useful and feasible in centers with experience in majorlaparoscopic surgery with reduced invasiveness, better cosmetic effect and shorter postoperative course.

di Libero, Lorenzo; Varricchio, Antonio; Tartaglia, Ernesto; Iazzetta, Igino; Tartaglia, Alberto; Bernardo, Antonella; Bernardo, Rosanna; Triscino, Giovangiuseppe; Conte, Domenico Lo

2013-01-01

255

Aspects of the Problems of Bibliographic Access to University Library Collections.  

ERIC Educational Resources Information Center

Problems of providing bibliographic access to university library-based information sources are discussed with focus upon bibliographies, card and union catalogs, and library classification schemes. (Author/MBR)

Aguolu, C. C.

1979-01-01

256

Western Silent Films Lobby Card Collection  

NSDL National Science Digital Library

For decades, movie theaters were able to draw people in for a closer look at their current offerings via the use of large posters and lobby cards. For those who are intrigued by such advertising devices, Yale University's Beinecke Rare Book & Manuscript Library has digitized this fine collection of lobby cards designed to promote silent and western films in the first several decades of the 20th century. Visitors can view all 106 items here, and, all told, they promote a grand total of 68 different films. It's easy enough to perform a keyword search across all of the images, or visitors can see all of the images at one time. To get started, take a look at the rather dramatic image for "The Mollycoddle" and the tense scene depicted on the card for "The Bandit Buster". Visitors can zoom in on each image, and it's fun to scan through the details.

257

The Use of University Debit Cards for Purchasing Cigarettes: An Opportunity for Tobacco Use Prevention on University Campuses  

ERIC Educational Resources Information Center

Aims: Young adults have the highest smoking rate of any age group in the United States. However, little is known about how young adults, including college students, access and pay for cigarettes--important information for guiding policies and prevention and intervention efforts. This study examined students' use of university debit cards, which…

Lazev, Amy B.; Norton, Tina R.; Collins, Bradley; Ma, Grace; Miller, Suzanne

2012-01-01

258

7 CFR 274.10 - Use of identification cards and redemption of coupons by eligible households.  

Code of Federal Regulations, 2010 CFR

...issuance. In areas not designated by FNS as requiring Photo ID cards, the ID card shall contain space...with authorization documents or coupons. (b) Photo ID cards. (1) Photo ID cards shall be issued in those project...

2009-01-01

259

7 CFR 274.10 - Use of identification cards and redemption of coupons by eligible households.  

Code of Federal Regulations, 2010 CFR

...issuance. In areas not designated by FNS as requiring Photo ID cards, the ID card shall contain space...with authorization documents or coupons. (b) Photo ID cards. (1) Photo ID cards shall be issued in those project...

2010-01-01

260

Deep Dermatophytosis and Inherited CARD9 Deficiency  

PubMed Central

BACKGROUND Deep dermatophytosis is a severe and sometimes life-threatening fungal infection caused by dermatophytes. It is characterized by extensive dermal and subcutaneous tissue invasion and by frequent dissemination to the lymph nodes and, occasionally, the central nervous system. The condition is different from common superficial dermatophyte infection and has been reported in patients with no known immunodeficiency. Patients are mostly from North African, consanguineous, multiplex families, which strongly suggests a mendelian genetic cause. METHODS We studied the clinical features of deep dermatophytosis in 17 patients with no known immunodeficiency from eight unrelated Tunisian, Algerian, and Moroccan families. Because CARD9 (caspase recruitment domain–containing protein 9) deficiency has been reported in an Iranian family with invasive fungal infections, we also sequenced CARD9 in the patients. RESULTS Four patients died, at 28, 29, 37, and 39 years of age, with clinically active deep dermatophytosis. No other severe infections, fungal or otherwise, were reported in the surviving patients, who ranged in age from 37 to 75 years. The 15 Algerian and Tunisian patients, from seven unrelated families, had a homozygous Q289X CARD9 allele, due to a founder effect. The 2 Moroccan siblings were homozygous for the R101C CARD9 allele. Both alleles are rare deleterious variants. The familial segregation of these alleles was consistent with autosomal recessive inheritance and complete clinical penetrance. CONCLUSIONS All the patients with deep dermatophytosis had autosomal recessive CARD9 deficiency. Deep dermatophytosis appears to be an important clinical manifestation of CARD9 deficiency. (Funded by Agence Nationale pour la Recherche and others.)

Vincent, Quentin B.; Liu, Luyan; Cypowyj, Sophie; Prando, Carolina; Migaud, Melanie; Taibi, Lynda; Ammar-Khodja, Aomar; Stambouli, Omar Boudghene; Guellil, Boumediene; Jacobs, Frederique; Goffard, Jean-Christophe; Schepers, Kinda; del Marmol, Veronique; Boussofara, Lobna; Denguezli, Mohamed; Larif, Molka; Bachelez, Herve; Michel, Laurence; Lefranc, Gerard; Hay, Rod; Jouvion, Gregory; Chretien, Fabrice; Fraitag, Sylvie; Bougnoux, Marie-Elisabeth; Boudia, Merad

2014-01-01

261

High density electrical card connector system  

SciTech Connect

An electrical circuit board card connection system is disclosed which comprises a wedge-operated locking mechanism disposed along an edge portion of the printed circuit board. An extrusion along the edge of the circuit board mates with an extrusion fixed to the card cage having a plurality of electrical connectors. The connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned and the wedge inserted. The disclosed connection system is a simple solution to the need for a greater number of electrical signal connections.

Haggard, J.E.; Trotter, G.R.

2000-02-29

262

North American Endangered Amphibians Card Game  

NSDL National Science Digital Library

In this activity, learners can play two card games related to endangered species, specifically North American amphibians. In version one, "Guess My Amphibian," a learner secretly selects a card and players take turns asking yes-or-no questions to identify the mystery amphibian. In version two, "Guess My Rule," a learner selects a secret rule about amphibians and players try to identify the rule. For an extra challenge, use string circles to form a Venn Diagram that players can use to sort the amphibians and play a more challenging version of "Guess My Rule."

Terc; Zoo, Omaha'S H.; Services, Institute O.

2012-12-20

263

High density electrical card connector system  

DOEpatents

An electrical circuit board card connection system is disclosed which comprises a wedge-operated locking mechanism disposed along an edge portion of the printed circuit board. An extrusion along the edge of the circuit board mates with an extrusion fixed to the card cage having a plurality of electrical connectors. The connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned and the wedge inserted. The disclosed connection system is a simple solution to the need for a greater number of electrical signal connections.

Haggard, J. Eric (Elgin, IL); Trotter, Garrett R. (Aurora, IL)

2000-01-01

264

Inexpensive Data Acquisition with a Sound Card  

NASA Astrophysics Data System (ADS)

Signal generators, oscilloscopes, and data acquisition (DAQ) systems are standard components of the modern experimental physics laboratory. The sound card, a built-in component in the ubiquitous personal computer, can be utilized for all three of these tasks1,2 and offers an attractive option for labs in developing countries such as ours--Pakistan--where affordability is always of prime concern. In this paper, we describe in a recipe fashion how the sound card is used for DAQ and signal generation.

Hassan, Umer; Pervaiz, Saad; Anwar, Muhammad Sabieh

2011-12-01

265

Predicting the number of credit cards held by college students.  

PubMed

In a sample of 186 undergraduate students, the number of credit cards they held was associated with sex, their affective attitude toward credit cards, and an attitude of being careful with money. PMID:11824735

Yang, B; Lester, D

2001-12-01

266

Credit Cards: Marketing to College Students Appears to Have Declined.  

National Technical Information Service (NTIS)

Institutions of higher education, alumni groups, and other affiliated organizations may enter into agreements with credit card issuers for college affinity cards, in which issuers use the institution's name or logo in exchange for payments. Separately, so...

2014-01-01

267

Smart Card Operating Systems: Past, Present and Future  

Microsoft Academic Search

Over the last twenty years, the software in smart cards has radically changed. This has happened for several reasons, smart card software was initially rigid and monolithic and has now become more flexible with a clear separation between \\

Damien Deville; Antoine Galland; Gilles Grimaud; Sebastien Jean

2003-01-01

268

76 FR 76475 - Employment Network (EN) Report Card  

Federal Register 2010, 2011, 2012, 2013

...Docket No. SSA-2011-0096] Employment Network (EN) Report Card AGENCY: Social Security...Revised Ticket to Work Consumer Employment Network Report Card...recipients, advocates, employment networks (ENs), other professionals, and...

2011-12-07

269

Intelligent Non-Volatile Memory for Smart Cards  

Microsoft Academic Search

Plastic cards with an imbedded semiconductor chip, which is of the same size as the most frequently used credit or check cards, are in the process of radically changing the world of finance and security system.

Robert DeFrancesco; H. Schrenk

1986-01-01

270

12 CFR 226.12 - Special credit card provisions.  

...2014-01-01 2014-01-01 false Special credit card provisions. 226.12 Section 226.12... TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit...

2014-01-01

271

12 CFR 1026.12 - Special credit card provisions.  

...2014-01-01 2014-01-01 false Special credit card provisions. 1026.12 Section 1026... TRUTH IN LENDING (REGULATION Z) Open-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit...

2014-01-01

272

Optical Verification Laboratory Demonstration System for High Security Identification Cards.  

National Technical Information Service (NTIS)

Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriv...

B. Javidi

1997-01-01

273

Use of the International Merchant Purchase Authorization Card.  

National Technical Information Service (NTIS)

The Principal Deputy Under Secretary of Defense (Logistics) and the Program Manager, DoD Purchase Card Program Management Office, requested the audit to identify impediments to use of the International Merchant Purchase Authorization Card for purchases of...

1999-01-01

274

Free-space optics for high-speed reconfigurable card-to-card optical interconnects  

NASA Astrophysics Data System (ADS)

High-speed card-to-card optical interconnects are highly demanded in high-performance computing and data centers. Compared with other solutions, free-space optical interconnects have the capability of providing both reconfigurability and flexibility. In this paper we propose and experimentally demonstrate a free-space based reconfigurable optical interconnect architecture and it is capable of connecting cards located both inside the same rack as well as in different racks. Results show that 3×10 Gb/s data transmission is achieved with a worst-case receiver sensitivity better than -9.38 dBm.

Wang, Ke; Nirmalathas, Ampalavanpillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

2013-09-01

275

The cumulative analgesic consumption score (CACS): evaluation of a new score to describe postsurgical analgesic consumption as a surrogate parameter for postoperative pain and invasiveness of surgical procedures.  

PubMed

Objective: To validate and evaluate the applicability of a new score to describe postsurgical analgesic consumption in urological and surgical patients across different categories of pain medications and the invasiveness of medical interventions. Materials and Methods: The cumulative analgesic consumption score (CACS) was determined for two cohorts of patients split into three groups with surgeries involving clinically distinct levels of invasiveness (n = 2 x 60). Nonparametric statistical analyses were performed to determine differences between the CACS among the different groups and to assess the correlation between CACS and numeric rating scale (NRS) values for pain intensity. Results: The score was determined for postoperative days 1 and 2 and revealed median scores of 0 (0-11), 3 (0-22) and 10 (6-17) for UA (urological patients from group A), UB (group B) and UC (group C), respectively, and 4 (0-20), 8 (0-38) and 17 (7-68) for SA (surgical patients from group A, SB (group B) and SC (group C), respectively. CACS enabled reliable differentiation between groups involving different levels of invasiveness (p < 0.001). CACS and peak NRS values showed variable degrees of correlation, as expressed by levels of significance ranging from p < 0.001 to p = 0.34 (NS). Conclusions: The CACS is a valid and easily applicable tool to describe postsurgical analgesic consumption in urological and surgical patients. It can be used as a surrogate parameter to assess postsurgical pain and the invasiveness of surgical procedures. These aspects may be measured to compare surgical procedures, in both clinical trials and clinical practice settings. PMID:25010299

Schoenthaler, Martin; Miernik, Arkadiusz; Offner, Klaus; Karcz, Wojciech Konrad; Hauschke, Dieter; Sevcenco, Sabina; Kuehhas, Franklin Emmanuel; Bach, Christian; Buchholz, Noor; Wilhelm, Konrad

2014-01-01

276

25 CFR 11.422 - Unauthorized use of credit cards.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422...11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining...

2013-04-01

277

Regulations and Competition in Credit Card Market in Turkey  

Microsoft Academic Search

Turkish credit card market experienced a strong growth with the establishment of stability in the economy and the decline in the inflation rate after 2001 crisis. Turkey became the 3rd biggest market in Europe with 32 million credit cards in 2006. However, the quick response of the credit card interest rates to the increase in the cost of funds during

Gazi I. Kara; Ahmet Faruk Aysan; Levent Yildiran; Ahmet Nusret Müslim; Umut Dur

278

Data mining for credit card fraud: A comparative study  

Microsoft Academic Search

Credit card fraud is a serious and growing problem. While predictive models for credit card fraud detection are in active use in practice, reported studies on the use of data mining approaches for credit card fraud detection are relatively few, possibly due to the lack of available data for research. This paper evaluates two advanced data mining approaches, support vector

Siddhartha Bhattacharyya; Sanjeev Jha; Kurian K. Tharakunnel; J. Christopher Westland

2011-01-01

279

Credit Card Fraud Detection Using Hidden Markov Model  

Microsoft Academic Search

Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in credit card transaction processing using

Abhinav Srivastava; Amlan Kundu; Shamik Sural; Arun K. Majumdar

2008-01-01

280

Returns To Information Search: Consumer Credit Card Shopping Decisions  

Microsoft Academic Search

Interest rate competition and risk-based pricing have created wide price dispersions in credit card interest rates. In this environment, searching for price information on credit cards is critical for many consumers, especially revolvers. Using the 1995 Survey of Consumer Finances, payoff to consumers' search was estimated. A measure of potential savings was calculated based on the range of credit card

Jinkook Lee; Jeanne M. Hogarth

281

76 FR 3180 - Market Test of Gift Cards  

Federal Register 2010, 2011, 2012, 2013

...647] Market Test of Gift Cards AGENCY: Postal Regulatory...via the Commission's Filing Online system at http://www...loaded with a specified sum of money which can be sent as a gift...Service indicates that the gift cards will comply with the Credit Card Accountability,...

2011-01-19

282

Using Baseball Card Prices to Measure Star Quality and Monopsony  

Microsoft Academic Search

Baseball card prices are used to capture star quality in a new measure of productivity in Major League Baseball. Star quality, which impacts revenues, is determined from a player's baseball card price as the residual in a fit of card prices to performance statistics. This measure is entered into the computation of individual player marginal revenue product and compared to

Charles J. Mullin; Lucia F. Dunn

2002-01-01

283

Credit Card Attitudes and Behaviors of College Students  

ERIC Educational Resources Information Center

At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

2005-01-01

284

Using Coq to Verify Java Card Applet Isolation Properties  

Microsoft Academic Search

This paper reports on the use of the Coq proof assistant for the formal verication of applet isolation properties in Java Card technology. We focus on the conden tiality property. We show how this property is veried by the card manager and the APIs, extending our former proof addressing the Java Card virtual machine. We also show how our verication

June Andronick; Boutheina Chetali; Olivier Ly

2003-01-01

285

Cool Moves: Teaching Geography and History with HyperCard.  

ERIC Educational Resources Information Center

Discusses a project developed using HyperCard to teach geography and history. Describes research of weather patterns and corresponding historical accounts; HyperCard's capabilities for producing animated maps to display information; and the effectiveness of HyperCard as a teaching tool, including its flexible use as a lecture display tool or in a…

Adams, Richard C.

1995-01-01

286

High density printed electrical circuit board card connection system  

Microsoft Academic Search

A zero insertion\\/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit

Baumbaugh; Alan E

1997-01-01

287

AUTOMATED PROCESS PLANNING FOR PRINTED CIRCUIT CARD ASSEMBLY  

Microsoft Academic Search

Printed circuit card assemblies form the core of a vast array of contemporary manufactured products. The technologies for assembling printed circuit cards require a hierarchy of complex decisions for grouping card types and processes, staging components at assembly machines, arranging feeders, and sequencing placement operations. This paper is motivated by the largely unmet needs of industrial process planners for computer

L. F. MCGINNIS; J. C. AMMONS; M. CARLYLE; L. CRANMER; G. W. DEPUY; K. P. ELLIS; C. A. TOVEY; H. XU

1992-01-01

288

Embedded test for a new memory-card architecture  

Microsoft Academic Search

Requirements for a new Cray Inc. computer system mean that the system's memory cards have high-speed SerDes interfaces and multiple memory controllers in a semicustom IC close to the memory chips. As a result, the functionality of a card is much greater than is current practice, and the cards can not be connected to existing memory testers. An embedded test

D. Resnick

2004-01-01

289

A Preliminary Examination of Tool Markings on Flash Memory Cards  

Microsoft Academic Search

Abstract Flash Memory Cards including Smart Media Cards, Sony Memory Sticks and other formats are currently used in a variety of devices including personal digital assistants, digital cameras, portable music and voice recording products. From a forensic viewpoint, it may often be necessary to demonstrate that a particular card has been used in a particular device. Sometimes,this might be achieved

Chris Hu

2004-01-01

290

The Failure of Competition in the Credit Card Market  

Microsoft Academic Search

The bank credit card market, containing 4,000 firms and lacking regulatory barriers, casually appears to be a hospitable environment for the model of perfect competition. Nevertheless, this article reports that credit card interest rates have been exceptionally sticky relative to the cost of funds. Moreover, major credit card issuers have persistently earned from three to five times the ordinary rate

Lawrence M Ausubel

1991-01-01

291

Meeting Mathematics Standards with a Deck of Playing Cards  

ERIC Educational Resources Information Center

The activities contained in this document have been presented at several conference sessions. Participants engaged in hands-on activities for Grades 3 through 8 that utilized a deck of playing cards to meet mathematics content and process standards. Activities included variations of card games, but with a mathematical twist, and other card-based…

McAllister, Deborah A.; McDonald, Shirley A.; Bothman, Susan M.

2010-01-01

292

Credit Cards and College Students: Who Pays, Who Benefits?  

ERIC Educational Resources Information Center

Survey of college students who managed credit cards wisely and those who did not (N=310), revealed that responsible users were more likely to have acquired credit cards before matriculating in college. Discusses implications for future personal-debt management and for institutions of higher education with regard to credit-card vendors. (EMK)

Munro, Jennifer; Hirt, Joan B.

1998-01-01

293

SMALL WORLD CHARACTERISTICS OF INNOVATIVE SMART CARD NETWORKS  

Microsoft Academic Search

The paper examines the evolving innovative network structure in the smart card industry between 1992 and 2006. The aim is to search for sub-groups within the main network which allowed better understanding of the global innovative network structure and the speed of the smart card innovation system. Based on a proprietary database covering inter-firm agreements in the smart card industry,

ZOUHAÏER MCHIRGUI

2010-01-01

294

Flip chip method in smart card\\/smart label packaging  

Microsoft Academic Search

Smart card has been used widely in telecom, finance, communication, society assurance, bank public security and other fields due to it's properties of international standard, intelligent and safety. It is no doubt that China will come to be the biggest application market of smart card soon in the world and there is great potential for the development of smart card

Feng Wufeng

2003-01-01

295

BOAT adaptive credit card fraud detection system  

Microsoft Academic Search

Fraud is increasing with the extensive use of internet and the increase of online transactions. More advanced solutions are desired to protect financial service companies and credit card holders from constantly evolving online fraud attacks. The main objective of this paper is to construct an efficient fraud detection system which is adaptive to the behavior changes by combining classification and

K. K. Sherly; R. Nedunchezhian

2010-01-01

296

North Carolina Child Health Report Card, 2000.  

ERIC Educational Resources Information Center

This sixth annual report card is produced to heighten awareness of the health of the children of North Carolina by summarizing important child health indicators. The report is intended to assist health administrators, legislators, and family advocates in their efforts to improve the health and safety of children statewide. Data are presented for…

North Carolina Child Advocacy Inst., Raleigh.

297

Specifying JAVA CARD API in OCL  

Microsoft Academic Search

We discuss the development of an OCL specification for the JAVACARD API. The main purpose of this specification is to support and aid the verification of JAVA CARD programs in the KeY system. The main goal of the KeY system is to inte- grate object oriented design and formal methods. The already existing specification written in JML (JAVA Modelling Language)

Daniel Larsson; Wojciech Mostowski

2004-01-01

298

A Persistent Memory Management in Java Card  

Microsoft Academic Search

EEPROM as persistent memory in smart card has some different features with other memories. It consists of the pages with a fixed size and has the characteristics due to them. It is more efficient to consider them and to handle EEPROM by page than to think of it as a seamless space and to deal with it as one large

IM Y. JUNG; SUNG I. JUN; KYO I. CHUNG

299

A Primer on Automating the Card Catalog.  

ERIC Educational Resources Information Center

Provides some basic guidelines for converting a card catalog to a computerized catalog in school libraries. The advantages of using the MARC format are discussed, and three conversion methods (on site, records created by the vendor off site, and full vendor conversion off site) are compared in terms of the work involved, costs, and time. (CLB)

Skapura, Robert

1990-01-01

300

Artist Trading Cards: Connecting with Other Communities  

ERIC Educational Resources Information Center

Creating and exchanging Artist Trading Cards (ATCs) has been a rapidly growing trend. These miniature works of art are fun to make--and even more fun to share. The intrigue of developing these handmade treasures begins with the intent of creating art simply for the love of art. In this article, the author describes how her students made their…

Bovio, Deborah

2011-01-01

301

CARISPLAN Procedure Manual: Institutional Author Record Card.  

ERIC Educational Resources Information Center

This manual outlines the prescribed format and content of an institutional author record card, which forms the basis of the CARISPLAN (Caribbean Information System for Economic and Social Planning) Institutional Author Authority File used in conjunction with the databases of the United Nations (UN) Economic Commission for Latin America (ECLA).…

United Nations Economic Commission for Latin America, Port-of-Spain (Trinadad). Caribbean Documentation Centre.

302

Secret History of the Credit Card  

NSDL National Science Digital Library

As one of America's most popular holiday songs goes, "It's the most wonderful time of the year". Well, that may be true until those staggering credit card bills come due in January, and in some cases, for many months afterwards. Taking a critical look at the credit card industry, the television program Frontline (working jointly with The New York Times) has created this revealing investigation into the techniques used by the industry to earn record profits and also to successfully get consumers to take on more debt. Visitors can watch the program in its entirety here, and then they should definitely proceed to read "Eight Things a Credit Card Should Know", and continue on to examine a section of important interviews conducted with such persons as Senator Chris Dodd, a senior Democratic member of the Senate Banking Committee, and Walter Wriston, who served as the chairman and CEO of Citicorp/Citibank for 17 years. This very important website is rounded out by a credit card quiz, a teacher's guide, and a place to leave feedback and comments on the program.

303

Inexpensive Data Acquisition with a Sound Card  

ERIC Educational Resources Information Center

Signal generators, oscilloscopes, and data acquisition (DAQ) systems are standard components of the modern experimental physics laboratory. The sound card, a built-in component in the ubiquitous personal computer, can be utilized for all three of these tasks and offers an attractive option for labs in developing countries such as…

Hassan, Umer; Pervaiz, Saad; Anwar, Muhammad Sabieh

2011-01-01

304

North Carolina Child Health Report Card, 2001.  

ERIC Educational Resources Information Center

This seventh annual report card is produced to heighten awareness of the health of the children of North Carolina by summarizing important child health indicators. The report is intended to assist health administrators, legislators, and family advocates in their efforts to improve the health and safety of children statewide. Data are presented for…

Vitaglione, Tom; Weisner, Kristie

305

A Report Card to Evaluate Educational Capacity  

ERIC Educational Resources Information Center

Policymakers target educational accountability primarily at public school administrators and teachers, rather than also include the broader society in which schools are housed and where poverty thrives. This article proposes a process through which community members can develop a report card to determine the educational capacity of a region and…

Coleman, Howard; Fischetti, John

2009-01-01

306

Dealing with Student Credit Card Debt.  

ERIC Educational Resources Information Center

While most college students use credit cards responsibly, it is estimated that more than one in ten students do not. These students are at risk for accumulating a level of debt that can seriously undermine their future. Offers ten suggestions for how institutions of higher education can help prevent this problem. (Author/MKA)

Stanford, William E.

1999-01-01

307

Dealing with Student Credit Card Debt.  

ERIC Educational Resources Information Center

Discusses the danger of college students accumulating a level of credit card debt that can seriously undermine their future lives. Offers 10 suggestions for colleges including controlling solicitations, offering workshops to freshmen, adding credit information to the campus Web site, communicating with the senior class, and discouraging or…

Stanford, William E.

1999-01-01

308

Looking at Debit and Credit Card Fraud  

ERIC Educational Resources Information Center

This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

Porkess, Roger; Mason, Stephen

2012-01-01

309

First-principles insights into p magnetism in CaC and CaN ionic compounds  

NASA Astrophysics Data System (ADS)

Density functional—pseudopotential calculations are employed for more understanding of the exchange interaction in the novel p ferromagnetic CaC and CaN compounds in the rock-salt, zinc-blende, wurtzite and NiAs structures. It is observed that the generalized gradient functional give rises to a half-metallic or nearly half-metallic electronic structure for these systems. Comparing the structural properties in the ferromagnetic and nonmagnetic states clarifies that the bonding properties are almost independent of the exchange interaction in these systems. It is observed that the interatomic exchange interaction in these systems is quite strong and controls the splitting of the spin resolved bond points. The non-local Hartree-Fock based exchange correction is found to enhance the half-metallic behavior of the systems while preserving their equilibrium volume and compressibility.

Nourbakhsh, Zahra; Hashemifar, S. Javad; Akbarzadeh, Hadi

2013-09-01

310

Expanded Access  

MedlinePLUS

... appropriate. 4. Chemistry, Manufacturing, and Controls Information and Pharmacology and Toxicology Information including a description of the ... requesting expanded access. Some companies establish a lottery system to determine which patients will have treatment access. ...

311

Accessibility Policy  

Cancer.gov

Accessibility The National Cancer Institute (NCI) is committed to providing access to all of its electronic materials, including this CD-ROM, to all individuals, including people with disabilities. To provide this information,

312

Access Control  

NSDL National Science Digital Library

Slide show on Authentication (Who goes there?; Determine whether access is allowed; Authenticate human to machine; Authenticate machine to machine) and Authorization (Are you allowed to do that?; Once you have access, what can you do?; Enforces limits on actions)

Stamp, Mark

2009-02-24

313

26 CFR 301.6103(k)(9)-1 - Disclosure of returns and return information relating to payment of tax by credit card and debit...  

Code of Federal Regulations, 2013 CFR

...information relating to payment of tax by credit card and debit card. 301.6103...information relating to payment of tax by credit card and debit card. Officers and...necessary in connection with processing credit card and debit card...

2013-04-01

314

User`s manual for the DAD-1 data acquisition daughter board for the SuperCard-2  

SciTech Connect

A detailed description of how to use the DAD-1 data acquisition daughter board is given. The DAD-1 daughter board is used with the SuperCard-2, a VME format processor board manufactured by CSP Inc. that is based on the Intel i860 microprocessor. The daughter board provides high speed acquisition of digital data through a general purpose input port. Data are transferred through direct memory access operations to the memory on the SuperCard-2 board at a rate up to 40 million, 14 bit samples per second. A first-in, first-out memory is used to buffer the data during the transfer. Several different data acquisition operating modes are available that make a combination of a SuperCard-2 processor board and a DAD-1 daughter board suitable for a wide range of real time data analysis and feedback control functions.

Ferron, J.R.

1993-05-01

315

Medicare program; Medicare prescription drug discount card. Interim final rule with comment period.  

PubMed

Section 101, subpart 4 of the Medicare Prescription Drug, Improvement, and Modernization Act of 2003, codified in section 1860D-31 of the Social Security Act, provides for a voluntary prescription drug discount card program for Medicare beneficiaries entitled to benefits, or enrolled, under Part A or enrolled under Part B, excluding beneficiaries entitled to medical assistance for outpatient prescription drugs under Medicaid, including section 1115 waiver demonstrations. Eligible beneficiaries may access negotiated prices on prescription drugs by enrolling in drug discount card programs offered by Medicare-endorsed sponsors. Eligible beneficiaries may enroll in the Medicare drug discount card program beginning no later than 6 months after the date of enactment of the Medicare Prescription Drug, Improvement, and Modernization Act of 2003 and ending December 31, 2005. After December 31, 2005, beneficiaries enrolled in the program may continue to use their drug discount card during a short transition period beginning January 1, 2006 and ending upon the effective date of a beneficiary's outpatient drug coverage under Medicare Part D, but no later than the last day of the initial open enrollment period under Part D. Beneficiaries with incomes no more than 135 percent of the poverty line applicable to their family size who do not have outpatient prescription drug coverage under certain programs--Medicaid, certain health insurance coverage or group health insurance (such as retiree coverage), TRICARE, and Federal employees Health Benefits Program (FEHBP)--also are eligible for transitional assistance, or payment of $600 in 2004 and up to $600 in 2005 of the cost of covered discount card drugs obtained under the program. In most cases, any transitional assistance remaining available to a beneficiary on December 31, 2004 may be rolled over to 2005 and applied toward the cost of covered discount card drugs obtained under the program during 2005. Similarly, in most cases, any transitional assistance remaining available to a beneficiary on December 31, 2005 may be applied toward the cost of covered discount card drugs obtained under the program during the transition period. The Centers for Medicare & Medicaid Services will solicit applications from entities seeking to offer beneficiaries negotiated prices on covered discount card drugs. Those meeting the requirements described in the authorizing statute and this rule, including administration of transitional assistance, will be permitted to offer a Medicare-endorsed drug discount card program to eligible beneficiaries. Endorsed sponsors may charge beneficiaries enrolling in their endorsed programs an annual enrollment fee for 2004 and 2005 of no more than $30; CMS will pay this fee on behalf of enrollees entitled to transitional assistance. To ensure that eligible Medicare beneficiaries take full advantage of the Medicare drug discount card program and make informed choices, CMS will educate beneficiaries about the existence and features of the program and the availability of transitional assistance for certain low-income beneficiaries; and publicize information that will allow Medicare beneficiaries to compare the various Medicare-endorsed drug discount card programs. PMID:14674398

2003-12-15

316

Adverse drug reaction cards carried by patients.  

PubMed

Five hundred patients were asked whether they were allergic to any medicines. The description given of any stated reaction was assessed to see whether an important adverse drug reaction was likely to have occurred. The patients' records were also examined for collaborative evidence. Poor documentation often made it difficult to confirm the patient's claim of drug sensitivity. A total of 89 patients may have suffered from important adverse reactions to 113 drugs. Full documentation of adverse reactions is important, but only eight patients carried any information to warn others of their sensitivities. Patients should be asked about any drug sensitivities and, if appropriate, given written confirmation of them. A quick, simple method of doing this would be to provide patients' with a plastic card, similar to a credit card, with instructions and details of the reaction written on it with an indelible pen. PMID:3084023

Hannaford, P C

1986-04-26

317

Dual Resolution Images from Paired Fingerprint Cards  

National Institute of Standards and Technology Data Gateway

NIST Dual Resolution Images from Paired Fingerprint Cards (PC database for purchase)   NIST Special Database 30 is being distributed for use in development and testing of fingerprint compression and fingerprint matching systems. The database allows the user to develop and evaluate data compression algorithms for fingerprint images scanned at both 19.7 ppmm (500 dpi) and 39.4 ppmm (1000 dpi). The data consist of 36 ten-print paired cards with both the rolled and plain images scanned at 19.7 and 39.4 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

318

From Secure Memories to Smart Card Security  

NASA Astrophysics Data System (ADS)

Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

Handschuh, Helena; Trichina, Elena

319

Java Card Code Generation from B Specifications  

Microsoft Academic Search

\\u000a The French BOM (B with Optimised Memory) project has analysed issues related to code generation from B specifications. This\\u000a analysis was built upon the shortcoming of the existing translators, and led to proposals to generate optimised code suitable\\u000a for embedding in highly memory-constrained devices, such as smart cards. Two code translators have been developed: one targetting\\u000a C, suitable for system

Bruno Tatibouët; Antoine Requet; Jean-christophe Voisinet; Ahmed Hammad

2003-01-01

320

Fully Verified Java Card API Reference Implementation  

Microsoft Academic Search

We present a formally verified reference implementation of the JAVA CARD API. This case study has been developed with the KeY verification system. The KeY system allows us to symbolically execute the JAVA source code of the API in the KeY verification environment and, in turn, prove correctness of the implementation w.r.t. formal specification we developed along the way. The

Wojciech Mostowski

2007-01-01

321

Analysis Vulnerabilities in Smart Card Web Server  

Microsoft Academic Search

Résumé—Depuis leur apparition, les cartes à puce n’ont cessé d’évoluer. Elles sont utilisées aujourd’hui par des millions d’utilisateurs et offrent de plus en plus de possibilités. Désormais, il est possible d’y intégrer un serveur web. Les cartes Java Card 2.2 Web Server ne supportant pas le protocole TCP\\/IP, un nouveau protocole de communication a été créé entre la carte et

Matthieu Barreaud; Julien Iguchi-Cartigny; Jean-Louis Lanet

2011-01-01

322

From Secure Memories to Smart Card Security  

Microsoft Academic Search

\\u000a Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials\\u000a for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures.\\u000a Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart\\u000a cards are a typical embedded

Helena Handschuh; Elena Trichina

2010-01-01

323

Web Accessibility and Accessibility Instruction  

ERIC Educational Resources Information Center

Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

Green, Ravonne A.; Huprich, Julia

2009-01-01

324

Human Factors Assessment of Respiratory Support Pack (RSP) Cue Card  

NASA Technical Reports Server (NTRS)

The Respiratory Support Pack (RSP) is a medical pack onboard the International Space Station (ISS) that contains much of the necessary equipment for providing aid to a conscious or unconscious crewmember in respiratory distress. Inside the RSP lid pocket is a 5.5 by 11 inch paper cue card, which is used by a Crew Medical Officer as the procedure to set up the equipment and deliver oxygen to a crewmember. In training, crewmembers expressed concerns about the readability and usability of the cue card; consequently, updating the cue card was prioritized as an activity to be completed prior to Space Shuttle return-to-flight. The Usability Testing and Analysis Facility at the Johnson Space Center evaluated the current layout of the cue card, and proposed several new cue card designs based on human factors principals. A series of three studies were performed in order to experimentally compare performance with each of the cue card designs. Nonmedically trained personnel used either a redesigned RSP cue card, or the original card to simulate resuscitation (using a mannequin along with the hardware). Time to completion, errors and subjective ratings were recorded. The addition of pictures, colors, borders, and simplification of the flow of information (making minimal changes to the actual procedure content) elicited great benefits during testing. Time to complete RSP procedures was reduced by as much as three minutes with the final cue card design. Detailed results from these studies, as well as general guidelines for cue card design will be discussed.

Whitmore, Mihriban; Hudy, Cynthia; Smith, Danielle; Byrne, Vicky

2005-01-01

325

Nontraditional Card Sorts: Adding Critical Thinking and Inquiry to Science Classrooms  

ERIC Educational Resources Information Center

A typical card sort is an activity in which students are given a set of cards with a single concept written on each card and asked to organize the cards by grouping related concepts. The nontraditional card sorts described in this article foster critical thinking and add elements of inquiry as students use them to develop flowcharts for complex…

Ramsey, Linda; Deese, W. C.; Cox, Cathi

2007-01-01

326

An Efficient and Simple Way to Test the Security of Java CardsTM  

Microsoft Academic Search

Till recently it was impossible to have more than one single application running on a smart card. Multiapplication cards, and especially Java Cards, now make it possible to have several applications sharing the same physical piece of plastic. Today, these cards accept to load code only after an authentication. But in the future, the cards will be open an everybody

Serge Chaumette; Damien Sauveron

2005-01-01

327

A multi-functional telephone with memory cards which expand talking services  

Microsoft Academic Search

The authors describe several voice-synthesized telephone synthetic speech services that are desired by users (as determined from survey results), requirements for expansion of speed services using memory cards, and the configurations of memory cards and a multifunction telephone system that uses such cards. Various speed functions and messages are loaded on each memory card. The card is repeatedly inserted and

H. Matsui; Y. Nishino; K. Gomi; F. Nakamura

1988-01-01

328

Universal Tailored Access: Automating Setup of Public and Classroom Computers.  

ERIC Educational Resources Information Center

This article describes a setup smart access card that enables users with visual impairments to customize magnifiers and screen readers on computers by loading the floppy disk into the computer and finding and pressing two successive keys. A trial with four elderly users found instruction took about 15 minutes. (Contains 3 references.) (CR)

Whittaker, Stephen G.; Young, Ted; Toth-Cohen, Susan

2002-01-01

329

Hand geometry biometric device for secure access control  

Microsoft Academic Search

This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths

C. Colbert; D. R. Moles

1991-01-01

330

Financial Knowledge and Credit Card Behavior of College Students  

Microsoft Academic Search

This study examined the relationship between financial knowledge and credit card behavior of college students. The widespread\\u000a availability of credit cards has raised concerns over how college students might use those cards given the negative consequences\\u000a (both immediate and long-term) associated with credit abuse and mismanagement. Using a sample of 1,354 students from a major\\u000a southeastern university, results suggest that

Cliff A. Robb

2011-01-01

331

A PCI-Card for Accelerating Elliptic Curve Cryptography  

Microsoft Academic Search

In this article we present a PCI-card for accelerating El- liptic Curve Cryptography. The card has application in e- Commerce and e-Government where Internet servers estab- lish secure and authenticated communication with clients over public networks. All elliptic-curve operations are processed on the card to liberate the software from this computational intensive task. The hardware is optimized for a particular

Johannes Wolkerstorfer; Wolfgang Bauer

332

Optical system of holographic memory card writing\\/reading equipment  

Microsoft Academic Search

We developed a standard credit card-shaped general-purpose data carrier, a reflective Holographic Memory Card (HMC), and the appropriate equipment for its handling. Data recording and retrieval are accomplished by polarisation Fourier holography using a thin layer of photo-anisotropic polymer as the storage material. The data density is about 1 bit\\/micrometers 2, the maximum storage capacity of the card is around

Gabor Erdei; Gabor Szarvas; Emoeke Loerincz; Jozsua Fodor; Ferenc Ujhelyi; Pal Koppa; Peter Varhegyi; Peter I. Richter

2000-01-01

333

Modeling intelligent agent beliefs in a card game scenario  

NASA Astrophysics Data System (ADS)

In this paper we explore the problem of intelligent agent beliefs. We model agent beliefs using multimodal logics of belief, KD45(m) system implemented as a directed graph depicting Kripke semantics, precisely. We present a card game engine application which allows multiple agents to connect to a given game session and play the card game. As an example simplified version of popular Saboteur card game is used. Implementation was done in Java language using following libraries and applications: Apache Mina, LWJGL.

Go?u?ski, Marcel; Tomanek, Roman; WÄ siewicz, Piotr

2012-05-01

334

High density printed electrical circuit board card connection system  

DOEpatents

A zero insertion/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned. The card connection system provides a simple solution to the need for a greater number of electrical signal connections. 12 figs.

Baumbaugh, A.E.

1997-05-06

335

WEST CORRIDOR (ORIGINALLY KNOWN AS LIBRARY OF CONGRESS CARD CATALOG) ...  

Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

WEST CORRIDOR (ORIGINALLY KNOWN AS LIBRARY OF CONGRESS CARD CATALOG) ON FIRST FLOOR, LOOKING EAST - Free Library of Philadelphia, Central Library, 1901 Vine Street, Philadelphia, Philadelphia County, PA

336

Intelligent card processing terminal of urban rail transit in Nanjing  

NASA Astrophysics Data System (ADS)

In order to improve the compatibility, security and expandability of Automatic Fare Collection System in rail transit, and reduce the maintenance cost, intelligent card processing terminal is proposed in this paper. The operation flow and features of intelligent card processing terminal are analyzed in detailed, and the software and hardware structures and business treatment process are designed. Finally, the security mechanism of intelligent card processing terminal is summarized. The application results shows that Intelligent card processing terminal makes interconnection among lines easier, creates considerable economic efficiency and the social efficiency, and can be widely used.

Xia, Dechuan; Zhang, Xiaojun; Song, Yana; He, Tiejun

2011-10-01

337

High density printed electrical circuit board card connection system  

DOEpatents

A zero insertion/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned. The card connection system provides a simple solution to the need for a greater number of electrical signal connections.

Baumbaugh, Alan E. (Aurora, IL)

1997-01-01

338

Open Access  

ERIC Educational Resources Information Center

The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

Suber, Peter

2012-01-01

339

WTO Accession, \\  

Microsoft Academic Search

This paper evaluates the impact of China's WTO accession on trade and economic relation across the Taiwan Strait and its implications for rest of the world by a recursive dynamic, 17-region, 25- sector computable general equilibrium (CGE) model according to actual market access commitments that China and Taiwan have made in their final official WTO offers. The simulation results shown

Zhi Wang

340

Twin laws of whewellite, CaC2O4·H2O. A structural and growth approach  

NASA Astrophysics Data System (ADS)

Both natural and synthetic crystals of whewellite (CaC2O4·H2O, sp.g. P21/ c) occur commonly as twins. The geometrical, reticular and structural features of the most important twin law, twin plane (100), and the dubious law (overline {text{1}} 01) were investigated. The strict application of the periodic bond chain (PBC) theory (Hartman and Perdok 1955) makes possible the identification of original composition planes (OCP). Following the OCP analysis it has been deduced that the energy necessary to produce a (100) twin is very low. This is evidenced by the easy reciprocal arrangement of the two crystal structures which can be shown in two slightly different ways, i.e., by a (100) reflection with a mean [0, 1/2, - a 0cos?] translation and a weak relaxation (from 0.1 to 0.25 Å) of the common interface. In OCP an important role is played by water molecules. With regard to (overline {text{1}} 01) twinning, the geometrical and reticular agreement is not matched by the structural situation. The structural and growth approach to the twin laws of whewellite therefore justifies the very common occurrence only of (100) twinned crystals.

Aquilano, Dino; Franchini-Angela, Marinella

1981-06-01

341

Special report. Integrated access control systems in hospitals: an update.  

PubMed

Voice-activated doors. Magnetic card access systems. Covert video cameras. CCTV with motion detectors. When it comes to integrated access control, there are plenty of devices available. But do they work well in hospitals? Are they worth the money? In this report, we'll review how the new technology is being used at a number of facilities, and present some tips from security directors experienced in such use on problems to anticipate and avoid. PMID:10115386

1991-09-01

342

Experimental demonstration of 3×3 10 Gb/s reconfigurable free space optical card-to-card interconnects.  

PubMed

In this Letter, we propose and demonstrate the concept of a free space optics-based parallel high-speed reconfigurable card-to-card interconnect architecture employing microelectromechanical systems (MEMS)-based steering mirror arrays in conjunction with VCSEL and photodiode arrays. A bit-error rate of ?10(-6) and a receiver sensitivity below -11.5 dBm are experimentally attained with a proof-of-concept 3×3 10 Gb/s reconfigurable card-to-card optical interconnect demonstrator. PMID:22743452

Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

2012-07-01

343

Research for the Smart Card of 2010  

Microsoft Academic Search

In preparation for the activities to be launched under the 6th Framework Programme for Research,\\u000aTechnological Development and Demonstration Activities (FP61), the European Commission’s\\u000aInformation Society Directorate-General organised a meeting to consult the industrial and\\u000aacademic research community on current and future RTD needs in the domain of smart card\\u000atechnology.\\u000aThose attending this meeting, which was held in Brussels

B. Cucinelli

2001-01-01

344

48 CFR 552.232-77 - Payment By Government Charge Card.  

Code of Federal Regulations, 2013 CFR

...Governmentwide commercial purchase card. (c) The Contractor shall...for payment using the charge card until the purchased supplies...Contractor must immediately credit a cardholder's account for...Governmentwide commercial purchase card are not eligible for any...

2013-10-01

345

25 CFR 543.10 - What are the minimum internal control standards for card games?  

...minimum internal control standards for card games? 543.10 Section 543.10 Indians...minimum internal control standards for card games? (a) Supervision. Supervision...transaction or independent of the card games department; or (2) A dealer may...

2014-04-01

346

77 FR 4822 - Western Hemisphere Travel Initiative: Designation of an Approved Native American Tribal Card...  

Federal Register 2010, 2011, 2012, 2013

...Designation of an Approved Native American Tribal Card Issued by the Kootenai...is designating an approved Native American Tribal Card issued by the Kootenai...or adjacent islands \\1\\ is a Native American Tribal Card that has been...

2012-01-31

347

LabVIEW Interface for PCI-SpaceWire Interface Card  

NASA Technical Reports Server (NTRS)

This software provides a LabView interface to the NT drivers for the PCISpaceWire card, which is a peripheral component interface (PCI) bus interface that conforms to the IEEE-1355/ SpaceWire standard. As SpaceWire grows in popularity, the ability to use SpaceWire links within LabVIEW will be important to electronic ground support equipment vendors. In addition, there is a need for a high-level LabVIEW interface to the low-level device- driver software supplied with the card. The LabVIEW virtual instrument (VI) provides graphical interfaces to support all (1) SpaceWire link functions, including message handling and routing; (2) monitoring as a passive tap using specialized hardware; and (3) low-level access to satellite mission-control subsystem functions. The software is supplied in a zip file that contains LabVIEW VI files, which provide various functions of the PCI-SpaceWire card, as well as higher-link-level functions. The VIs are suitably named according to the matching function names in the driver manual. A number of test programs also are provided to exercise various functions.

Lux, James; Loya, Frank; Bachmann, Alex

2005-01-01

348

Debug of IC-card chips assisted by FIB and in-situ mechanical microprobing  

NASA Astrophysics Data System (ADS)

The value of mechanical micro-probes and FIB in IC design-debug is well understood. As device dimensions shrink, navigating micro-probes within a light microscope is almost impossible. SEM or FIB, which have higher resolution as well as greater depth of focus, overcome this limitation. FIB is, also, preferred for DUT probe-point creation because its higher milling resolution capability can provide better access to lower level metallizations. IC-card chips present an unique challenge; the backside of these are often insulated so grounding must occur on the exposed front-side. Further, because these IC-card chips are small, very careful setups are required before undertaking FIB modifications. Micro-probes within the FIB chamber solved this problem. Three micro-probes were used to stimulate the chip (input-clock, ground and power) with a fourth probe used to measure output nodes. Requested FIB modifications, including rewiring of poly-silicon traces, were completed. Contacting poly-silicon requires FIB-assisted XeF2 etching through the inter-level dielectric and both fast termination and removal of XeF2 from the chamber upon poly-silicon exposure. The technique for exposing poly-silicon is described in detail. The synergy of mechanical micro-probes within the FIB chamber benefited both techniques in the design-debug task. We summarize various IC-card packaging styles and requirements to ground, micro-probe, and establish a debug platform.

Jiang, Xiao D.; Yu, Xiang H.; Lundquist, Theodore R.

2001-10-01

349

Accessibility, transcription, and access everywhere  

Microsoft Academic Search

Accessibility in the workplace and in academic settings has increased dramatically for users with disabilities, driven by greater awareness, legislative mandate, and technological improvements. Gaps, however, remain. For persons who are deaf and hard of hearing in particular, full participation requires complete access to audio materials, both for live settings and for prerecorded audio and visual information. Even for users

Keith Bain; Sara H. Basson; Alexander Faisman; Dimitri Kanevsky

2005-01-01

350

Maximum Tc at the verge of a simultaneous order-disorder and lattice-softening transition in superconducting CaC6  

NASA Astrophysics Data System (ADS)

In order to account for the large drop of superconducting critical temperature, Tc , and for the dramatic increase in residual resistivity, ?0 , previously reported in CaC6 at Pcr?9GPa , we studied the room-temperature crystal structure of bulk CaC6 samples as a function of pressure up to 13 GPa by means of synchrotron x-ray diffraction in diamond anvil cells. At Pcr , we found no change of the trigonal R3¯m space group symmetry, but a large increase in isothermal compressibility, ? , from -0.0082GPa-1 to -0.0215GPa-1 , accompanied by a large broadening of Bragg peaks. With both effects being reversible, it follows that superconductivity in CaC6 is maximized at the verge of a peculiar order-disorder phase transition concomitant to a large lattice softening. Space group symmetry considerations supported by ab initio calculations of the relaxed structure within the density functional theory lead us to conclude that the disordered phase is presumably characterized by a random off-centering of the Ca atoms in the ab plane with respect to the C honeycomb layers.

Gauzzi, A.; Bendiab, N.; D'Astuto, M.; Canny, B.; Calandra, M.; Mauri, F.; Loupias, G.; Emery, N.; Hérold, C.; Lagrange, P.; Hanfland, M.; Mezouar, M.

2008-08-01

351

Full-Screen Magnification on a Budget: Using a Hardware-Based Multi-Display Graphics Card as a Screen-Magnifier  

ERIC Educational Resources Information Center

Potentially, computers can balance some of the effects of visual impairment and provide equality of opportunity (Gerber, 2003). Students' individual needs entail that they and their teachers have access to a range of assistive technologies that may vary according to the task as well as to the learner. A dual output graphics card with a twin…

Sales, Anthony; Evans, Shirley; Musgrove, Nick; Homfray, Richard

2006-01-01

352

Mobile access control vestibule  

NASA Astrophysics Data System (ADS)

The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

Depoy, Jennifer M.

1998-12-01

353

A smart-card-enabled privacy preserving E-prescription system.  

PubMed

Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality. PMID:15055801

Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

2004-03-01

354

[Card-based age control mechanisms at tobacco vending machines. Effect and consequences].  

PubMed

Until recently, 700,000 tobacco vending machines provided uncontrolled access to cigarettes for children and adolescents in Germany. On January 1, 2007, a card-based electronic locking device was attached to all tobacco vending machines to prevent the purchase of cigarettes by children and adolescents under 16. Starting in 2009, only persons older than 18 are able to buy cigarettes from tobacco vending machines. The aim of the present investigation (SToP Study: "Sources of Tobacco for Pupils" Study) was to assess changes in the number of tobacco vending machines after the introduction of these new technical devices (supplier's reaction). In addition, the ways smoking adolescents make purchases were assessed (consumer's reaction). We registered and mapped the total number of tobacco points of sale (tobacco POS) before and after the introduction of the card-based electronic locking device in two selected districts of the city of Cologne. Furthermore, pupils from local schools (response rate: 83%) were asked about their tobacco consumption and ways of purchase using a questionnaire. Results indicated that in the area investigated the total number of tobacco POSs decreased from 315 in 2005 to 277 in 2007. The rates of decrease were 48% for outdoor vending machines and 8% for indoor vending machines. Adolescents reported circumventing the card-based electronic locking devices (e.g., by using cards from older friends) and using other tobacco POSs (especially newspaper kiosks) or relying on their social network (mainly friends). The decreasing number of tobacco vending machines has not had a significant impact on cigarette acquisition by adolescent smokers as they tend to circumvent the newly introduced security measures. PMID:20127298

Schneider, S; Meyer, C; Löber, S; Röhrig, S; Solle, D

2010-02-01

355

Secure and Verifiable P2P Card Games  

Microsoft Academic Search

This paper presents the design of secure and verifiable P2P card games. An efficient scheme was proposed to achieve secret encoding, distribution, revealing, and verification in a fully distributed way. The proposed card shuffling scheme is based on lightweight operations such as permutation and modular addition. Compared with most of previous approaches basing on public key cryptosystems and their alike,

Chun-chao Yeh

2008-01-01

356

Using the Intelligent Careers Card Sort with University Students.  

ERIC Educational Resources Information Center

Describes the experiences of university students who completed the Intelligent Careers Card Sort (ICCS), a career exploration exercise that is based on the Intelligent Career framework. This Intelligent Career model is discussed in the context of the subjective career and the changing economy, and research on card sorts is briefly reviewed.…

Wnuk, Susan M.; Amundson, Norman E.

2003-01-01

357

A reassessment of market power among credit card banks  

Microsoft Academic Search

An improved empirical specification of credit card conduct agrees with several prior studies in rejecting perfectly competitive equilibrium, indicates structural disequilibrium in the industry and is consistent with monopolistic competition. Measures of liquidity management costs, omitted from prior studies, are shown to be important factors in a properly specified model of pricing conduct in credit card lending.

Sherrill Shaffer; Lorein Thomas

2007-01-01

358

A Tour of the Stacks--HyperCard for Libraries.  

ERIC Educational Resources Information Center

Description of HyperCard, a software package that runs on Macintosh microcomputers, focuses on its use in the Apple Computer, Inc., Library as a user guide to the library. Examples of screen displays are given, and a list of resources is included to help use and understand HyperCard more completely. (LRW)

Ertel, Monica; Oros, Jane

1989-01-01

359

Disentangling Dimensions in the Dimensional Change Card-Sorting Task  

ERIC Educational Resources Information Center

The dimensional change card-sorting task (DCCS task) is frequently used to assess young children's executive abilities. However, the source of children's difficulty with this task is still under debate. In the standard DCCS task, children have to sort, for example, test cards with a red cherry or a blue banana into two boxes marked with target…

Kloo, Daniela; Perner, Josef

2005-01-01

360

India Card for Securing and Estimating the Nation  

Microsoft Academic Search

INDIA- Integrated National Dwellers Identity and Authentication (INDIA) card is designed with utmost care to protect the nation from intruders and also to protect the nation's economy. This card involves the details of the citizen with Date of birth as the Public key and the digital key extracted from the palm vein- a biometric trait along with two other biometric

B. PRASANALAKSHMI; A. KANNAMMAL; S. SUJITH ROY

2014-01-01

361

Green Card - braucht die deutsche Wirtschaft ein Einwanderungsgesetz?  

Microsoft Academic Search

Seit 1. August 2000 stellen die deutschen Arbeitsämter Arbeitsgenehmigungen (»Green Cards«) für lT-Spezialisten aus Drittländern aus. Die Bundesregierung hat eine Expertenkommission beauftragt, ein Einwanderungsgesetz vorzubereiten. Während sich Prof. Dr. Norbert Walter, Chefvolkswirt der Deutschen Bank, »um der Zukunftstauglichkeit unseres Landes willen« für liberalere Einwanderungsregelungen ausspricht, äußert sich Prof. Dr. Helmut Rittstieg, Universität Hamburg, eher skeptisch zur deutschen Green Card. Ein

Norbert Walter; Helmut Rittstieg; Heinz Werner

2000-01-01

362

IR Cards: Inquiry-Based Introduction to Infrared Spectroscopy  

ERIC Educational Resources Information Center

As infrared spectroscopy (IR) is frequently used in undergraduate organic chemistry courses, an inductive introduction to IR spectroscopy that uses index cards printed with spectra, structures, and chemical names is described. Groups of students are given an alphabetized deck of these "IR cards" to sort into functional groups. The students then…

Bennett, Jacqueline; Forster, Tabetha

2010-01-01

363

A Formally Verified Calculus for Full Java Card  

Microsoft Academic Search

We present a calculus for the verication of sequential Java programs. It supports all Java language constructs and has additional support for Java Card. The calculus is formally proved correct with re- spect to a natural semantics. It is implemented in the KIV system and used for smart card applications.

Kurt Stenzel

2004-01-01

364

From Finite State Machines to Provably Correct Java Card Applets  

Microsoft Academic Search

This paper presents a systematic approach to developing Java Card ap- plets and\\/or formal specications for them, starting from descriptions in the form of nite state machines. The formal specications are written in the specication language JML, and can be checked against Java Card source code using the static checker ESC\\/Java.

Engelbert Hubbers; Martijn Oostdijk; Erik Poll

2003-01-01

365

A Performance Comparison of Java Cards for Micropayment Implementation  

Microsoft Academic Search

Abstract: With the development of pay-per-view and multimedia streaming services,there is an increasing demand for practical micropayment mechanisms.Smart cards are essential to implement micropayments on thebuyer's side. This paper presents a comparative analysis of four commercialJava Cards for micropayment implementation.

Jordi Castellà-roca; Josep Domingo-ferrer; Jordi Herrera-joancomartí; Jordi Planes

2000-01-01

366

Correctness of Java Card Method Lookup via Logical Relations  

Microsoft Academic Search

Abstract This article presents a formalisation of the bytecode optim isation of Sun’s Java Card language from the class file to CAP file format as a set of constrain ts between the two formats, and defines and proves its correctness. Java Card bytecode is formalised using an abstract operational semantics, which can then be instantiated into the two formats. The

Ewen Denney; Thomas P. Jensen

2000-01-01

367

Correctness of Java card method lookup via logical relations  

Microsoft Academic Search

This article presents a formalisation of the bytecode optim isation of Sun's Java Card lan- guage from the class file to CAP file format as a set of constrain ts between the two formats, and defines and proves its correctness. Java Card bytecode is formalised using an abstract operational semantics, which can then be instantiated into the two formats. The

Ewen Denney; Thomas P. Jensen

2002-01-01

368

Implementing a Formally Verifiable Security Protocol in Java Card  

Microsoft Academic Search

This paper describes a case study in reflning an abstract se- curity protocol description down to a concrete implementation on a Java Card smart card. The aim is to consider the decisions that have to be made in the development of such an implementation in a systematic way, and to investigate the possibilities of formal speciflcation and veriflcation in the

Engelbert Hubbers; Martijn Oostdijk; Erik Poll

2003-01-01

369

Reverse Engineering Java Card Applets Using Power Analysis  

Microsoft Academic Search

Power analysis on smart cards is widely used to obtain infor- mation about implemented cryptographic algorithms. We propose sim- ilar methodology for Java Card applets reverse engineering. Because power analysis alone does not provide enough information, we refine our methodology by involving additional information sources. Issues like distinguishing between bytecodes performing similar tasks and reverse engineering of conditional branches and

Dennis Vermoen; Marc F. Witteman; Georgi Gaydadjiev

2007-01-01

370

Computing heap space cost of Java Card applets  

Microsoft Academic Search

We introduce an approach to find upper bounds of heap space for Java Card applets. Our approach analyzes and transforms bytecodes of Java Card applets into equivalent programs in a language that already has a type system for finding the sharp upper bounds of resource use. We then point out a linear-time algorithm to compute the maximum heap units that

Tuan-Hung Pham; Anh-Hoang Truong; Ninh-Thuan Truong

2008-01-01

371

A Formal Executable Semantics of the JavaCard Platform  

Microsoft Academic Search

We present a formal executable specification of two crucial JavaCard platform components, namely the Java Card Virtual Machine (JCVM) and the ByteCode Verifier (BCV). Moreover, we relate both components by giving a proof of correctness of the ByteCode Verifier. Both formalisations and proofs have been machined-checked using the proof assistant Coq.

Gilles Barthe; Guillaume Dufay; Line Jakubiec; Bernard P. Serpette; Simão Melo De Sousa

2001-01-01

372

Students Beat the Queue and Produce Their Own Library Cards  

ERIC Educational Resources Information Center

In the past, it took the library staff of the University of Bath in United Kingdom around two weeks each autumn to produce cards for the main intake of its undergraduates. In this article, the author describes how he transformed the school's traditional library card production into a low-cost self-service system. He also describes how the new…

Lockton, Laurence

2006-01-01

373

Elements--A Card Game of Chemical Names and Symbols  

ERIC Educational Resources Information Center

"Elements" is a competitive card game designed to help middle school students recognize and correlate the names and symbols of the most significant chemical elements. Each student is required to construct his or her own decks of playing cards--one with the names of the chemical elements and one with their corresponding symbols--and compete against…

Sevcik, Richard S.; Hicks, O'Dell; Schultz, Linda D.; Alexander, Susan V.

2008-01-01

374

Using Guided Notes and Response Cards at the Postsecondary Level  

ERIC Educational Resources Information Center

At the postsecondary level, instructors widely use a lecture format to impart knowledge to students. With this pilot study, the authors examine the effects of guided notes and response cards on students' performance on weekly quiz scores and in-class participation. Using an ABCBC withdrawal design, guided notes and response cards used together are…

Musti-Rao, Shobana; Kroeger, Stephen D.; Schumacher-Dyke, Karin

2008-01-01

375

A planar loop sector antenna for WLAN card terminal  

Microsoft Academic Search

In wireless local area network (WLAN) systems, a sector antenna technique is widely used to solve the multipath fading and shadowing problems. For a small card terminal, it is preferable that the miniaturized sector antenna is formed in a planar structure. We previously proposed a six-sector antenna which can be built in the edge of a PCMCIA card (Una, H.

Hiroyuki Uno; Y. Saito; G.-I. Ohta; Y. Koyandgi; K. Eghwa

2004-01-01

376

Converting Inhouse Subject Card Files to Electronic Keyword Files.  

ERIC Educational Resources Information Center

The library at Phoenix College developed the Controversial Issues Files (CIF), a "home made" card file containing references pertinent to specific ongoing assignments. Although the CIF had proven itself to be an excellent resource tool for beginning researchers, it was cumbersome to maintain in the card format, and was limited to very general…

Culmer, Carita M.

377

Effects of Credit Card Purchasing at Installation Level.  

National Technical Information Service (NTIS)

This research reviews the use of the Government wide commercial credit card program at the United States Military Academy (USMA), West Point, NY. The intent of the study is to analyze the credit card process. Questionnaires were developed to assess the cr...

H. L. Schnepf

1994-01-01

378

Using Playing Cards to Simulate a Molecular Clock  

ERIC Educational Resources Information Center

Changes in DNA base-repair may serve as an indicator of the time elapsed since divergence from a common ancestor. DNA sequences can now be analyzed. The simulation presented in this article allows students to observe the accumulation of changes in a randomly mutating sequence of playing cards. The cards are analogous to DNA nucleotide or protein…

Westerling, Karin E.

2008-01-01

379

Read\\/write demonstrator of rewritable holographic memory card system  

Microsoft Academic Search

We present the improved demonstrator of our rewritable holographic memory card system. High density optical storage is realized in a non-commercial optical set-up. Fourier transformed recording is used in a polarization holographic arrangement realizing reading and writing from the same side of the data carrier which is a modified plastic card. Holograms containing binary information of 300 x 220 bits

Emoeke Loerincz; Ferenc Ujhelyi; Pal Koppa; A. Kerekes; Gabor Szarvas; Gabor Erdei; Jozsua Fodor; Sz. Mike; Attila Sueto; Peter Varhegyi; P. S. Ramanujam; Soeren Hvilsted

2002-01-01

380

Authorized Crib Cards Do Not Improve Exam Performance  

ERIC Educational Resources Information Center

We experimentally investigated the effect of authorized crib cards on undergraduates' multiple-choice exam performance for lower order and higher order questions and on anxiety levels in an upper division child and adolescent development course. Students (N =54) in 2 sections could use crib cards during 2 of the 4 exams. Despite student…

Dickson, K. Laurie; Miller, Michelle D.

2005-01-01

381

Biomonitoring Brevetoxin Exposure in Mammals Using Blood Collection Cards  

Microsoft Academic Search

A method has been tested in laboratory mice to monitor for the presence of brevetoxins in blood after exposure. The use of blood collection cards is an adaptation of a method employed for rou- tine diagnostic and genetic testing of newborns. Blood is collected and applied to a 0.5-inch diameter circle on a specially prepared blood collection card and allowed

Elizabeth R. Fairey; Noah G. Shuart; Mark Busman; Peter D. R. Moeller; John S. Ramsdell

382

Parallel Shortest Lattice Vector Enumeration on Graphics Cards  

Microsoft Academic Search

In this paper we present an algorithm for parallel exhaustive search for short vectors in lattices. This algorithm can be applied to a wide range of parallel computing systems. To illustrate the algorithm, it was implemented on graphics cards using CUDA, a programming frame- work for NVIDIA graphics cards. We gain large speedups compared to previous serial CPU implementations. Our

Jens Hermans; Michael Schneider; Johannes Buchmann; Frederik Vercauteren; Bart Preneel

2010-01-01

383

Beam extractor card for free-space optical backplanes  

Microsoft Academic Search

The fabrication of an interface card to extract free-space beams from an optical backplane and deliver them to either photodetectors on a printed circuit board or to fiber, is described. Experimental results are presented for polymer waveguides with 45 degree end reflectors and refractive polymer microlens arrays used in the fabrication of the card. Results for 1 by 4 and

Barrie P. Keyworth; D. J. Corazza; R. Ian MacDonald

1996-01-01

384

Remote Password Authentication Scheme with Smart Cards and Biometrics  

Microsoft Academic Search

More and more researchers combine biometrics with passwords and smart cards to design remote authentication schemes for the purpose of high-degree security. However, in most of these authentication schemes proposed in the literature so far, biometric characteristics are verified in the smart cards only, not in the remote servers, during the authentication processes. Although this kind of design can prevent

Chun-i Fan; Yi-hui Lin; Ruei-hau Hsu

2006-01-01

385

Getting Started with CD Audio in HyperCard.  

ERIC Educational Resources Information Center

This article examines the use of the Voyager Compact Disk (CD) AudioStack to provide HyperCard stacks designed to promote language learning with the ability to play on common precisely specified portions of off-the-shelf audio compact disks in a CD-ROM drive. Four German and Russian HyperCard stacks are described and their construction outlined.…

Decker, Donald A.

1992-01-01

386

DoD Purchase Card Program Audit Coverage.  

National Technical Information Service (NTIS)

A July 2001 Congressional hearing highlighted the need to ensure proper oversight of the DoD purchase card program. We prepared this summary report at the request of the Director, Defense Procurement to provide a central repository of purchase card audit ...

2001-01-01

387

Economics of electronic card systems for public transportation  

Microsoft Academic Search

An electronic card system for public transportation can automate trip tracking, fare processing and accounting. A system also can offer other intelligent transportation functions, can accept credit, ATM and EBT cards to pay fares and can be used to manage third-party support, such as by major businesses enroute, states and local governments, and social service agencies. Our latest economic study(1)

R. Tanenhaus

1996-01-01

388

Ridership Impacts of South Florida's EASY Smart Card, Summary Report.  

National Technical Information Service (NTIS)

Smart card-based Automated Fare Collection Systems (AFCS) are being increasingly deployed in transit systems across the US. Miami-Dade Transit (MDT) has recently deployed such a system branded as the EASY Card. The South Florida Regional Transportation Au...

A. Joslin

2013-01-01

389

The economics of the smart card industry: Towards coopetitive strategies  

Microsoft Academic Search

This article uses an explorative case study of the smart card industry where ‘coopetition’ is to be found. We show that the nature of interaction between smart card actors, dealing with industry and market conditions that create a very complex competitive landscape, constitutes a mix of competition and cooperation. Here, we assume that the paradoxical aspect of competition and cooperation

Zouhaïer MChirgui

2005-01-01

390

New Medicare-approved prescription drug discount card.  

PubMed

Patients who are on Medicare and have income under 135% of Federal poverty level and are not on Medicaid probably should obtain one of the new Medicare discount cards that became available on June 1, 2004, because all these cards include $600 annual credit for prescription-drug purchases for persons within that income limit. Unfortunately this program is complex, no one yet knows how it will work in practice, and after choosing a card one is locked in and cannot change cards until November 15. The most difficult part of the choice of which card to get may involve how it interacts with other programs, including ADAP, and pharmaceutical company patient assistance programs. PMID:15241856

James, John S

2004-05-28

391

Implementing a High-Assurance Smart-Card OS  

NASA Astrophysics Data System (ADS)

Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

392

Maxed out: The Relationship between Credit Card Debt, Credit Card Distress and Grade Point Averages for College Students  

ERIC Educational Resources Information Center

Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…

Smith, Temple Day

2011-01-01

393

Novel Disulfide Bond-Mediated Dimerization of the CARD Domain Was Revealed by the Crystal Structure of CARMA1 CARD  

PubMed Central

CARMA1, BCL10 and MALT1 form a large molecular complex known as the CARMA1 signalosome during lymphocyte activation. Lymphocyte activation via the CARMA1 signalosome is critical to immune response and linked to many immune diseases. Despite the important role of the CARMA1 signalosome during lymphocyte activation and proliferation, limited structural information is available. Here, we report the dimeric structure of CARMA1 CARD at a resolution of 3.2 Å. Interestingly, although CARMA1 CARD has a canonical six helical-bundles structural fold similar to other CARDs, CARMA1 CARD shows the first homo-dimeric structure of CARD formed by a disulfide bond and reveals a possible biologically important homo-dimerization mechanism.

Park, Hyun Ho

2013-01-01

394

System and method of identifying the association relationship between a smart card and a mobile phone  

US Patent & Trademark Office Database

A method and system for identifying an association between a Smart Card and a mobile device by selecting card-swiping record pairs from a set of card-swiping records of the Smart Card, each including a card-swiping location and a corresponding card-swiping time; calculating overlap degree in time and location dimensions of the card-swiping record pair and the communication behavior record pair of the mobile phone, which is recorded in a mobile network as a communication log; determining that the card-swiping record pair overlaps with the communication behavior record pair of the mobile phone recorded in the communication log if the overlap degree is greater than a predetermined threshold, and determining that the Smart Card is associated with the mobile phone if each card-swiping record pair of the plurality of card-swiping record pairs overlaps with the communication behavior record pair of the mobile phone recorded in the communication log.

2013-10-29

395

The Security Email Based on Smart Card  

NASA Astrophysics Data System (ADS)

Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can’t be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

Lina, Zhang; Jiang, Meng Hai.

396

Improved Catalyzed Reporter Deposition, iCARD.  

PubMed

Novel reporters have been synthesized with extended hydrophilic linkers that in combination with polymerizing cross-linkers result in very efficient reporter deposition. By utilizing antibodies to stain HER2 proteins in a cell line model it is demonstrated that the method is highly specific and sensitive with virtually no background. The detection of HER2 proteins in tissue was used to visualize individual antigens as small dots visible in a microscope. Image analysis-assisted counting of fluorescent or colored dots allowed assessment of relative protein levels in tissue. Taken together, we have developed novel reporters that improve the CARD method allowing highly sensitive in situ detection of proteins in tissue. Our findings suggest that in situ protein quantification in biological samples can be performed by object recognition and enumeration of dots, rather than intensity-based fluorescent or colorimetric assays. PMID:24852797

Lohse, Jesper; Petersen, Kenneth Heesche; Woller, Nina Claire; Pedersen, Hans Christian; Skladtchikova, Galina; Jørgensen, Rikke Malene

2014-06-18

397

ACAA fly ash basics: quick reference card  

SciTech Connect

Fly ash is a fine powdery material created when coal is burned to generate electricity. Before escaping into the environment via the utility stacks, the ash is collected and may be stored for beneficial uses or disposed of, if necessary. The use of fly ash provides environmental benefits, such as the conservation of natural resources, the reduction of greenhouse gas emissions and eliminating the needed for ash disposal in landfills. It is also a valuable mineral resource that is used in construction and manufacturing. Fly ash is used in the production of Portland cement, concrete, mortars and stuccos, manufactured aggregates along with various agricultural applications. As mineral filler, fly ash can be used for paints, shingles, carpet backing, plastics, metal castings and other purposes. This quick reference card is intended to provide the reader basic source, identification and composition, information specifically related to fly ash.

NONE

2006-07-01

398

Investigating customer racial discrimination in the secondary baseball card market.  

PubMed

A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price. PMID:21337740

Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M

2011-01-01

399

Expanding Access  

ERIC Educational Resources Information Center

There is no question that the United States lags behind most industrialized nations in consumer access to broadband Internet service. For many policy makers and activists, this shortfall marks the latest phase in the struggle to overcome the digital divide. To remedy this lack of broadband affordability and availability, one start-up firm--with…

Roach, Ronald

2007-01-01

400

Access Denied  

ERIC Educational Resources Information Center

As faculty members add online and multimedia elements to their courses, colleges and universities across the country are realizing that there is a lot of work to be done to ensure that disabled students (and employees) have equal access to course material and university websites. Unfortunately, far too few schools consider the task a top priority.…

Raths, David

2012-01-01

401

WTO Accession, \\  

Microsoft Academic Search

This paper evaluates the impact of China's WTO accession on trade and economic relation across the Taiwan Strait and its implications for rest of the world by a recursive dynamic, 17-region, 25- sector computable general equilibrium (CGE) model with import embodied technology transfer, trade policy induced total factor productivity (TFP) growth, and explicit treatment of TRQ of agricultural products. The

Zhi Wang

402

Market Access  

Microsoft Academic Search

The negotiation of improved market access in agriculture is crucial to the success of the Doha Round. The depth of tariff cuts will be the main indication of the level of ambition of the agricultural talks and hence the Round as a whole. Agricultural tariffs remain five times higher than tariffs in industrial goods, and account for the bulk of

Mario Jales; Timothy E. Josling; Andre Meloni Nassar; M. Ann Tutwiler

2005-01-01

403

Sensitivity analysis on resource access control in mobile networks  

NASA Astrophysics Data System (ADS)

In recent years, there has been tremendous interests and progresses in the field of wireless communications. Call admission control (CAC) is the key component to maximize the system utilization under certain QoS constraints such as call blocking rates. Among the CACs, Markov decision process (MDP) approach is a popular method to optimize certern objectives of interest. However, the computation complexity for deriving optimal policies make this approach less accessible to those with large problem size. In this paper, we will address this issue of how the optimal solutions fluctuate as the traffic condition changed using sensitivity analysis technique, in order to cut down unnecessary computing time if optimal policy did not change as the traffic conditions vary. First of all, the LP problem is solved by simplex method to examine the best policy when the optimal solution is found, then the sensitivity analysis technique is used by adding perturbation on traffic parameters to indicate the range to which optimal bases are invariant. The analytical results for computation complexity reduction is shown to analyze the performance under various traffic conditions.

Chen, Huan; Cheng, Chih-Chuan; Chi, Mei-Hsiu; Yeh, Hsi-Hsun

2004-10-01

404

Common read-out receiver card for ALICE Run2  

NASA Astrophysics Data System (ADS)

ALICE at CERN LHC uses custom FPGA-based computer plug-in cards as interface between the optical detector read-out link and the PC clusters of Data Acquisition (DAQ) and High-Level Trigger (HLT). The cards used at DAQ and HLT during Run1 have been developed as independent projects and are now facing similar problems with obsolete major interfaces and limited link speeds and processing capabilities. A new common card has been developed to enable the upgrade of the read-out chain towards higher link rates while providing backward compatibility with the current architecture. First prototypes could be tested successfully and raised interest from other collaborations.

Engel, H.; Kebschull, U.

2013-12-01

405

Plain and Rolled Images from Paired Fingerprint Cards  

National Institute of Standards and Technology Data Gateway

NIST Plain and Rolled Images from Paired Fingerprint Cards (PC database for purchase)   NIST Special Database 29 is being distributed for use in development and testing fingerprint matching systems. The data consist of 216 ten-print fingerprint card pairs with both the rolled and plains (from a bottom of the fingerprint card) scanned at 19.7 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

406

Mated Fingerprint Card Pairs (Volumes 1-5)  

National Institute of Standards and Technology Data Gateway

NIST Mated Fingerprint Card Pairs (Volumes 1-5) (PC database for purchase)   The NIST database of mated fingerprint card pairs (Special Database 9) consists of multiple volumes. Currently five volumes have been released. Each volume will be a 3-disk set with each CD-ROM containing 90 mated card pairs of segmented 8-bit gray scale fingerprint images (900 fingerprint image pairs per CD-ROM). A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

407

Nuclear Wallet Cards from the National Nuclear Data Center (NNDC)  

DOE Data Explorer

Nuclear Wallet Cards present properties for ground and isomeric states of all known nuclides. Properties given are: spin and parity assignments, nuclear mass excesses, half-life, isotopic abundances, and decay modes. Appendices contain properties of elements, fundamental constants and other useful information. Nuclear Wallet Cards booklet is published by the National Nuclear Data Center and its electronic (current) version is periodically updated. The Nuclear Wallet Cards by Dr. Jagdish K. Tuli, presently in its 8th edition, is distributed in print as well as in PDA-adaptable Palm Pilot format; the data table as an ASCII file is available upon request. [Taken from http://www.nndc.bnl.gov/wallet/

Tuli, Jagdish K.

408

31 CFR 594.410 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 594.410 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

409

31 CFR 598.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 598.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

410

31 CFR 547.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 547.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

411

31 CFR 593.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 593.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

412

31 CFR 542.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 542.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

413

31 CFR 546.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 546.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

414

31 CFR 548.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 548.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

415

31 CFR 536.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 536.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

416

31 CFR 549.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 549.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

417

31 CFR 560.428 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 560.428 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

418

31 CFR 544.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 544.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

419

31 CFR 588.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 588.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

420

31 CFR 541.408 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 541.408 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

421

31 CFR 543.409 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 543.409 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

422

31 CFR 576.410 - Credit extended and cards issued by U.S. financial institutions.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Credit extended and cards issued by U.S. financial...Interpretations § 576.410 Credit extended and cards issued by U.S. financial...to, charge cards, debit cards, or other credit facilities issued by a...

2013-07-01

423

A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards  

Microsoft Academic Search

Authentic program modification is very important for a multi-application smart card system since ap- plications in the system are realized after the is- suance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string

Mohammad Mesbah Uddin; Salahuddin Muhammad Salim Zabir; Yasunobu Nohara; Hiroto Yasuura

2008-01-01

424

Measuring credit card industry chargeoffs: a review of sources and methods  

Microsoft Academic Search

The percentage of credit card loans that are charged off by card issuers during a particular month or quarter is an important metric. It provides insights into the financial health of the credit card industry and the U.S. consumer. After offering a brief overview of credit card chargeoff reporting, this paper describes five different chargeoff statistics in detail. Sampling techniques,

Mark Furletti

2003-01-01

425

Offender Organization and Victim ResponsesCredit Card Fraud in International Perspective  

Microsoft Academic Search

Tremblay and colleagues have advanced some important insights into the nature of credit card fraud, especially counterfeit card, markets in Canada. This study examines the international applicability of these findings and presents some data about the nature of credit card fraud in contemporary North America and the United Kingdom, showing how card issuers, merchant acquirers, and retailers seek to cope

MICHAEL LEVI

1998-01-01

426

Effectiveness of a 'Green Card' Intervention for Patients Engaging in Deliberate Self-harm  

Microsoft Academic Search

A service enhancement program for deliberate self-harm (DSH) patients in two area mental health services in New South Wales, Australia, examined the effectiveness of emergency cards ('Green Cards') in enhancing patients' return rates, and perceived effectiveness by service personnel. Eighty-four percent of patients receiving a Card attended their appointment, compared with 40% receiving another form of referral. The Card did

Michael Dudley; John Beard; Adam Clarke; Michelle Knowles; Richard Buss; Vivienne Schnieden; Stewart Einfeld; Margaret Tobin; Uta Dietrich

2003-01-01

427

Unified Science and Mathematics for Elementary Schools (USMES) "How To" Design Lab Tech Cards.  

ERIC Educational Resources Information Center

These activity cards, developed by the Unified Science and Mathematics for Elementary Schools (USMES) Project, are divided into 18 groups. The first group of cards are Design Lab Tech Cards; the remaining groups are "How To" Cards. They include: (1) How To Construct a Sampling Histogram; (2) How To Make a Bar Graph Tally; (3) How To Make Scale…

Unified Science and Mathematics for Elementary Schools, Newton, MA.

428

A programming and a modelling perspective on the evaluation of Java Card implementations  

Microsoft Academic Search

Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream Java that may restrict the benefits of using Java achievable in smartcard programming. In particular, efforts towards evaluating Java Card

Pieter H. Hartel; Eduard De Jong

2000-01-01

429

Using B Method to Formalize the Java Card Runtime Security Policy for a Common Criteria Evaluation  

Microsoft Academic Search

A smart card is an embedded system that is generally used to supply security to an information system. Traditionally the application and the OS were developed in a secure environment by the card issuer. For a few years, open platforms (e.g., Java Card, MultOS and Smart Card for Windows) have provided new facilities for application develop- ers. They allow dynamic

Stephanie Motre; Corinne Teri

2000-01-01

430

Using B Method to Formalize the Java Card Runtime Security Policy for a Common Criteria Evaluation  

Microsoft Academic Search

A smart card is an embedded system that is generally used to supply security to an information system. Traditionally the application and the OS were developed in a secure environment by the card issuer. For a few years, open platforms (e.g., Java Card, MultOS and Smart Card for Windows) have provided new facilities for application developers. They allow dynamic storage

Stéphanie Motré

431

Measuring Up 2004: The State Report Card on Higher Education. Kansas  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

432

Measuring Up 2004: The State Report Card on Higher Education. Alaska  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

433

Measuring Up 2004: The State Report Card on Higher Education. New Hampshire  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

434

Measuring Up 2004: The State Report Card on Higher Education. Montana  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

435

Measuring Up 2004: The State Report Card on Higher Education. Pennsylvania  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

436

Measuring Up 2004: The State Report Card on Higher Education. Virginia  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

437

Measuring Up 2004: The State Report Card on Higher Education. North Carolina  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

438

Measuring Up 2004: The State Report Card on Higher Education. California  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

439

Measuring Up 2004: The State Report Card on Higher Education. Idaho  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

440

Measuring Up 2004: The State Report Card on Higher Education. Connecticut  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

441

Measuring Up 2004: The State Report Card on Higher Education. Oregon  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

442

Measuring Up 2004: The State Report Card on Higher Education. Arkansas  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

443

Measuring Up 2004: The State Report Card on Higher Education. Wyoming  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

444

Measuring Up 2004: The State Report Card on Higher Education. Nebraska  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

445

Measuring Up 2004: The State Report Card on Higher Education. North Dakota  

ERIC Educational Resources Information Center

This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card grades states in six…

National Center for Public Policy and Higher Education, 2004

2004-01-01

446

Credit cards in a Chinese cultural context—The young, affluent Chinese as early adopters  

Microsoft Academic Search

This research examines the attitudes of early adopters towards holding and using credit cards, especially how the ‘young and affluent Chinese’ view credit cards, in the Chinese cultural context. The findings indicate that frequent users of credit cards are more inclined to agree that: they display traits of new product adopters; credit cards offer them greater convenience; and others regard

Steve Worthington; Frauke Mattison Thompson; David B. Stewart

2011-01-01

447

Micropayments for e-commerce transactions: a solution to credit card use in Thailand?  

Microsoft Academic Search

Online payments in eCommerce are usually carried out with credit cards because they are the most convenient to use. Web sites that do not accept credit cards risk losing their customers. Yet potential customers do not include only credit card holders. There are a lot of potential customers who do not have credit cards, some for cultural reasons, others because

Amnuay Ekasdornkorn; Brian Corbitt; Utomporn Phalavonk

448

Overview of Security Threats for Smart Cards in the Public Transport Industry  

Microsoft Academic Search

The advantages of utilising smart card technology, more importantly contactless smart cards, in the transport industry have long been realised. In this paper we provide an overview of the generic security issues and threats encountered whenever smart cards are utilised within the transport industry. To help highlight the issues, we analyse the different types of cards, their hosted applications, along

Konstantinos Markantonakis; Keith Mayes; Damien Sauveron; Ioannis G. Askoxylakis

2008-01-01

449

Noncanonical G? Gib2 Is a Scaffolding Protein Promoting cAMP Signaling through Functions of Ras1 and Cac1 Proteins in Cryptococcus neoformans.  

PubMed

G?-like/RACK1 functions as a key mediator of various pathways and contributes to numerous cellular functions in eukaryotic organisms. In the pathogenic fungus Cryptococcus neoformans, noncanonical G? Gib2 promotes cAMP signaling in cells lacking normal Gpa1 function while displaying versatility in interactions with G? Gpa1, protein kinase Pkc1, and endocytic intersectin Cin1. To elucidate the Gib2 functional mechanism(s), we demonstrate that Gib2 is required for normal growth and virulence. We show that Gib2 directly binds to Gpa1 and G? Gpg1/Gpg2 and that it interacts with phosphodiesterase Pde2 and monomeric GTPase Ras1. Pde2 remains functionally dispensable, but Ras1 is found to associate with adenylyl cyclase Cac1 through the conserved Ras association domain. In addition, the ras1 mutant exhibits normal capsule formation, whereas the ras1 gpa1 mutant displays enhanced capsule formation, and the ras1 gpa1 cac1 mutant is acapsular. Collectively, these findings suggest that Gib2 promotes cAMP levels by relieving an inhibitory function of Ras1 on Cac1 in the absence of Gpa1. In addition, using GST affinity purification combined with mass spectrometry, we identified 47 additional proteins that interact with Gib2. These proteins have putative functions ranging from signal transduction, energy generation, metabolism, and stress response to ribosomal function. After establishing and validating a protein-protein interactive network, we believe Gib2 to be a key adaptor/scaffolding protein that drives the formation of various protein complexes required for growth and virulence. Our study reveals Gib2 as an essential component in deciphering the complexity of regulatory networks that control growth and virulence in C. neoformans. PMID:24659785

Wang, Yanli; Shen, Gui; Gong, Jinjun; Shen, Danyu; Whittington, Amy; Qing, Jiang; Treloar, Joshua; Boisvert, Scott; Zhang, Zhengguang; Yang, Cai; Wang, Ping

2014-05-01

450

Establishment of a Dollar Threshold to Preclude Credit Card Reconciliation.  

National Technical Information Service (NTIS)

The government credit card program was instituted to streamline the federal acquisition process for material that costs less than $2,500 (small purchases). However, the reconciliation procedures were not streamlined. All dollar value discrepancies between...

K. Waskow

1998-01-01

451

Context Inference for Static Analysis of Java Card Object Sharing  

Microsoft Academic Search

This article presents an analysis to statically check the JavaCard sharing policy. From the program text, both the violation and theguaranty of correctness can be detected in certain cases avoiding Runtimeexception.

Denis Caromel; Ludovic Henrio; Bernard P. Serpette

2001-01-01

452

Credit Cards, Economization of Money, and Interest Rates.  

ERIC Educational Resources Information Center

Focuses on the effect of interest rates on the increased use of credit cards, a popular method of financing households. Uses three models to demonstrate that interest rates must rise, resulting in increased consumption expenditures. (CMK)

Steindl, Frank G.

2000-01-01

453

The Vocational Card Sort: A Tool for Vocational Exploration  

ERIC Educational Resources Information Center

The Vocational Card Sort (VCS) is compared with the vocational inventory and differences in tasks required and information obtained are discussed. VCS procedures and modifications are discussed as well. (Author)

Williams, S. Kelly, Jr.

1978-01-01

454

Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic  

Microsoft Academic Search

We present an extension to JAVA CARD Dynamic Logic, a program logic for reasoning about JAVA CARD programs, to handle JAVA CARD's so-called non-atomic methods. Although JAVA CARD DL already supports the atomic transaction mechanism of JAVA CARD, non-atomic methods present an additional challenge: state updates triggered by such a non-atomic method are not subjected to any transaction that may

Wojciech Mostowski

2006-01-01

455

Credit Card Fraud Detection with Artificial Immune System  

Microsoft Academic Search

We apply Articial Immune Systems(AIS) (4) for credit card fraud detection and we compare it to other methods such as Neural Nets(NN) (8) and Bayesian Nets(BN) (2), Naive Bayes(NB) and Deci- sion Trees(DT) (13). Exhaustive search and Genetic Algorithm(GA) (7) are used to select optimized parameters sets, which minimizes the fraud cost for a credit card database provided by a

Manoel Fernando Alonso Gadi; Xidi Wang; Alair Pereira Do Lago

2008-01-01

456

Formalization in Coq of the Java Card virtual machine  

Microsoft Academic Search

Abstract: IntroductionJava has quickly become a standard for Internet and, through Java Card, for smartcard programming,putting security issues at stake. Yet recent research has unveiled several problems in the Java Card securitymodel, most notably with object sharing and the associated mechanism of shareable interfaces, see e.g. [10,17]there are further security breaches related to some Java features not present in Java

G. Barthe; G. Dufay; L. Jakubiec; B. Serpette; S. Sousa; S. Yu

457

Towards Secure Bytecode Verification on a Java Card  

Microsoft Academic Search

There is a growing interest for using "intelligent" or "smart" cards such as Sun'sJava Cards, because of the independence they offer their users by having an on-cardmicroprocessor. Furthermore we have, during the last decade, become accustomedto global, fast and flexible information exchange, as offered by the Internet. Hencean incipient interest has emerged for combining the independence of a Java Cardwith

Eva Rose

1998-01-01

458

A Java processor suitable for applications of smart card  

Microsoft Academic Search

Starting from the Java Card Virtual Machine (JCVM) specification and the picoJava-II architecture, a pipelined Java card processor has been designed. It implements all of JCVM bytecodes with 16-bit operands in three different ways according to the complexity of their functions. It utilizes a one-read one-write dual-port RAM as Java stack in order to reduce the consumption of limited memory

Zhang Jianjie; Li Feihui; Ge Yuanqing; Yue Zhenwu; Yang Zhilian

2001-01-01

459

Riffle shuffles of a deck with repeated cards  

Microsoft Academic Search

We study the Gilbert-Shannon-Reeds model for riffle shuffles and ask 'How many times must a deck of cards be shuffled for the deck to be in close to random order?'. In 1992, Bayer and Diaconis gave a solution which gives exact and asymptotic results for all decks of practical interest, e.g. a deck of 52 cards. But what if one

Sami Assaf; Persi Diaconis; K. Soundararajan

2009-01-01

460

Optoelectronic DNA chip-based integrated card for clinical diagnostics  

Microsoft Academic Search

Clinical diagnostics is one of the most promising applications for microfluidic lab-on-a-chip or lab-on-card systems. DNA\\u000a chips, which provide multiparametric data, are privileged tools for genomic analysis. However, automation of molecular biology\\u000a protocol and use of these DNA chips in fully integrated systems remains a great challenge. Simplicity of chip and\\/or card\\/instrument\\u000a interfaces is amongst the most critical issues to

Gilles Marchand; Patrick Broyer; Véronique Lanet; Cyril Delattre; Frédéric Foucault; Lionel Menou; Bernard Calvas; Denis Roller; Frédéric Ginot; Raymond Campagnolo; Frédéric Mallard

2008-01-01

461

Structure of the CAC1 gene and in situ characterization of its expression. The Arabidopsis thaliana gene coding for the biotin-containing subunit of the plastidic acetyl-coenzyme A carboxylase.  

PubMed Central

The CAC1 gene of Arabidopsis thaliana that codes for the biotin carboxyl-carrier subunit of the heteromeric acetyl-coenzyme A carboxylase was isolated and sequenced. CAC1 is a single-copy gene interrupted by six introns. Subcellular immunogold labeling indicates that the biotin carboxyl-carrier subunit is localized in the stroma of the plastids and chloroplasts. The CAC1 mRNA accumulates throughout developing embryos and ovules of siliques at a time of rapid growth and oil accumulation (7 d after flowering), but is present at much lower levels in wall cells and central septal cells of the silique. Immunolocalization studies show that the pattern of accumulation of the biotin carboxyl-carrier subunit within the siliques and leaves is similar to that of the CAC1 mRNA. These observations indicate that the cellular pattern of biotin carboxyl-carrier protein accumulation in the developing silique may be determined by the transcriptional activity of the CAC1 gene.

Ke, J; Choi, J K; Smith, M; Horner, H T; Nikolau, B J; Wurtele, E S

1997-01-01

462

Materialism and credit card use by college students.  

PubMed

Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use. PMID:10840923

Pinto, M B; Parente, D H; Palmer, T S

2000-04-01

463

Mycoplasma pneumoniae CARDS toxin induces pulmonary eosinophilic and lymphocytic inflammation.  

PubMed

Mycoplasma pneumoniae causes acute and chronic lung infections in humans, leading to a variety of pulmonary and extrapulmonary sequelae. Of the airway complications of M. pneumoniae infection, M. pneumoniae-associated exacerbation of asthma and pediatric wheezing are emerging as significant sources of human morbidity. However, M. pneumoniae products capable of promoting allergic inflammation are unknown. Recently, we reported that M. pneumoniae produces an ADP-ribosylating and vacuolating toxin termed the community-acquired respiratory distress syndrome (CARDS) toxin. Here we report that naive mice exposed to a single dose of recombinant CARDS (rCARDS) toxin respond with a robust inflammatory response consistent with allergic disease. rCARDS toxin induced 30-fold increased expression of the Th-2 cytokines IL-4 and IL-13 and 70- to 80-fold increased expression of the Th-2 chemokines CCL17 and CCL22, corresponding to a mixed cellular inflammatory response comprised of a robust eosinophilia, accumulation of T cells and B cells, and mucus metaplasia. The inflammatory responses correlate temporally with toxin-dependent increases in airway hyperreactivity characterized by increases in airway restriction and decreases in lung compliance. Furthermore, CARDS toxin-mediated changes in lung function and histopathology are dependent on CD4(+) T cells. Altogether, the data suggest that rCARDS toxin is capable of inducing allergic-type inflammation in naive animals and may represent a causal factor in M. pneumoniae-associated asthma. PMID:22281984

Medina, Jorge L; Coalson, Jacqueline J; Brooks, Edward G; Winter, Vicki T; Chaparro, Adriana; Principe, Molly F R; Kannan, Thirumalai R; Baseman, Joel B; Dube, Peter H

2012-06-01

464

Smart Cards for Transit: Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment.  

National Technical Information Service (NTIS)

The purpose of this project is to provide the Federal Transit Administration (FTA) with relevant information on existing, and future, stored readable/writable data card technology for fare and toll payment. This project coincides with the FTA's objective ...

W. R. Bushnell

1995-01-01

465

Comprehensive aerological reference data set (CARDS)  

SciTech Connect

The possibility of anthropogenic climate change has reached the attention of Government officials and researchers. However, one cannot study climate change without climate data. The CARDS project will produce high-quality upper-air data for the research community and for policy-makers. The authors intend to produce a dataset which is: easy to use, as complete as possible, as free of random errors as possible. They will also attempt to identify biases and remove them whenever possible. In this report, they relate progress toward their goal. They created a robust new format for archiving upper-air data, and designed a relational database structure to hold them. The authors have converted 13 datasets to the new format and have archived over 10,000,000 individual soundings from 10 separate data sources. They produce and archive a metadata summary of each sounding they load. They have researched station histories, and have built a preliminary upper-air station history database. They have converted station-sorted data from their primary database into synoptic-sorted data in a parallel database. They have tested and will soon implement an advanced quality-control procedure, capable of detecting and often repairing errors in geopotential height, temperature, humidity, and wind. This unique quality-control method uses simultaneous vertical, horizontal, and temporal checks of several meteorological variables. It can detect errors other methods cannot.

Eskridge, R.E.; Polansky, A.C.; Alduchov, O.A. [National Oceanic and Atmospheric Administration, Asheville, NC (United States). National Climatic Data Center] [and others

1997-11-01

466

Linking Management Actions to Interactive Ecosystem Report Cards via an Ontology  

NASA Astrophysics Data System (ADS)

IINTRODUCTION The Health-e-Waterways Project is a three way collaboration between the University of Queensland, Microsoft Research and the Healthy Waterways Partnership (SEQ-HWP)(over 60 local government, state agency, universities, community and environmental organizations). The project is developing a highly innovative framework and set of services to enable streamlined access to an integrated collection of real- time, near-real-time and static datasets acquired through ecosystem monitoring programs in South East Queensland. Using a novel combination of semantic web technologies, scientific data servers, web services, GIS visualization interfaces and scientific workflows, we are enabling the sharing and integration of high quality data and models, through a combined integrated water information management system and Web portal. DYNAMIC GENERATION OF ECOSYSTEM HEALTH REPORT CARDS SEQ-HWP is responsible for the Ecosystem Health Monitoring Program (EHMP) in South East Queensland. This currently involves sampling 30 freshwater indicators at 100 sites twice a year and 250 estuarine/marine sites every month. The EHMP data sets are statistically aggregated and standardized to produce ecosystem health grades that are published annually in hard copy EHMP Report Cards. Politicians and planners use the report cards to make decisions with respect to land use, water quality, allocations and investments in water recycling plants etc. To date, these report cards have been largely produced manually, by calculating standardized scores (0-1) across 5 indicators and 16 indices (physical, chemical, nutrients, ecosystem processes, acquatic macroinvertebrates and fish) and grades from A-F for each catchment and season (spring and autumn). Currently this process takes about 5 months. For the past 6 months, we have been working with the SEQ-HWP staff, developing software services that will enable the report cards to be generated dynamically via a Web-based Map interface to an underlying database that contains the EHMP water quality and quantity monitoring data. The GUI enables users to specify and query: - Spatial regions of interest through a GoogleEarth or the Microsoft VirtualEarth interface. - Concepts or indicators of interest through the EHMPOntology. - Seasons or years of interest through a timeline. A Report Card Grade is generated for the specified catchment and period. Users can retrieve raw data by clicking on a grade this displays the corresponding EcoH plot, dynamically generated from the 5 indicators in the underlying SQL Server database. Clicking on an EcoH plot, displays the actual raw data (16 indices) used to generate the indicators and plots. CONCLUSIONS Numerous state, national and international agencies are advocating the need for standardized frameworks and procedures for environmental accounting. The Health-e-Waterways project provides an ideal model for delivering a standardized approach to the aggregation of ecosystem health monitoring data and the generation of dynamic, interactive Report Cards (that incorporate links back to the raw data sets). The system we have described here will not only save agencies significant time and money, but it can be used to guide regional, state and national environmental policy development, based on accurate and timely evidential data.

Alabri, A.; Newman, A.; Abal, E.; van Ingen, C.; Hunter, J.

2008-12-01

467

Genetic profiling reveals cross-contamination and misidentification of 6 adenoid cystic carcinoma cell lines: ACC2, ACC3, ACCM, ACCNS, ACCS and CAC2.  

PubMed

Adenoid cystic carcinoma (ACC) is the second most common malignant neoplasm of the salivary glands. Most patients survive more than 5 years after surgery and postoperative radiation therapy. The 10 year survival rate, however, drops to 40%, due to locoregional recurrences and distant metastases. Improving long-term survival in ACC requires the development of more effective systemic therapies based on a better understanding of the biologic behavior of ACC. Much preclinical research in this field involves the use of cultured cells and, to date, several ACC cell lines have been established. Authentication of these cell lines, however, has not been reported. We performed DNA fingerprint analysis on six ACC cell lines using short tandem repeat (STR) examinations and found that all six cell lines had been contaminated with other cells. ACC2, ACC3, and ACCM were determined to be cervical cancer cells (HeLa cells), whereas the ACCS cell line was composed of T24 urinary bladder cancer cells. ACCNS and CAC2 cells were contaminated with cells derived from non-human mammalian species: the cells labeled ACCNS were mouse cells and the CAC2 cells were rat cells. These observations suggest that future studies using ACC cell lines should include cell line authentication to avoid the use of contaminated or non-human cells. PMID:19557180

Phuchareon, Janyaporn; Ohta, Yoshihito; Woo, Jonathan M; Eisele, David W; Tetsu, Osamu

2009-01-01

468

36 CFR 1254.84 - How may I use a debit card for copiers in the Washington, DC, area?  

Code of Federal Regulations, 2013 CFR

...an account using cash, check, money order, debit card, or credit card. Your researcher identification card number as encoded...in part 1253 of this chapter, you may use cash or credit card to purchase a debit card from the vending...

2013-07-01

469

Enhancing E-Commerce Processes with Alerts and Web Services: A Case Study on Online Credit Card Payment Notification  

Microsoft Academic Search

Nowadays using credit card to purchase on Web is very popular. To maximize the security of transactions, credit card providers use secure processing services to encrypt the credit card information. But if an unauthorized person knows the credit card information, he can still perform any payment illegally. To address this problem, we design a Notified Credit Card Payment System (NCCPS)

WINNIE N. Y. YAN; DICKSON K. W. CHIU

2007-01-01

470

Comparison of Vitek GNI and GNI+ Cards for Identification of Gram-Negative Bacteria  

PubMed Central

The GNI+ card has been developed by bioMerieux Vitek as an improvement over the GNI card for the identification of certain species of aerobic and facultative anaerobic bacteria. In this study, we tested 304 organisms from 30 different species on both the GNI and GNI+ cards. The GNI card correctly identified 285 (93.8%) of the isolates tested, and the GNI+ card correctly identified 287 (94.4%) of the isolates tested. The average time to reporting was 4.1 h for the GNI+ card compared to 5.7 h for the GNI card (P < 0.001). Overall, the GNI and GNI+ cards were comparable in identifying the organisms in this study while the GNI+ card gave substantially faster final test results.

Bourbeau, Paul P.; Heiter, Barbara J.

1998-01-01

471

GeneCards Version 3: the human gene integrator  

PubMed Central

GeneCards (www.genecards.org) is a comprehensive, authoritative compendium of annotative information about human genes, widely used for nearly 15 years. Its gene-centric content is automatically mined and integrated from over 80 digital sources, resulting in a web-based deep-linked card for each of >73 000 human gene entries, encompassing the following categories: protein coding, pseudogene, RNA gene, genetic locus, cluster and uncategorized. We now introduce GeneCards Version 3, featuring a speedy and sophisticated search engine and a revamped, technologically enabling infrastructure, catering to the expanding needs of biomedical researchers. A key focus is on gene-set analyses, which leverage GeneCards’ unique wealth of combinatorial annotations. These include the GeneALaCart batch query facility, which tabulates user-selected annotations for multiple genes and GeneDecks, which identifies similar genes with shared annotations, and finds set-shared annotations by descriptor enrichment analysis. Such set-centric features address a host of applications, including microarray data analysis, cross-database annotation mapping and gene-disorder associations for drug targeting. We highlight the new Version 3 database architecture, its multi-faceted search engine, and its semi-automated quality assurance system. Data enhancements include an expanded visualization of gene expression patterns in normal and cancer tissues, an integrated alternative splicing pattern display, and augmented multi-source SNPs and pathways sections. GeneCards now provides direct links to gene-related research reagents such as antibodies, recombinant proteins, DNA clones and inhibitory RNAs and features gene-related drugs and compounds lists. We also portray the GeneCards Inferred Functionality Score annotation landscape tool for scoring a gene’s functional information status. Finally, we delineate examples of applications and collaborations that have benefited from the GeneCards suite. Database URL: www.genecards.org

Safran, Marilyn; Dalah, Irina; Alexander, Justin; Rosen, Naomi; Iny Stein, Tsippi; Shmoish, Michael; Nativ, Noam; Bahir, Iris; Doniger, Tirza; Krug, Hagit; Sirota-Madi, Alexandra; Olender, Tsviya; Golan, Yaron; Stelzer, Gil; Harel, Arye; Lancet, Doron

2010-01-01

472

GeneCards Version 3: the human gene integrator.  

PubMed

GeneCards (www.genecards.org) is a comprehensive, authoritative compendium of annotative information about human genes, widely used for nearly 15 years. Its gene-centric content is automatically mined and integrated from over 80 digital sources, resulting in a web-based deep-linked card for each of >73,000 human gene entries, encompassing the following categories: protein coding, pseudogene, RNA gene, genetic locus, cluster and uncategorized. We now introduce GeneCards Version 3, featuring a speedy and sophisticated search engine and a revamped, technologically enabling infrastructure, catering to the expanding needs of biomedical researchers. A key focus is on gene-set analyses, which leverage GeneCards' unique wealth of combinatorial annotations. These include the GeneALaCart batch query facility, which tabulates user-selected annotations for multiple genes and GeneDecks, which identifies similar genes with shared annotations, and finds set-shared annotations by descriptor enrichment analysis. Such set-centric features address a host of applications, including microarray data analysis, cross-database annotation mapping and gene-disorder associations for drug targeting. We highlight the new Version 3 database architecture, its multi-faceted search engine, and its semi-automated quality assurance system. Data enhancements include an expanded visualization of gene expression patterns in normal and cancer tissues, an integrated alternative splicing pattern display, and augmented multi-source SNPs and pathways sections. GeneCards now provides direct links to gene-related research reagents such as antibodies, recombinant proteins, DNA clones and inhibitory RNAs and features gene-related drugs and compounds lists. We also portray the GeneCards Inferred Functionality Score annotation landscape tool for scoring a gene's functional information status. Finally, we delineate examples of applications and collaborations that have benefited from the GeneCards suite. Database URL: www.genecards.org. PMID:20689021

Safran, Marilyn; Dalah, Irina; Alexander, Justin; Rosen, Naomi; Iny Stein, Tsippi; Shmoish, Michael; Nativ, Noam; Bahir, Iris; Doniger, Tirza; Krug, Hagit; Sirota-Madi, Alexandra; Olender, Tsviya; Golan, Yaron; Stelzer, Gil; Harel, Arye; Lancet, Doron

2010-01-01

473

75 FR 55392 - Employment Network Report Card  

Federal Register 2010, 2011, 2012, 2013

...or visit our Internet site, Social Security Online, at http...Access and Support Services Web site that will be a feature...Program Manager contract. The Web site will also include a monitored...J. Astrue, Commissioner of Social Security. [FR Doc....

2010-09-10

474

Using the Sound Card as a Timer  

ERIC Educational Resources Information Center

Experiments in mechanics often involve measuring time intervals much smaller than one second, a task that is hard to perform with handheld stopwatches. This is one of the reasons why photogate timers are so popular in school labs. There is an interesting alternative to stopwatches and photogates, easily available if one has access to a personal…

Aguiar, C. E.; Pereira, M. M.

2011-01-01

475

Generating DNA profiles from immunochromatographic cards using LCN methodology.  

PubMed

The aim of this research was to obtain DNA profiles from immunochromatographic test devices which have already yielded positive results with body fluids obtained from fourteen volunteers. Three different immunochromatographic cards for the identification of human blood and one for the identification of human saliva were used for this research. Each body fluid was detected using the appropriate immunochromatographic card. The used cards were kept at room temperature for various lengths of time. The membranes were removed at the end of the designated times and the entire strip was extracted using low copy number (LCN) extraction procedure. The extracted DNA was amplified using reduced amplification volume and higher PCR cycle numbers. Autosomal STR profiles were detected using AmpF?STR(®) Identifiler™ PCR Amplification Kit from Applied Biosystems (AB). Additionally, DNA extracted from the male volunteers was amplified using the AB AmpF?STR(®) Yfiler™ PCR Amplification Kit. Analysis of the amplified products was carried out by capillary electrophoresis injection on the AB 3130xl Genetic Analyzer. The generated DNA data was analyzed using the SoftGenetics GeneMarker(®) HID Version 1.7 software. Autosomal and Y-STR DNA profiles were obtained from most of the cards which were stored at room temperature for up to three months. DNA profile was obtained from all four types of the immunochromatographic cards used in this study. These profiles were concordant with the profiles obtained from the donors' reference samples. PMID:20457072

Ho, Thanh-Tam; Roy, Reena

2011-06-01

476

Rapid Folding and Unfolding of Apaf-1 CARD  

PubMed Central

Caspase recruitment domains (CARDs) are members of the death domain superfamily and contain six antiparallel helices in an ?-helical Greek key topology. We have examined the equilibrium and kinetic folding of the CARD of Apaf-1 (apoptotic protease activating factor 1), which consists of ninety-seven amino acids, at pH 6 and pH 8. The results showed that an apparent two state equilibrium mechanism is not adequate to describe the folding of Apaf-1 CARD at either pH, suggesting the presence of intermediates in equilibrium unfolding. Interestingly, the results showed that the secondary structure is less stable than the tertiary structure, based on the transition midpoints for unfolding. Single mixing and sequential mixing stopped-flow studies showed that Apaf-1 CARD folds and unfolds rapidly and suggests a folding mechanism that contains parallel channels with two unfolded conformations folding to the native conformation. Kinetic simulations show that a slow folding phase is described by a third conformation in the unfolded ensemble that interconverts with one or both unfolded species. Overall, the native ensemble is formed rapidly upon refolding. This is in contrast to other CARDs in which folding appears to be dominated by formation of kinetic traps.

Milam, Sara L.; Nicely, Nathan I.; Feeney, Brett; Mattos, Carla; Clark, A. Clay

2007-01-01

477

CARD11 blockade suppresses murine collagen-induced arthritis via inhibiting CARD11/Bcl10 assembly and T helper type 17 response.  

PubMed

The scaffold protein caspase recruitment domain-containing protein 11 (CARD11) is implicated in the regulation of inflammation and autoimmunity. The present study aimed to explore the role of CARD11 in the pathogenesis of rheumatoid arthritis (RA). Mice with collagen-induced arthritis (CIA) were treated with either CARD11-targeted interfering RNA (CARD11 siRNA) or control siRNA by intraperitoneal injection every 3 days after CIA establishment. The clinical score of arthritis was recorded every other day. Synovial inflammation and cartilage erosion were evaluated by histology and microcomputed tomography (micro-CT). Serum anti-type II collagen (anti-CII) antibodies and cytokines were measured by enzyme-linked immunosorbent assay (ELISA). The CARD11/Bcl10 formation and nuclear factor-kappa B (NF-?B) activation was assessed by immunoprecipitation and immunoblotting, and the percentage of T helper type 17 (Th17) cells was determined by flow cytometry. Systemic administration of CARD11 siRNA significantly reduced the clinical score of CIA severity. As indicated by the histology, joint inflammation and destruction were attenuated by CARD11 siRNA treatment. Micro-CT demonstrated less severe joint destruction in CARD11 siRNA-treated mice than in control mice. CARD11 siRNA treatment resulted in inhibition of CARD11/Bcl10 formation and the subsequent NF-?B activation. In addition, treatment with CARD11 siRNA resulted in a pronounced decrease in proinflammatory cytokines interleukin (IL)-1?, IL-6 and IL-17. Serum anti-CII antibody and the percentage of Th17 cells were also significantly reduced. CARD11 is involved in the pathogenesis of CIA by formation of the CARD11/Bcl10 complex and enhancement of the Th17 cell response. Targeting CARD11 provides a novel research direction in the development of therapeutic strategies for RA. PMID:24443940

Wang, H; Zhao, J; Zhang, H; Huang, Y; Wang, S; Tu, Q; Yang, N

2014-05-01

478

CLUB FORMATION MECHANISM FOR TRANSPORT-COMMUNITY CREDIT CARDS  

NASA Astrophysics Data System (ADS)

In this paper, the roles of transport-community cards jointly issued by a public transport firm and retails are investigated as a means to vitalize an obsolescence shopping center located in a middle of a city. When both the price of goods supplied by the retails and the transport fares affect the consumers' behavior, there exist pecuniary externality between the behaviors of the retails and transport firms. The introduction of a transport-community cards system enables to integrate a basket of goods and transport service into a single commodity; thus, the pecuniary externality can be internalized by price coordination. In addition, the paper clarifies theoretically that the transport firm initiatively decides the price of the transportation service and the retails transfer their incomes to the transport firm so that they are induced to jointly issue the transport-community cards.

Ding, Yue; Kobayashi, Kiyoshi; Nishida, Junji; Yoshida, Mamoru

479

Information Resources on Online Public Access Catalogs. A Selected ERIC Bibliography.  

ERIC Educational Resources Information Center

Sixteen articles, books, and reports published between 1978 and 1983 and cited in "Resources in Education" and "Current Index to Journals in Education" are listed in this bibliography on online public access catalogs (OPACs). Emphasis is on the movement toward computer-based alternatives to library card catalogs and user studies. Topics include…

ERIC Clearinghouse on Information Resources, Syracuse, NY.

480

Design of a real-time tax-data monitoring intelligent card system  

NASA Astrophysics Data System (ADS)

To solve the current problem of low efficiency of domestic Oil Station's information management, Oil Station's realtime tax data monitoring system has been developed to automatically access tax data of Oil pumping machines, realizing Oil-pumping machines' real-time automatic data collection, displaying and saving. The monitoring system uses the noncontact intelligent card or network to directly collect data which can not be artificially modified and so seals the loopholes and improves the tax collection's automatic level. It can perform real-time collection and management of the Oil Station information, and find the problem promptly, achieves the automatic management for the entire process covering Oil sales accounting and reporting. It can also perform remote query to the Oil Station's operation data. This system has broad application future and economic value.

Gu, Yajun; Bi, Guotang; Chen, Liwei; Wang, Zhiyuan

2009-07-01

481

Physics Matters, 1st Edition, with Student Access Card eGrade Plus 1 Term Set  

NASA Astrophysics Data System (ADS)

Written by authors who have vast experience in communicating science to general audiences, Physics Matters conveys the principles of physics in a manner that is understandable to non-majors. In a prose style that is clear, engaging, and contemporary, it pays particular attention to the relevance of physics in comprehending our modern technological society and the issues created by those technologies. It offers a broad, relatively non-mathematical, and highly readable survey of all the standard topics in physics. Before you buy, make sure you are getting the best value and all the learning tools you'll need to succeed in your course. If your professor requires eGrade Plus, you can purchase it now at no additional cost! With this special eGrade Plus package you get the new text--no highlighting, no missing pages, no food stains--an activity book with class activities, self study and homework assignments, as well as a registration code to eGrade Plus, a suite of effective learning tools to help you get a better grade. eGrade Plus gives you: A complete online version of the textbook Video experiments Student web projects Self assessment tests Homework questions with links to the relevant section of the online book eGrade Plus is a powerful online tool that provides students with an integrated suite of teaching and learning resources and an online version of the text in one easy-to-use website.

Trefil, James

2004-04-01

482

Flash Card Pass-Around (Intro to Integers, absolute value)  

NSDL National Science Digital Library

To give them an opportunity to practice double negatives and absolute values, students do several practice problems with them, but with a twist. Every student gets a flashcard with a problem on it and they are told that they need to trade their card with somebody else until they have seen all 12 problems. In this way, every student practices 12 distinct problems and must work with other students to get the cards they need, which promotes student interaction. When the activity is finished, students come together as a class to discuss the answers they got to each of the problems.

2010-01-01

483

Multi-channel Scaler Cards Improve Data Collection  

NASA Technical Reports Server (NTRS)

Scientists interested in exploring the intricacies and dynamics of Earth's climate and ecosystems continually need smaller, lighter instrumentation that can be placed onboard various sensing platforms, such as Unmanned Aerial Vehicles (UAVs). Responding to a need for improved data collection for remote atmospheric measurement systems, ASRC Aerospace Corporation, of Greenbelt, Maryland, developed a series of low-power, highly integrated, multichannel scaler (MCS) cards. The cards were designed to meet the needs of NASA's ground-based and airborne Light Detection and Ranging (LIDAR) photoncounting programs. They can rapidly collect thousands of data points during a continuous scan of the atmosphere.

2004-01-01

484

Supplemental Fingerprint Card Data (SFCD) for NIST Special Database 9  

National Institute of Standards and Technology Data Gateway

Supplemental Fingerprint Card Data (SFCD) for NIST Special Database 9 (PC database for purchase)   NIST Special Database 10 (Supplemental Fingerprint Card Data for Special Database 9 - 8-Bit Gray Scale Images) provides a larger sample of fingerprint patterns that have a low natural frequency of occurrence and transitional fingerprint classes in NIST Special Database 9. The software is the same code used with NIST Special Database 4 and 9. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

485

An Emotional Control Card for Inappropriate and Appropriate Emotions in Using Rational-Emotive Imagery.  

ERIC Educational Resources Information Center

Examines the emotional control card techniques developed by Sklare, Taylor, and Hyland (1985) to help clients more effectively use the rational-emotive imagery technique of Ellis (1974). Suggests a revision of the emotional control card technique. (NB)

Ellis, Albert

1986-01-01

486

77 FR 38396 - Agency Information Collection (One-VA Identification Verification Card) Activities Under OMB Review  

Federal Register 2010, 2011, 2012, 2013

...2900-0673] Agency Information Collection (One-VA Identification Verification Card...632-7583 or email denise.mclamb@va.gov. Please refer to ``OMB Control...SUPPLEMENTARY INFORMATION: Title: Request for One-VA Identification Card. OMB Control...

2012-06-27

487

77 FR 20889 - Proposed Information Collection (Request One-VA Identification Verification Card) Activity...  

Federal Register 2010, 2011, 2012, 2013

...Proposed Information Collection (Request One-VA Identification Verification Card...DC 20420 or email: john.hancock@va.gov. Please refer to ``OMB Control...information technology. Title: Request for One-VA Identification Card. OMB Control...

2012-04-06

488

77 FR 65166 - Information Collection; Request for Comment; Visitor Permit and Visitor Registration Card  

Federal Register 2010, 2011, 2012, 2013

...Service Information Collection; Request for Comment; Visitor Permit and Visitor Registration Card AGENCY: Forest Service, USDA...currently approved information collection, 0596-0019 (Visitor Permit and Visitor Registration Card)....

2012-10-25

489

75 FR 75725 - Financial Management Service; Proposed Collection of Information: Tax Time Card Account Pilot...  

Federal Register 2010, 2011, 2012, 2013

...Fiscal Service Financial Management Service; Proposed Collection...of Information: Tax Time Card Account Pilot...Study AGENCY: Financial Management Service, Fiscal Service...notice, the Financial Management Service solicits comments concerning the ``Tax Time Card Account Pilot...

2010-12-06

490

75 FR 8156 - Electronic Game Card, Inc.; Order of Suspension of Trading  

Federal Register 2010, 2011, 2012, 2013

...SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Electronic Game Card, Inc.; Order of Suspension of Trading February 19, 2010...accurate information concerning the securities of Electronic Game Card, Inc. (``EGMI'') because of questions...

2010-02-23

491

33 CFR 125.12 - Period of validity of Coast Guard Port Security Cards.  

Code of Federal Regulations, 2013 CFR

...of validity of Coast Guard Port Security Cards. 125.12 Section 125...Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) WATERFRONT FACILITIES...of validity of Coast Guard Port Security Cards. (a) The Coast...

2013-07-01

492

12 CFR 1026.60 - Credit and charge card applications and solicitations.  

...9 2014-01-01 2014-01-01 false Credit and charge card applications and solicitations...REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.60...

2014-01-01

493

41 CFR 301-70.709 - What can we do to reduce travel charge card delinquencies?  

Code of Federal Regulations, 2013 CFR

...with the travel charge card contractor (internet training is available for the GSA SmartPay...dollar limit when necessary. (e) Work with the charge card contractor to block...This publication is available on the Internet at...

2013-07-01

494

A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory  

Microsoft Academic Search

Java Card technology provides a secure, vendor-independent, ubiquitous Java platform for smart cards and other memory constrained\\u000a devices such as SIM technology. It is also an open standard in SIM and UIM technology for 3G environment. However, the major\\u000a point of criticism with regard to Java for smart cards and SIM cards is its low execution speed, aside from its

Min-sik Jin; Min-soo Jung

2006-01-01

495

41 CFR 101-26.502 - U.S. Government National Credit Card.  

Code of Federal Regulations, 2013 CFR

...true U.S. Government National Credit Card. 101-26.502 Section 101-26...502 U.S. Government National Credit Card. A waiver has been issued...149, U.S. Government National Credit Card. [60 FR 19674, Apr....

2013-07-01

496

49 CFR 375.221 - May I use a charge or credit card plan for payments?  

Code of Federal Regulations, 2013 CFR

... false May I use a charge or credit card plan for payments? 375.221...375.221 May I use a charge or credit card plan for payments? (a) You...for the acceptance of charge or credit cards for the payment of freight...

2013-10-01

497

48 CFR 32.1108 - Payment by Governmentwide commercial purchase card.  

Code of Federal Regulations, 2013 CFR

...charge against the purchase card for contract payment...charge against the purchase card should not be disputed when...requesting that the contractor credit the charge back to the Government...contracts to be paid by purchase card should include the clause...

2013-10-01

498

41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.  

Code of Federal Regulations, 2013 CFR

...149, U.S. Government National Credit Card. 109-38.801 Section 109-38...149, U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to...

2013-07-01

499

Measuring Up 2006: The State Report Card on Higher Education. Arizona  

ERIC Educational Resources Information Center

The purpose of this state report card is to provide the general public and policymakers with information they can use to assess and improve postsecondary education in each state. "Measuring Up 2006" is the fourth in a series of biennial report cards. The report card grades states in six overall performance categories: (1) Preparation: How…

National Center for Public Policy and Higher Education, 2006

2006-01-01

500

Two Types of Perseveration in the Dimension Change Card Sort Task  

ERIC Educational Resources Information Center

In the Dimension Change Card Sort (DCCS) task, 3-year-olds can sort cards well by one dimension but have difficulty in switching to sort the same cards by another dimension when asked; that is, they perseverate on the first relevant information. What is the information that children perseverate on? Using a new version of the DCCS, the experiments…

Hanania, Rima

2010-01-01